Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy Hardware Hacking

ProxyGambit Replaces Defunct ProxyHam 26

msm1267 writes: Hardware hacker Samy Kamkar has picked up where anonymity device ProxyHam left off. After a DEF CON talk on ProxyHam was mysteriously called off, Kamkar went to work on developing ProxyGambit, a similar device that allows a user to access the Internet without revealing their physical location.

A description on Kamkar's site says ProxyGambit fractures traffic from the Internet through long distance radio links or reverse-tunneled GSM bridges that connect and exit the Internet through wireless networks far from the user's physical location. ProxyHam did not put as much distance between the user and device as ProxyGambit, and routed its signal over Wi-Fi and radio connections. Kamkar said his approach makes it several times more difficult to determine where the original traffic is coming from.
This discussion has been archived. No new comments can be posted.

ProxyGambit Replaces Defunct ProxyHam

Comments Filter:
  • by Anonymous Coward

    ProxyCheeseOnToast

  • by bluefoxlucid ( 723572 ) on Friday July 17, 2015 @12:46PM (#50129657) Homepage Journal

    I developed a system to allow non-trackable cellular phones, in which you could receive a phone call without revealing your location (once answered, you revealed your location); nobody will go for it, though. It only requires like a few bytes of broadcast packet exchange (goes up to a theoretical maximum of 48KB if every single phone in the world is ringing all at once on a global scope), and has a 0.00002% chance of ringing your phone when you're not actually receiving a call. I mitigated this with geographical limits, although they don't help for a non-answer (if you don't answer, it tries a regional, then a global ring, meaning your initial chance of a false ring is like 0.000000000000000000000000013% for any phone call made).

    Trivial shit.

  • by bbsguru ( 586178 ) on Friday July 17, 2015 @12:51PM (#50129711) Homepage Journal
    Samy has done a great job of documenting / illustrating this project, making it appealing even for those of us who don't particularly care about the benefits of anonymity.

    I kinda want to do this, just for kicks.

    Yes, my OTHER computer is anonymous, and will never visit any site I've been to.

  • Looking at ProxyGambit it either uses Point to Point directional wifi, or a 2G connection, so it wasn't an FCC 'encryption' issue.

    • Hackaday is pretty much spot on: http://hackaday.com/2015/07/14... [hackaday.com]

      There's always posturing for PR before BlackHat and DEFCON. This was to get the researcher's name on people's radar.

      Many a competent unix sysadmin could come up with something similar.

      What's hilarious is that despite how easy it would be to make something like this, the "researcher" just bought a yagi antenna and posed for a picture. They didn't even bother to point the yagi antenna towards the ground, for that matter.

      • They didn't even bother to point the yagi antenna towards the ground, for that matter.

        Why would they point it towards the ground? You want to point it towards the distance radio. In the hackaday picture, it was pointed slightly above the horizon, which will put a lot more the radiation towards the distant station than pointing it at the ground would.

        The antenna was attached to something that would normally be mounted somewhere, but while it was sitting on the table it was pointed a few degrees up. The radiation pattern of a yagi isn't narrow enough that you'd need to worry about being off

      • by adolf ( 21054 )

        Competent UNIX admin? Let me submit that it's just not needed to be competent with UNIX: You just need some basic knowledge of the concept of a subnet, and it might help to know what a broadcast domain is.

        Anyone who can configure a venerable WRT54GL with OpenWRT or Tomato or DD-WRT and isn't afraid of a 900MHz ISM-band Ubiquiti (or other) radio can do this.

        It's just Ethernet frames that happen to encapsulate IP. No big deal.

        I mean, FFS: A couple of years ago I built such a system. A wealthy customer wa

  • by Anonymous Coward

    This is what passes for hacking nowadays?

    Take a TP-Link TL-MR3020 plug a 3g or a 4g and install openWRT [openwrt.org]. Now you've got a cellphone connected WiFi client/access point. Leet h@x.

    Seriously, this is juvenile.

The optimum committee has no members. -- Norman Augustine

Working...