From owner-freebsd-questions@FreeBSD.ORG Sat Mar 14 03:56:39 2009 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D71E5106564A for ; Sat, 14 Mar 2009 03:56:39 +0000 (UTC) (envelope-from modulok@gmail.com) Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.170]) by mx1.freebsd.org (Postfix) with ESMTP id AC4F48FC08 for ; Sat, 14 Mar 2009 03:56:39 +0000 (UTC) (envelope-from modulok@gmail.com) Received: by wf-out-1314.google.com with SMTP id 27so2025552wfd.7 for ; Fri, 13 Mar 2009 20:56:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=j8UjkRmaMACOXB+YqAXbn7dT9LZNKK1wEyccv0Rv/oc=; b=o9i8Eov9x3djWSuJNIlfahVVvfP59PJ0dfd4r1JZElvlA4W+z0DPkE6aSy0GT33Eg7 SR2aLfmhbHSp63pmvGWwVwyvZti7C/1yhGYGYTT+EaSOuX5HqqJ1v4iCVjoXOVsrIPvv Sdxe/bUoEyj8oDzUJ6ANtEZVLYTvSIhTsC5yA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=CgMIXL4vSZelEWy6ecSNtO+tROiOeV2CSzdJKTQed10/It4x6vmvVjkxGk1S+gC3v7 TCf8l3pFdHzyYCVDNDQdlCcC562aJ1OPGlMTWw2VBE/1GSTFFaof4WKdv+d7zfqZs0Zk Dcelq2sEOF7S82CEf+94M60KV9XTOYA+uWIUs= MIME-Version: 1.0 Received: by 10.143.166.10 with SMTP id t10mr968363wfo.210.1237002999377; Fri, 13 Mar 2009 20:56:39 -0700 (PDT) In-Reply-To: References: Date: Fri, 13 Mar 2009 21:56:39 -0600 Message-ID: <64c038660903132056o5259bb7ev76d4f66937896360@mail.gmail.com> From: Modulok To: Gilles Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: Anonymizer tool like Tor? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 14 Mar 2009 03:56:40 -0000 On 3/12/09, Gilles wrote: > Hello > > I'd like to download information from our competitor's web site, > without their knowing it's from us. > > Do you know of an alternative for FreeBSD, ie. a solution that will > let me connect to a web server through at least one other host, and > have the IP address change automatically every few minutes? > It depends on how 'anonymous' it has to be. For simple corporate espionage script-type stuff, you could buy a small web-hosting service which provides an SSH account. You can get one of these for about $10.00 a month or less. Simply ssh to the remote server and do all of your bidding from there. It's inexpensive, convenient and somewhat anonomous. If your adversary has enough muscle to convince the web host to give out information about who owns the given IP, you'll need more protection. For actual anonymity from those with significant resources and the motivation to find you, the following should work. This goes beyond petty corporate espionage though, and requires significant motivation on your part as well: Buy a used laptop from a garage sale with cash. Make sure it has a wireless ethernet card or can accommodate one. Install BSD on it through a GELI encrypted GEOM. (No plain-text ever touches the disk.) Put the decryption key on a USB stick and leave it at a secure location NOT on your person. (Somewhere at home perhaps. You should covertly store the decryption key, itself encrypted and protected by a password, within an image or audio file on the USB stick via something like steghide. See: /usr/ports/security/steghide) This way, even if the USB stick is recovered, it contains no obvious information. In an audio or image file the decryption key will be indistinguishable from static or dark-current. Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to be a new pseudo-random value at each boot. Configure the system to automatically receive an IP address via DHCP. Dissable the wireless card. (Most have a physical switch.) Boot the system with the USB stick at home. Leave the USB stick at home! Plug the laptop it into a cigarette lighter adapter in your car. Go perusing through urban areas during daylight hours looking for un-secured wireless networks. (There are many to be found.) Once you find a connection, do your business. When totally done, issue the shutdown command. You, nor anyone else, will be able to boot the laptop without the decryption key, which you do NOT carry with you! In this manner if your adversary should approach you while in the field, simply cutting the power to the system should protect you from physical incrementing evidence. All but the most significantly motivated attackers should not be capable of obtaining any of the information on the laptop. Unless you're jumped by people in black suits while in the field, nobody will be able to connect you to the business you've been doing. Just remember not to do anything stupid from the laptop which would connect you to it, like checking your email. -Modulok-