Announcements:

I am currently writing at Computelogy.com actively and that's why i sort of abandoned my own tech blog. Since i am too busy to be taking care of both sides, i guess this blog will go into hibernation for a very very long time. Regrettable, but then it's hard to come up with new posts & stuffs.

So once again, i am now writing actively at Computelogy. Feel free to visit there and enjoy our latest articles and posts!

November 13, 2008

Online Threats: Traffic Analysis


I dedicate this post to Softgeeek, who is the perfect online mentor and had previously assisted me in understanding lots of computelogical stuffs, especially on very sparse technical knowledge. A million thanks for making me realize that we are never 100% secure when we use the internet for data sending, unless we find a way to cure the problem permanently.

Even though i know most of you are not that paranoid till a state that you might want to block/deter anyone interested in analyzing your network's traffic, it is still a pretty useful knowledge. To confess in you, i did not use the knowledge i obtained in this particular field, because firstly, i am still a networking noob, and secondly, the process is pretty unnecessary for home users; as far as i know, only military officers will apply this kinda stuffs at large in their daily jobs, notably the US Military Defense Department & possibly, the CIA.

In computering knowledge, traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communications. It can be utilized even when you have encrypted the contents of your data over the network and thus, is a really serious privacy issue. I predict that 95% of the world today did not even know the existence of this threat, or the risk it possess.

As cynical as i have been in discussing this topic, of course, there are methods to at least reduce the damage it might bring, though not eradicating the problem entirely. That method's idea is to make yourself anonymous over the internet, and to achieve that feat, there are two ways. The first, more difficult way to keep yourself anonymous over the web is through the modification of proxy or internet protocol (IP) address by means of manual configuration. The second, more easy-going method is to modify your proxy or IP address by means of software such as Steganos's Virtual Anonym. Which leads us to another important element in maintaining anonymity on the web- the concept of Onion Routing.

The paragraph below is Softgeeek's word-by-word tutorial on Onion Routing:

Onion Routing is a technique which helps you to be anonymous during the conversation/communication over a computer network. Communication are repeatedly encrypted and then sent through several network nodes called Onion Router. Each Onion Router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the communication.

If you look at the picture, you can fairly understand the encryption of communication in such a network.

One software which utilizes the concept of Onion Routing is called Tor. Tor is a free software implementation of second-generation Onion Routing. It has been sponsored by US Naval Research Laboratory in the past. Tor became an Electronic Frontier Foundation (EFF) project in late 2004, and the EFF supported Tor financially until November 2005; now the entire project is being developed by the Tor Project Team since December 2006.

I'll stop at here, hoping that the information i gave you is ample enough to comprehend as a home user. If you would like to know more by doing your research on Tor (the Onion Router), you can visit their home page by clicking the link here.

To learn more about Steganos Internet Anonym, the online anonymity software, visit their official website by clicking here. Anyone wishing to download the software and use it can contact me for serial keys (required to activate the product).

1 opinion:

COMPUTELOGY 11/14/2008 2:19 PM  

I am happy. Continue your work. If you want to write about something, never think that it is simple and everybody know about it. Just write. There will 1000s who do not know. Right?

Review Digital Plexus

I do not know how well this blog is doing unless there are feedbacks. Please do leave a review or two with us on how you think about Digital Plexus, its authors or the qualities of the posts. Good and bad comments are all welcomed, but please avoid posting rude/obscene comments that are not helpful to any of us working on this blog:

Disclaimer:

This blog is dedicated for the benefits of those who seeks experiences, knowledge or information in the computer, IT news, technology and software & hardware area. Digital Plexus cannot control how readers use the information, including any fraudulent conducts, illegal activities or deeds as regard by the law. Therefore, Digital Plexus & its authors shall not be liable to any damages caused by readers who misuse the information provided.

Digital Plexus utilizes information from many sources, including personal experiences of authors. Digital Plexus will never claim credits or ownership rights regarding the information it used in the blog, except for the raw articles posted on the blog - those are original materials written by the authors of Digital Plexus itself after the compilation of various information and/or experiences.

Followers

  © Blogger templates 'Neuronic' by Ourblogtemplates.com 2008

Back to TOP