Overclock.net › Forums › Industry News › Software News › [Anon] Astoria – The New (NSA Proof ?) TOR
New Posts  All Forums:Forum Nav:

[Anon] Astoria – The New (NSA Proof ?) TOR

post #1 of 23
Thread Starter 
SOURCE
SOURCE 2



Quote:
The Onion Router or famously known as TOR was one of the most popular anonymity network system that was and still is meant to allow its users to surf the word wide web anonymously through a cluster of networks that are made up of more than six thousand nodes and relays. However, a few years back the National Security Agency was able to hack The Onion Router network, which lead security professionals in collaboration with the scientists from Israel and America to formulated a new and more advanced TOR application labeled as ASTORIA. It is specially designed to make eavesdropping and/or spying much more complicated. The encrypted information of a person is being channeled using several relays in its network of controlled grid. TOR will not share the user’s identifying information such as your IP and real position with websites or searching a person via their internet service providers on the user end because a hacker will not be able to know who is browsing. But bear in mind, TOR is not being safe and secure from the spying eyes of network level hackers – as stated at the start of this article, major spying organizations like the National Security Agency and our tea drinking friends the Government Communications Headquarters have engineered a way to recognize a person data using timing assaults.




Quote:
Using timing attacks, what the hacker is required to do is to take control of each of the entry and exit relays, then with the help of analytical evaluation a hacker can find the identification of a TOR operator in matter of time. Study shows that about fifty-eight percent of TOR connections are prone to networking level attacks. However, to work with the risks, researchers have built a unique TOR software, Astoria. The TOR Astoria allows its users to reduce the danger of utilizing a malicious TOR route from fifty-eight percent to five point eight percent. The system has been created to overcome even the most recently proposed asymmetrically linked assaults on TOR. According to study, the experts proclaim that the timing hacks will always be a threat to the TOR environment, and it is impossible to get entirely rid of this menace, but it can be minimized using the new Astoria.

Astoria uses an algorithmic rule that is developed to predict precisely attacks and then appropriately opts the best and secure path to make a link that mitigate timing attack opportunities. In an attempt to make TOR truly more usable for a regular user, Astoria offers multiple security features which makes it both very useful and extremely functional at TOR’s finest level of security.

“Unlike other AS-aware Tor clients, Astoria also looks at how déplacements should be built in the worst case—i.e. when zero secure relays are obtainable,” says the research paper. “Furthermore, Astoria is an efficient network system and works to make sure that all circuits created by it are load-balanced throughout the volunteer-driven Tor network.”

For that reason, Astoria is a usable replacement for the plain and simple TOR only in situations where protection of your information and data is a high concern. You can study the complete document titled Measuring and Mitigating AS-Level Adversaries Against TOR. At the moment, Astoria is not available for download to the public but as soon as it is available we will let you know.
Shadownet
(12 items)
 
 
CPUMotherboardGraphicsRAM
5930k Asus rampage V Extreme  Inno3D GTX 970 Hercluez x4 airboss ultra  Gskill ripjaws DDR4 3200mhz 
Hard DriveHard DriveHard DriveCooling
WD black  WD Black  Seagate ES  Custom loop  
OSKeyboardPowerCase
Windows 10  Corsair k70  Super flower 1000 W plat  Corsair 900D 
  hide details  
Reply
Shadownet
(12 items)
 
 
CPUMotherboardGraphicsRAM
5930k Asus rampage V Extreme  Inno3D GTX 970 Hercluez x4 airboss ultra  Gskill ripjaws DDR4 3200mhz 
Hard DriveHard DriveHard DriveCooling
WD black  WD Black  Seagate ES  Custom loop  
OSKeyboardPowerCase
Windows 10  Corsair k70  Super flower 1000 W plat  Corsair 900D 
  hide details  
Reply
post #2 of 23
Considering it was the NSA who released the crack or whatever it was for the first TOR I'll pretend this one hasn't been made by them.
The girlfriend.
(15 items)
 
