Re: [Tails-dev] todo/network_fingerprint

Delete this message

Reply to this message
Author: intrigeri
Date:  
To: The Tails public development discussion list
Subject: Re: [Tails-dev] todo/network_fingerprint
Hi,

adrelanos wrote (30 Jun 2013 14:01:04 GMT) :
> intrigeri:
>> If bridge mode (or whatever the censorship circumvention / Tails
>> detection protection option is called) is enabled, then yes. Would you
>> be willing to prepare a patch to our design/implementation doc that
>> makes this clear?


> I am happy to look at it.


Great!

>>> Apart from this, I also made the suggestions, if Tails wanted to have to
>>> have a good portion of more clearnet traffic instead of having only Tor
>>> traffic, Tails could run an untorified mainstream Linux distribution in
>>> chroot or in a VM.
>>
>> It's unclear to me how useful this is in practice.
>> Any pointer to reasoning / research on this topic?


> A conclusion I got from "[tor-talk] Research paper "The Parrot is Dead:
> Observing Unobservable Network Communications", was: "if you want to
> look like http/https/ssh/etc. the only feasible method is, use the
> implementation itself, not trying to mimic it".


> I conclude, if Tails wants to look like Debian, the most promising
> approach is to use Debian.


I see. What is true at the connection level might not hold
system-wide, though. The change of scale does not look obvious to me.
Tails *is* using Debian already, by the way :)

Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
| OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc