Fwd: design for a Tor router without anonymity compromises
---------- Forwarded message ----------
From: coderman
On Sat, 02 May 2015 20:37:41 -0700, coderman
---------- Forwarded message ---------- From: coderman
Date: Sat, 2 May 2015 20:37:17 -0700 Subject: design for a Tor router without anonymity compromises To: tor-dev a friend and i are working on a Tor router design that doesn't compromise anonymity for convenience. [0][1][2][3][4]
Curious what you would say are the key advantages between your project and Grugq and Matt Lackeys 2nd generation version of P.O.R.T.A.L (Personal Onion Router to Assure Liberty) Their Defcon 22 Talk: https://www.youtube.com/watch?v=_KyfJW2lHtk The Slides: http://portalmasq.com The Hardware: http://smile.amazon.com/dp/B00JL31MPO/ref=cm_sw_su_dp
On 5/3/15, Seth wrote:
... Curious what you would say are the key advantages between your project and Grugq and Matt Lackeys 2nd generation version of P.O.R.T.A.L.
key advantages: - enforces Tor at clients, not a Tor proxy gateway for local network. this is important in terms of fingerprinting and stream isolation. - provides defense in depth for Tor Browser, a secondary protection if primary protections fail. PORTAL failure requires OPSEC compensating controls. :) - utilizes secure boot and secure computing capabilities present in modern embedded processors to further defend keys and software on device. - does not use passwords; only key based authentication. - more powerful hardware to grow along with Tor network itself, support more than bare minimum configurations. that's what sticks out for me, as most distinguished from P.O.R.T.A.L. and related efforts on similar hardware. [Anonabox, Invizbox, etc.] best regards,
participants (2)
-
coderman
-
Seth