The Mistress
(13 items)
 
Media Server
(11 items)
 
CPUMotherboardGraphicsRAM
A8-6410 Lenovo Lancer 4B2 K16.3 R5 128 Shaders/M230 Hynix 8GB DDR3 1600 
Hard DriveHard DriveOSMonitor
Samsung 840 120 GB SSD Seagate Momentus 1TB 5400rmp Win 8.1 CMN1487 TN LED 14" 1366*768 
KeyboardPowerMouseMouse Pad
Lenovo AccuType 2900mAh/41Wh Elan Trackpad/Logitech M90 Super Flower 
Audio
AMD Avalon(Connexant) 
  hide details  
Reply
The girlfriend.
(15 items)
 
The Mistress
(13 items)
 
Media Server
(11 items)
 
CPUMotherboardGraphicsRAM
A8-6410 Lenovo Lancer 4B2 K16.3 R5 128 Shaders/M230 Hynix 8GB DDR3 1600 
Hard DriveHard DriveOSMonitor
Samsung 840 120 GB SSD Seagate Momentus 1TB 5400rmp Win 8.1 CMN1487 TN LED 14" 1366*768 
KeyboardPowerMouseMouse Pad
Lenovo AccuType 2900mAh/41Wh Elan Trackpad/Logitech M90 Super Flower 
Audio
AMD Avalon(Connexant) 
  hide details  
Reply
post #3 of 23
Thread Starter 
Lol I doubt anything will ever be secure/private from them ...
Shadownet
(12 items)
 
 
CPUMotherboardGraphicsRAM
5930k Asus rampage V Extreme  Inno3D GTX 970 Hercluez x4 airboss ultra  Gskill ripjaws DDR4 3200mhz 
Hard DriveHard DriveHard DriveCooling
WD black  WD Black  Seagate ES  Custom loop  
OSKeyboardPowerCase
Windows 10  Corsair k70  Super flower 1000 W plat  Corsair 900D 
  hide details  
Reply
Shadownet
(12 items)
 
 
CPUMotherboardGraphicsRAM
5930k Asus rampage V Extreme  Inno3D GTX 970 Hercluez x4 airboss ultra  Gskill ripjaws DDR4 3200mhz 
Hard DriveHard DriveHard DriveCooling
WD black  WD Black  Seagate ES  Custom loop  
OSKeyboardPowerCase
Windows 10  Corsair k70  Super flower 1000 W plat  Corsair 900D 
  hide details  
Reply
post #4 of 23
But I have nothing to hide!
The girlfriend.
(15 items)
 
The Mistress
(13 items)
 
Media Server
(11 items)
 
CPUMotherboardGraphicsRAM
A8-6410 Lenovo Lancer 4B2 K16.3 R5 128 Shaders/M230 Hynix 8GB DDR3 1600 
Hard DriveHard DriveOSMonitor
Samsung 840 120 GB SSD Seagate Momentus 1TB 5400rmp Win 8.1 CMN1487 TN LED 14" 1366*768 
KeyboardPowerMouseMouse Pad
Lenovo AccuType 2900mAh/41Wh Elan Trackpad/Logitech M90 Super Flower 
Audio
AMD Avalon(Connexant) 
  hide details  
Reply
The girlfriend.
(15 items)
 
The Mistress
(13 items)
 
Media Server
(11 items)
 
CPUMotherboardGraphicsRAM
A8-6410 Lenovo Lancer 4B2 K16.3 R5 128 Shaders/M230 Hynix 8GB DDR3 1600 
Hard DriveHard DriveOSMonitor
Samsung 840 120 GB SSD Seagate Momentus 1TB 5400rmp Win 8.1 CMN1487 TN LED 14" 1366*768 
KeyboardPowerMouseMouse Pad
Lenovo AccuType 2900mAh/41Wh Elan Trackpad/Logitech M90 Super Flower 
Audio
AMD Avalon(Connexant) 
  hide details  
Reply
post #5 of 23
Quote:
Originally Posted by Liranan View Post

Considering it was the NSA who released the crack or whatever it was for the first TOR I'll pretend this one hasn't been made by them.

biggrin.gif this totally.
post #6 of 23
Isn't NSA stuff like almost hardwired in everything?
post #7 of 23
Quote:
Originally Posted by Liranan View Post

But I have nothing to hide!

Most of us don't.

But it's the principle... you just don't spy at everyone! I guess you don't spy your neighbours?! See, so why should they spy on us?!

I don't give a ... if they spy on anyone of who they think has bad/criminal ideas or stuff to do.

But don't spy on a "normal" person like us...

Only use it if the person they want to spy has a criminal record or via their contacts, spy on them.
   
Main Laptop
(13 items)
 
CPUMotherboardGraphicsRAM
i7 2600k 3.4GHz @ 5.2GHz ASUS P8P67 Deluxe (B3) SLi ASUS GTX780Ti DC2OC 16GB (4x 4GB) Vengeance 1866MHz @ 2133MHz 
Hard DriveHard DriveHard DriveHard Drive
C: Crucial MX200 250GB D: Caviar Black 2TB E: Spinpoint 750GB F: Raptor 150GB (Ubuntu 12.04 Dual Boot) 
Optical DriveCoolingOSMonitor
ASUS BD Thermalright Silver Arrow Windows 7 Ultimate 64-bit Asus PB278Q 2560x1440p 
KeyboardPowerCaseMouse
Logitech G11 Corsair 1kW Antec 1200 Logitech G600 
Mouse PadAudio
A4 paper :D Logitech Z-5500 
CPUMotherboardGraphicsRAM
Q9450 (2.6GHz to 3.8GHz) ASUS 780i Striker II Formula ASUS GTX 470 8Gb (4x2Gb) Dominators 1066MHz DDR2 
Hard DriveOptical DriveOSMonitor
C: Crucial M4 256GB D: 1x Raptor 150Gb & E: + F... ASUS DVD + DVD(RW) Windows 7 Ultimate 64-bit ASUS 26" 1080p 
KeyboardPowerCaseMouse
Logitech Corsair 750W Antec 300 Logitech G5 
Mouse PadAudio
A4 paper :D ASUS Cine5 
CPUMotherboardGraphicsRAM
Intel i7 something something ASUS N750JV nVidia 750M 2x 4GB DDR3 1600 Kingston 
Hard DriveOptical DriveOSMonitor
C: Crucial MX200 mSATA 250GB + D: WD 1TB 5k4 E:... DVD-RAM DL C: Windows 7 64-bit, E: Linux Elementary OS Luna 17" 1080p 
Mouse
ASUS Optical USB 
  hide details  
Reply
   
Main Laptop
(13 items)
 
