ProxyGambit Replaces Defunct ProxyHam 26
msm1267 writes: Hardware hacker Samy Kamkar has picked up where anonymity device ProxyHam left off. After a DEF CON talk on ProxyHam was mysteriously called off, Kamkar went to work on developing ProxyGambit, a similar device that allows a user to access the Internet without revealing their physical location.
A description on Kamkar's site says ProxyGambit fractures traffic from the Internet through long distance radio links or reverse-tunneled GSM bridges that connect and exit the Internet through wireless networks far from the user's physical location. ProxyHam did not put as much distance between the user and device as ProxyGambit, and routed its signal over Wi-Fi and radio connections. Kamkar said his approach makes it several times more difficult to determine where the original traffic is coming from.
A description on Kamkar's site says ProxyGambit fractures traffic from the Internet through long distance radio links or reverse-tunneled GSM bridges that connect and exit the Internet through wireless networks far from the user's physical location. ProxyHam did not put as much distance between the user and device as ProxyGambit, and routed its signal over Wi-Fi and radio connections. Kamkar said his approach makes it several times more difficult to determine where the original traffic is coming from.
Better than that (Score:1)
ProxyCheeseOnToast
Re: (Score:2)
Better latent than never.
Anonymous cell phone (Score:3)
I developed a system to allow non-trackable cellular phones, in which you could receive a phone call without revealing your location (once answered, you revealed your location); nobody will go for it, though. It only requires like a few bytes of broadcast packet exchange (goes up to a theoretical maximum of 48KB if every single phone in the world is ringing all at once on a global scope), and has a 0.00002% chance of ringing your phone when you're not actually receiving a call. I mitigated this with geographical limits, although they don't help for a non-answer (if you don't answer, it tries a regional, then a global ring, meaning your initial chance of a false ring is like 0.000000000000000000000000013% for any phone call made).
Trivial shit.
Re: (Score:2, Informative)
He's proposed the idea of broadcasting the MEID/ESN of every phone that is ringing in every mobile phone "cell" in the world/via Satlink(over GPS as an example).
Rather than cell phones actively negotiating their position so that rings go to the correct location, the location discovery/authentication handshake occurs when the intended recipient responds to the beacon.
Has he integrated the total $$$ in waste for the next 10-20 years at the current market rate for mobile data? I imagine this would waste millio
Re: (Score:3)
He's proposed the idea of broadcasting the MEID/ESN of every phone that is ringing in every mobile phone "cell" in the world/via Satlink
Personally, I would object to everybody being able to tell if/when my phone is ringing, and possibly even deduce whether I accepted the call from the duration of the "ringing" state. If that's really how this system is supposed to work, I'm not surprised the OP couldn't find any takers.
Re: (Score:3)
No reason they should, this is using either 2.4Ghz Wifi or a GSM connection, neither of which have the encryption restrictions the HAM bands use.
Re: (Score:3)
No reason they should, this is using either 2.4Ghz Wifi or a GSM connection, neither of which have the encryption restrictions the HAM bands use.
ProxyHam didn't have an encryption restriction, either, because it wasn't operating under amateur radio service rules. ISM 900MHz.
The appeal is in the doing, (Score:5, Insightful)
I kinda want to do this, just for kicks.
Yes, my OTHER computer is anonymous, and will never visit any site I've been to.
Re: (Score:2)
Would make a great bumper sticker.
Re: (Score:3)
If it never visits ant of the sames sites, and that pattern is known, isn't that exploitable information?
No clue why ProxyHam went dark (Score:2)
Looking at ProxyGambit it either uses Point to Point directional wifi, or a 2G connection, so it wasn't an FCC 'encryption' issue.
It was a BlackHat / DEFCON publicity stunt (Score:3)
Hackaday is pretty much spot on: http://hackaday.com/2015/07/14... [hackaday.com]
There's always posturing for PR before BlackHat and DEFCON. This was to get the researcher's name on people's radar.
Many a competent unix sysadmin could come up with something similar.
What's hilarious is that despite how easy it would be to make something like this, the "researcher" just bought a yagi antenna and posed for a picture. They didn't even bother to point the yagi antenna towards the ground, for that matter.
Re: (Score:2)
They didn't even bother to point the yagi antenna towards the ground, for that matter.
Why would they point it towards the ground? You want to point it towards the distance radio. In the hackaday picture, it was pointed slightly above the horizon, which will put a lot more the radiation towards the distant station than pointing it at the ground would.
The antenna was attached to something that would normally be mounted somewhere, but while it was sitting on the table it was pointed a few degrees up. The radiation pattern of a yagi isn't narrow enough that you'd need to worry about being off
Re: (Score:2)
Competent UNIX admin? Let me submit that it's just not needed to be competent with UNIX: You just need some basic knowledge of the concept of a subnet, and it might help to know what a broadcast domain is.
Anyone who can configure a venerable WRT54GL with OpenWRT or Tomato or DD-WRT and isn't afraid of a 900MHz ISM-band Ubiquiti (or other) radio can do this.
It's just Ethernet frames that happen to encapsulate IP. No big deal.
I mean, FFS: A couple of years ago I built such a system. A wealthy customer wa
WTF? (Score:1)
This is what passes for hacking nowadays?
Take a TP-Link TL-MR3020 plug a 3g or a 4g and install openWRT [openwrt.org]. Now you've got a cellphone connected WiFi client/access point. Leet h@x.
Seriously, this is juvenile.