In this month's (April 2008) PC Magazine (print edition), John Dvorák discusses the
quest for anonymous surfing. The best, if not only, viable such product so far is a
freebie available at www.torproject.org. One of the biggest reasons
for that success is P2P file sharing, though the overview never mentions it.The possibility of the RIAA
tracking and prosecuting you for downloading that old Fats Domino song is nil. But wait. Here's Dvorak ..
|
“
|
|
The system's architecture requires volunteers around the world to be
relays and exit ports, for what amounts to a virtualized data wormhole
based on something called onion routing. The problem is that ... some
of the exit ports are actually gummint servers, and the traffic coming
out of the wormhole can be monitored and captured.
A black hat initiative is underway that may introduce a totally new
scheme to protect Tor users. The idea is to take a page from spammers
and create a botnet of zombies (computers that have been compromised
with backdoors and Trojans), and not turn them into spam servers, but
into unwitting relay and exit ports for Tor users. It's genius.
|
” |
|