search for: deanonym

Displaying 6 results from an estimated 6 matches for "deanonym".

Did you mean: anonym
2012 Jan 20
2
Regarding Pubkey Enumeration
HD Moore from MetaSploit has noted that, given a pubkey (and not the corresponding private key, as might be found in authorized_keys), he can determine if he'd be able to log into an account. It's a small thing, but he's using it for very interesting recon/deanonymization. He'll be releasing a paper shortly, not overplaying the characteristic, but certainly showing it can be used to do cute things. I expect this is easily fixable -- simply provide the challenge for a pubkey whether or not it'd actually be able to log in successfully. But it's w...
2016 Mar 11
2
Re: [virt-tools-list] [libvirt] Usability Enhancement: Import/Export VMs GUI
...tion properties of virtualizaiton for security. The setup is made up of two VMs a "Gateway" that runs Tor and which all traffic from an untrusted "Workstation" VM is forced thru it. The idea is that even if an attacker successfully roots the Workstation VM they still cannot deanonymize a user or infect the host. Its a fantastic project. You should try it and maybe even hack on it with us ;) Running on a secure and libre stack like KVM and Libvirt is awesome and wins half the battle. The rest of the way is about making the setup as easy as possible to expand the user base a...
2016 Mar 14
0
Re: [virt-tools-list] [libvirt] Usability Enhancement: Import/Export VMs GUI
...of virtualizaiton for security. > >The setup is made up of two VMs a "Gateway" that runs Tor and which all >traffic from an untrusted "Workstation" VM is forced thru it. The idea >is that even if an attacker successfully roots the Workstation VM they >still cannot deanonymize a user or infect the host. Its a fantastic >project. You should try it and maybe even hack on it with us ;) > >Running on a secure and libre stack like KVM and Libvirt is awesome and >wins half the battle. The rest of the way is about making the setup as >easy as possible to expan...
2023 Sep 07
1
Privacy improving suggestions for ObscureKeystrokeTiming
...e clearnet > could potentially link future ones of the same host even if routed through an > anonymity network like Tor. > > Advanced attacks where attackers run loads on onion services that influence > CPU activity and clock skew in predictable ways [2] may be possibly used to > deanonymize them. > > We would suggest drawing the padding packet intervals from some other > distribution instead of firing these off on a fixed timer. Basically, do what > kloak does but at the network layer. Yeah, making the intervals a bit uncertain seems like a reasonable idea. This gives...
2016 Mar 10
3
Re: [libvirt] Usability Enhancement: Import/Export VMs GUI
On Fri, Mar 04, 2016 at 04:23:18PM +0000, bancfc@openmailbox.org wrote: >The single most important usability feature missed by our less technical >users who migrate from VirtualBox is a one click import/export of VMs >and their config settings. > >I was optimistic about the Gnome Boxes effort on Govf lib but >unfortunately it was never realized and I would hesitate to recommend
2012 Aug 03
0
Binary Quadratic Opt
...degree of vertex has upper bound" since "Graph isomorphism where degree of vertex has upper bound" has tractable solution. This approach seems promising. > > > > I also came across solving Graph matching using Simulated Annealing (http://randomwalker.info/luther/kaggle-deanonymization/Graph_Matching_via_Simulate.html) which also seems promising. > > > > How do you feel about these? > > > > > >> > In the lpSolve document there does not seem to be any option where one can specify which variable should the optimizer use to use LP rela...