Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Communications Encryption Networking Privacy

MIT Creates Tor Alternative That Floods Networks With Fake Data (softpedia.com) 115

An anonymous reader writes with word that MIT researchers "created an alternative to Tor, a network messaging system called Vuvuzela that pollutes the network with dummy data so the NSA won't know who's talking to who." Initial tests show the systems overhead adding a 44-second delay, but the network can work fine and preserve anonymity even it has more than 50% of servers compromised.
This discussion has been archived. No new comments can be posted.

MIT Creates Tor Alternative That Floods Networks With Fake Data

Comments Filter:
  • by U2xhc2hkb3QgU3Vja3M ( 4212163 ) on Sunday December 13, 2015 @10:28AM (#51109673)

    More wasted bandwidth!

    • by sinij ( 911942 ) on Sunday December 13, 2015 @10:44AM (#51109733)
      Disagree. No cost is too high for protecting our freedoms.
      • by JoeMerchant ( 803320 ) on Sunday December 13, 2015 @11:15AM (#51109807)

        This is actually a method that a (partially) top-secret government installation used back in the 1980s. They have a huge campus, with network covering all of it, but they run really small packet size and keep a healthy quantity of random BS traversing the network at all times, so even before any interceptor can start working on the top-secret encryption, they've got to sort all the chaff packets. Also helps when the academic types get careless with secret info and forget to use the encryption layer, still bloody well impossible to sift the 0.001% interesting traffic out of the garbage when packets are flying around with 1 byte payloads.

        • by KGIII ( 973947 )

          We need something like this, something P2P, that sends out garbage data to be picked up by tracking networks. Poisoning the well, so to speak.

          • I thought about this. How can we send a fragment of a file from node A to B without implicating node B. Both as an uploader or downloader, a rouge MPAA node could implicate the other party. Installing intermediary nodes would only implicate the intermediaries.

            How can we anonymize the data itself? If we use a third node, C, to organize A and B, it could store data in encrypted fragments on various nodes and put the keys on different nodes, then instruct a downloader from where to get all the pieces. That
            • by KGIII ( 973947 )

              rogue*

              I like where you're going with it but it also has to be filled with random data and there'd need to be enough exit nodes, across the world ideally, to simply enable one to not just sort-of multicast their traffic but to serve others and to serve the garbage data. Yes, there would be increased latency but as much of it is just sending out spoofed traffic and forwarding/receiving requests on behalf of others then it might not be too bad?

              The idea that I'm thinking of isn't just to enable people to pirate

            • by Anonymous Coward

              Someone came up with a BitTorrent client mixed with a TOR alternative (which only serves that client). Didn't catch on yet but the idea was everyone was forced to act as a 'TOR' node if they were running the client, and all traffic was encrypted such that each node knows where it came from and where it's going (both other nodes in the network) but they don't know if those are the final addresses or just other hops, and it's encrypted so they don't know what it contains.

              It sounds like this would run somewhat

          • by Anonymous Coward on Sunday December 13, 2015 @03:03PM (#51110681)

            We need something like this, something P2P, that sends out garbage data

            We have this already, it's called APK.

        • by ledow ( 319597 )

          Ah, you mean "defeated by any trivial filter".

          Security through obscurity (which is what this is) is doomed to fail. It *can* work, for short periods, when it's unexpected, when people aren't really looking (how many people just have a "secret URL" on their blog to get into the admin interface so that it's not publicly visible - doesn't stop people finding it), etc.

          But anything like this? Pointless. And one academic getting careless with encryption even once would likely see them sacked in such a place.

          It

          • by Anonymous Coward

            Not true. I can beat any filter you can come up with.

            I send constant packets that are 1024 in size and contain random data that is encrypted. once in a while a real message packet that is padded with random data and encrypted is sent along.

            you can not detect any difference between the fake and the real packets because I made sure the real packets look like fake packets. works great and got me an A+ in advanced CS security class, I got it past the NSA ex spook teaching us. Bet him my grade that I could g

            • See also: Steganography: http://mangocats.com/stegamail... [mangocats.com] (and many others)

            • by sinij ( 911942 )
              This is good concept when you don't have computing power to use strong symmetric encryption. Like back in 80s. Or with 90s export-grade crypto.

