From 81d536b3c4bc6ad84adf028bbfb6f56c3689ed07 Mon Sep 17 00:00:00 2001 From: nopeitsnothing Date: Sat, 10 Jun 2023 22:23:10 -0400 Subject: [PATCH] missing some inline images Signed-off-by: nopeitsnothing --- guide.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/guide.md b/guide.md index a700b06..74cc78e 100644 --- a/guide.md +++ b/guide.md @@ -591,7 +591,7 @@ Small in-between Disclaimer: **This guide does not necessarily endorse or recomm Unfortunately, the TLS protocol used in most HTTPS connections in most Browsers (Chrome/Brave among them) will leak the Domain Name again through SNI[^39] handshakes (this can be checked here at Cloudflare: [[Archive.org]](https://web.archive.org/web/https://www.cloudflare.com/ssl/encrypted-sni/) ). **As of the writing of this guide, only Firefox-based browsers supports ECH (Encrypted Client Hello**[^40] **previously known as eSNI**[^41]**) on some websites which will encrypt everything end to end (in addition to using a secure private DNS over TLS/HTTPS) and will allow you to hide your DNS requests from a third party**[^42]**.** And this option is not enabled by default either so you will have to enable it yourself. -![][50] +![](media/image04.png) In addition to limited browser support, only web Services and CDNs[^43] behind Cloudflare CDN support ECH/eSNI at this stage[^44]. This means that ECH and eSNI are not supported (as of the writing of this guide) by most mainstream platforms such as: @@ -625,7 +625,7 @@ Here is a list of how various browsers behave with OCSP: [[Archive.org]](https://web.archive.org/web/https://blog.torproject.org/new-low-cost-traffic-analysis-attacks-mitigations). -![][67] +![](media/image08.png) - **Correlation Timing Attacks:** As illustrated (simplified) below, an adversary that has access to network connection logs (IP or DNS for instance, remember that most VPN servers and most Tor nodes are known and publicly listed) at the source and the destination could correlate the timings to de-anonymize you without requiring any access to the Tor or VPN network in between. A real use case of this technique was done by the FBI in 2013 to de-anonymize[^73] a bomb threat hoax at Harvard University. -![][68] +![](media/image09.png) - **Correlation Counting Attacks:** As illustrated (simplified) below, an adversary that has no access to detailed connection logs (cannot see that you used Tor or Netflix) but has access to data counting logs could see that you have downloaded 600MB on a specific time/date that matches the 600MB upload at the destination. This correlation can then be used to de-anonymize you over time. -![][69] +![](media/image10.png) There are ways to mitigate these such as: @@ -1129,11 +1129,11 @@ Contrary to popular belief and pop culture, modern gait recognition systems aren Other things than can be used to identify you include your earlobes, which are actually more identifiable than fingerprints, or even the shape of your skull. As such, soft headcoverings such as balaclavas are not recommendable for obscuring your identity - they make you look incredibly suspicious, while also conforming to the shape of your skull. -![][113] +![](media/image11.png) (Illustration from [[Archive.org]](https://web.archive.org/web/https://www.nature.com/articles/s41598-020-79310-1.pdf)) -![][115] +![](media/image12.png) (illustration from [[Archive.org]](https://web.archive.org/web/https://rd.springer.com/chapter/10.1007/978-3-030-42504-3_15))