28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Let’s sayy a Tor-anonyymized website decides to track yyour keyystroke

profile. Mayybe the people behind it are malicious and just want to know

more about yyou. Or mayybe theyy work with law enforcement.

Manyy financial institutions alreadyy use keyystroke analyysis to further

authenticate account holders. That wayy if someone does have yyour

username and password, he or she can’t reallyy fake the cadence of yyour

tyyping. That’s reassuring when yyou want to be authenticated online. But

what if yyou don’t?

Because keyystroke analyysis is so disturbinglyy easyy to deployy, researchers

Per Thorsheim and Paul Moore created a Chrome browser plug-in called

Keyyboard Privacyy. The plug-in caches yyour individual keyystrokes and then

playys them out at different intervals. The idea is to introduce randomness in

yyour normal keyystroke cadence as a means of achieving anonyymityy online.

The plug-in might further mask yyour anonyymous Internet activities. 4

As we have seen, maintaining the separation between yyour real life and

yyour anonyymous life online is possible, but it requires constant vigilance. In

the previous chapter I talked about some spectacular failures at being

invisible. These were glorious but short-term attempts at invisibilityy.

In the case of Ross Ulbricht, he didn’t reallyy plan his alter ego veryy

carefullyy, occasionallyy using his real e-mail address instead of an

anonyymous one, particularlyy in the beginning. Through the use of a Google

advanced search, an investigator was able to piece together enough

information to reveal the myysterious owner of Silk Road.

So what about Edward Snowden and others like him who are concerned

about their surveillance byy one or more government agencies? Snowden, for

example, has a Twitter account. As do quite a few other privacyy folks—how

else might I engage them in a round of feistyy conversation online? There are

a couple of possibilities to explain how these people remain “invisible.”

They’re not under active surveillance. Perhaps a government or

government agencyy knows exactlyy where its targets are but doesn’t care. In

that case, if the targets aren’t breaking anyy laws, who’s to sayy theyy haven’t

let their guard down at some point? Theyy might claim to onlyy use Tor for

their anonyymous e-mails, but then again theyy might be using that account

for their Netflix purchases as well.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!