CPUMotherboardGraphicsRAM
i7 2600k 3.4GHz @ 5.2GHz ASUS P8P67 Deluxe (B3) SLi ASUS GTX780Ti DC2OC 16GB (4x 4GB) Vengeance 1866MHz @ 2133MHz 
Hard DriveHard DriveHard DriveHard Drive
C: Crucial MX200 250GB D: Caviar Black 2TB E: Spinpoint 750GB F: Raptor 150GB (Ubuntu 12.04 Dual Boot) 
Optical DriveCoolingOSMonitor
ASUS BD Thermalright Silver Arrow Windows 7 Ultimate 64-bit Asus PB278Q 2560x1440p 
KeyboardPowerCaseMouse
Logitech G11 Corsair 1kW Antec 1200 Logitech G600 
Mouse PadAudio
A4 paper :D Logitech Z-5500 
CPUMotherboardGraphicsRAM
Q9450 (2.6GHz to 3.8GHz) ASUS 780i Striker II Formula ASUS GTX 470 8Gb (4x2Gb) Dominators 1066MHz DDR2 
Hard DriveOptical DriveOSMonitor
C: Crucial M4 256GB D: 1x Raptor 150Gb & E: + F... ASUS DVD + DVD(RW) Windows 7 Ultimate 64-bit ASUS 26" 1080p 
KeyboardPowerCaseMouse
Logitech Corsair 750W Antec 300 Logitech G5 
Mouse PadAudio
A4 paper :D ASUS Cine5 
CPUMotherboardGraphicsRAM
Intel i7 something something ASUS N750JV nVidia 750M 2x 4GB DDR3 1600 Kingston 
Hard DriveOptical DriveOSMonitor
C: Crucial MX200 mSATA 250GB + D: WD 1TB 5k4 E:... DVD-RAM DL C: Windows 7 64-bit, E: Linux Elementary OS Luna 17" 1080p 
Mouse
ASUS Optical USB 
  hide details  
Reply
post #8 of 23
Just to get an idea, how many of you browse through TOR or proxy? I don't want to sound like a N-S/A supporter, but if you use one, you probably have something to hide; like I said, I'm not a supporter, and I do like my privacy also. Never really had a reason to go to that level yet, anyway. That might change for me in the future.
Mine
(13 items)
 
  
CPUMotherboardGraphicsRAM
Intel i7 4790K AsRock Z97-E ITX Sapphire Radeon RX 580 8 GB G Skill Sniper DDR3 2400 
Hard DriveCoolingOSMonitor
Crucial MX100 256 GB Thermalright AXP-200 Windows 10 Pro x64 Vizio P50-C1 
KeyboardPowerCaseMouse
Logitech Corsair 600W Lian Li Q-11 Logitech 
Mouse Pad
Cheap Soft Mousepad 
  hide details  
Reply
Mine
(13 items)
 
  
CPUMotherboardGraphicsRAM
Intel i7 4790K AsRock Z97-E ITX Sapphire Radeon RX 580 8 GB G Skill Sniper DDR3 2400 
Hard DriveCoolingOSMonitor
Crucial MX100 256 GB Thermalright AXP-200 Windows 10 Pro x64 Vizio P50-C1 
KeyboardPowerCaseMouse
Logitech Corsair 600W Lian Li Q-11 Logitech 
Mouse Pad
Cheap Soft Mousepad 
  hide details  
Reply
post #9 of 23
Quote:
Originally Posted by ASUSfreak View Post

Most of us don't.

But it's the principle... you just don't spy at everyone! I guess you don't spy your neighbours?! See, so why should they spy on us?!

I don't give a ... if they spy on anyone of who they think has bad/criminal ideas or stuff to do.

But don't spy on a "normal" person like us...

Only use it if the person they want to spy has a criminal record or via their contacts, spy on them.

To find out who is a terrorist, they first need to find such a person by spying on everyone else.

The problem with spying is how far it will go. It exists now for the DOD, NSA, CIA, Homeland Security, probably FBI to spot and avert terrorist attacks and capture major big-time criminal activities. Most people in America are fine with it, but how long before they decide that spying on terrorists is not enough? How long before local police department can tap into such spying networks to prevent small-time crime locally? And afterwards? Spy on teenagers private conversations to make sure they don't use pot? How long before internet spying is not considered enough and they decide to put mandatory cameras in people's houses? How long before they decide what we cannot post online or say over telephone? Such progress and changes do not happen over night, but over many many years - policy by policy, law by law, etc. and eventually you get 1984 in 2050 or whenever.

The only way to fight it now is to make masses pretend they are terrorists
post #10 of 23
To avoid NSA spying... Does it class as spying if you give the NSA the key to your door by using the software they created?

*waddles, till the very next day*
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Software News
Overclock.net › Forums › Industry News › Software News › [Anon] Astoria – The New (NSA Proof ?) TOR