              Today this is largely irrelevant. Your smart fridge is capable of AES256 and there is no feasible way to brute force through that. This is not where cryptography fails and not how it is usually attacked.

              Because modern symmetric cryptography is so strong, nobody attempts to attack it directly. Instead, it is always side-stepped. You attack key negotiation and ext
          • In the 1980s it worked well enough, based on the premise that you'd need a hell of a network traffic processor to sort out all the crap, and unobtrusive portable PCs just weren't up to the task, back then. At least, that's what the network security officer was shining me on with during my interview - I nodded politely, having already decided that the place was too full of lies, contradictions, and sources of radiation for me.

        • by Anonymous Coward on Sunday December 13, 2015 @01:56PM (#51110393)

          Back in the early 1990s, when designing a secure network, on the physical side, the guide was to place the cables in conduit that would be positively pressurized, and if the pressure went down in the pipe, all cables would be cut. The mechanism that swung the axe was very sensitive, just to keep someone from attaching something to the pipe, pressurizing the attachment, then cutting in under pressure. The pressure varied as well randomly, so if someone cut in at the wrong pressure, it would also trigger the "cut all links" circuit.

          The same book also stated exactly as the parent -- you had encrypted traffic flowing on the network at all times. Of course, this book was dated -- they preferred ring topologies (ATM... and no, not the teller machine... the network with 53 byte packets) because all the machines on there could cough up a random packet and nobody would be the wiser. With switches, it becomes a bit more tricky to have encryption as noise without making the links unusable due to congestion.

          The ironic thing -- this was a book pitched for basic security for the enterprise, when businesses actually really cared about security.

    • by alvinrod ( 889928 ) on Sunday December 13, 2015 @10:55AM (#51109763)
      Which the government could easily spare us of needing if they'd only quit illegally spying on their citizens.
    • No what is a waste is that something like this is even needed. But the government has forgotten it is supposed to fear the citizens, not the other way around...

  • by wbr1 ( 2538558 ) on Sunday December 13, 2015 @10:30AM (#51109679)
    This is potentially good for an obfuscated messaging service, not an encrypted internet proxy for all traffic.
    • The effectiveness will depend on the dummy data being sent. If they use sentences like "The chicken is in the coop", it might be easy to filter out.

      • If they really need something that can't be easily identified as fake, I'm sure they can use markov chains are an important part of any consideration when the weather has started to darken.

        • That should be easy to defeat even with fairly shallow parsing methods, and even easier with semantic techniques.

      • The article, though not as clear as it maybe should have been, clearly states that all traffic is encrypted using asymmetric encryption between the users, and I would also infer from the setup, further encrypted between the end-user and the server (it mentions that all users know each other public keys as well as the service's public key, thus implying asymmetric encryption). Therefore, the fake traffic need not be particularly realistic, as long as the overall length of the unencrypted traffic somewhat r
      • Does it look encrypted?

    • This is potentially good for an obfuscated messaging service, not an encrypted internet proxy for all traffic.

      Kind of how I feel about bitcoin...

  • by Anonymous Coward

    I wonder what % of Tor servers are compromised. I abandoned Tor when I realised it didn't mix in junk traffic like this, as traffic analysis through compromised nodes/routers is such an obvious vulnerability that it seems to render Tor worthless.

    • by KGIII ( 973947 )

      Tor has always been subject to snooping if you leave the Tor network. So long as you remain on the .onion network it is assumed that it is still safe.

  • by Anonymous Coward

    I was talking to my Google-employee brother the other day and voicing my prediction that 'virtual camouflage' would become a defense against data mining and spying, similar to as described in the article. He thought the idea was ridiculous, and even if it were to come to pass, would be defeated by statistical means. Regardless, secure p2p communication is an arms race, and the virtual environment closely resembles nature in unexpected ways.

    • by Lumpy ( 12016 )

      His prediction is horribly out of date, This technique has been in use for decades.

  • MIT was once the number one non-profit Department of Defence contractor in the nation. Don't know how much funding they get these days but it certainly seems as though this solution is provided to you by and for the U.S. Government.

    • Re: No thanks. (Score:1, Insightful)

      by Anonymous Coward

      Stop spreading suspicion and if the system can fail show how.

    • Re:No thanks. (Score:5, Interesting)

      by KGIII ( 973947 ) <uninvolved@outlook.com> on Sunday December 13, 2015 @12:11PM (#51109993) Journal

      Disclosure: MIT is my alma mater and I am biased. I have also served in the military and I have worked with DoD as a civilian.

      Now, some folks here are aware that I dealt with traffic modeling. Some of *my* research was paid for by the Department of Defense. (You'd be kind of silly to not understand the value of improving traffic throughput in a crisis. There are also benefits to optimized traffic in and on military facilities, both vehicular and pedestrian)

      I can not speak for this department nor for this research. I can, however, say that the DoD had absolutely no influence on my research. No, not one little bit. They wanted regular reports to see that they were getting a bit of work for their money. They did not control, direct, or hinder the research in any way other than the funding. They never exerted any control, never stopped me from publishing, nor did they come in and spy on the project.

      I can't say what has happened here but, honestly, I think you're drunk. How would the DoD benefit from this? Given that it is MIT, I'm quite sure you can see the source. Rather than speculate, give us a good reason to believe you other than a "hunch" or similar.

      • I think what I was trying to get at is large Universities are closely tied with various government entities through grant funding and if one of those Universities, say, figures out how to compromise Tor *cough*Carnegie Melon*cough* or any other piece of tech it's reasonable to assume that ANY entity in any branch of government could "request" that information.

        I'm not saying they influence research. I'm saying that it's reasonable to assume they are fully briefed on it. Including, but not limited to, how

        • by KGIII ( 973947 )

          Well, if they paid for the research or even helped to fund it then they've a right to the results of that research so yeah? If there are any flaws then they'd be privy to them, as would anyone else with access to the research. Knowing MIT? They'll want more "funding" if they want to get the flaws researched. Those guys are always, and I mean always, wanting me to give them more money.

  • This is just like in Neal Stephenson's novel Anathem. Except when the system became fragile, the noise was mixed with the signal so most communications became worthless.

  • by Anonymous Coward

    Any bozo could write random garbage and waste bandwidth. Write something that can split encrypted data at the client through multiple nodes and recombine encrypted packets at the server. And make it an IP level protocol! Idiots!

  • by Anonymous Coward

    i wash my hands with a firehose

  • by Megahard ( 1053072 ) on Sunday December 13, 2015 @11:50AM (#51109903)

    So they're just tooting their own horn.

  • If this is designed to flood a network with junk data to conceal the relevant data, could this be interpreted as a form of a denial of service attack if it decreases network performance?
  • by leftover ( 210560 ) on Sunday December 13, 2015 @12:23PM (#51110053) Homepage

    I see this as the proverbial "big stick" to push back against the conglomeration of TLAs and communication oligarchies.
    "You don't want strong encryption? Then we will do this!"

  • Generating random message traffic to thwart message analysis and hide true communications is an old trick. It's really a form of steganography, just not a very efficient one. By participating in one of these networks, you draw suspicion.

    People who really want to communicate clandestinely probably just use public forums and image sharing sites as digital dead drops for steganographically hidden messages. There are many steganograhic systems for a medium of your choice, many of them even auditable and open so

  • by fahrbot-bot ( 874524 ) on Sunday December 13, 2015 @12:41PM (#51110119)

    Just get Netflix, Amazon, Hulu, etc... to stand up Tor exit nodes. Chum the pipeline with things like Gigli and The Last Airbender and let the NSA filter through all that. Maybe they'll just kill themselves - I know I would.

    • Netflix, Amazon, and Hulu are owned and controlled by The Man.

      Though Bezos does seem more like an OTO initiate than a mainstream fucker.

  • by ctrl-alt-canc ( 977108 ) on Sunday December 13, 2015 @12:53PM (#51110163)
    > pollutes the network with dummy data
    probably not so different from internet as we know it, isn't it ?!?
  • Who's talking to *whom*.
  • It's a perfect name for it, regardless if it works. Tells you exactly what it does... "WHAT??? WHAT?!?!?! FUCKING VUVUZELAS!!!" https://www.youtube.com/watch?... [youtube.com]
  • by Anonymous Coward
    Source code available here: https://github.com/davidlazar/... [github.com]
  • That system seems to require a lot of random data. What is the plan to gave good enough entropy sources so that it is not broken by being predictable?

A committee takes root and grows, it flowers, wilts and dies, scattering the seed from which other committees will bloom. -- Parkinson

Working...