at the moment the voice is on TCP. that wouldn't work too well on a tor network where there's a random path taken for each packet. its good for data but for real time voice its going to be terrible and end up with a lot of latency and jitter.zzm9980 wrote:rajagainstthemachine wrote:. I was surprised to know that there is voice over TOR as well -> https://guardianproject.info/2012/12/10/voice-over-tor/ pretty cool but it appears to be still at nascent stages.. i happened to chance upon it while reading about security threats that could impact a SBC.
I can't ever imagine that working too well, unless it is more of a 'walkie talkie' mode like voice memos in WeChat or Whatsapp.
SINGAPORE EXPATS FORUM
Singapore Expat Forum and Message Board for Expats in Singapore & Expatriates Relocating to Singapore
Deep Web Dark Web etc..
- rajagainstthemachine
- Manager
- Posts: 2856
- Joined: Sat, 24 Nov 2012 10:45 am
- Location: Singapore
Re: Deep Web Dark Web etc..
To get there early is on time and showing up on time is late
Re: Deep Web Dark Web etc..
Even UDP will suck over tor for real time voice given the latency. Best to record messages and send.rajagainstthemachine wrote:at the moment the voice is on TCP. that wouldn't work too well on a tor network where there's a random path taken for each packet. its good for data but for real time voice its going to be terrible and end up with a lot of latency and jitter.zzm9980 wrote:rajagainstthemachine wrote:. I was surprised to know that there is voice over TOR as well -> https://guardianproject.info/2012/12/10/voice-over-tor/ pretty cool but it appears to be still at nascent stages.. i happened to chance upon it while reading about security threats that could impact a SBC.
I can't ever imagine that working too well, unless it is more of a 'walkie talkie' mode like voice memos in WeChat or Whatsapp.
Re: Deep Web Dark Web etc..
I read about some cases where they just matched the activities (anonymous) inside TOR with the open network activities. If the frequency and duration was sufficient, they were able to find a pattern. E.g. someone of the interest was doing something inside TOR and this followed timing of the traffic coming from IPs belonging to a specific machine/location. May sound like looking for a needle in a haystack but I guess if one is determined, it's mostly a matter of time.zzm9980 wrote:The point of the hidden service is that the traffic never leaves the network, so even if the entry node is owned it shouldn't know what hidden service you're accessing.
A lot of the FBI's efforts have been to find flaws in the hidden service which expose its real IP, or try client side exploits. Easy since so many people using TOR are using known application stacks that aren't (or weren't previously) updated as frequently.
Re: Deep Web Dark Web etc..
I've always wondered if typing cadence can be recorded with a password i.e it's not just the password itself that has to match but also the flow of the typing, its probably difficult to maintain the same cadence in milliseconds but if we quantize it in 100, 250, 500ms blocks it should afford a certain degree of fudginess. If nothing else it just lengthens the password by embedding this extra data before hashing, but it does not strengthen the encryption algo itself.
x9200 wrote:I believe it requires a lot of more effort to stay anonymous than just by using TOR. People don't even think about it. The authorities have access to the whole infrastructure so it may be enough to monitoring in/out from the TOR nodes to find somebody if sufficiently determined.zzm9980 wrote:"Deep dark web" or whatever is a non technical gibberish made up by the media. Although non-indexed sites and even sites with just IP (no domain) exist, that's not what this generally refers to.
What they're talking about are TOR hidden services. These are sites you can't just hit by IP unless you're coming over the TOR network and using a specific TOR-only address (.onion). Access to TOR hidden services are generally anonymous if the appropriate safeguards are taken, and not traceable. That said, US FBI, NSA, etc are getting really good at de-anonymizing the traffic. If you're doing something illegal enough that you'd be in their crosshairs, I wouldn't rely solely on it. (and if you are, google for the grugq's "opsec for hackers" paper to get some practical advice).
I think I read recently the way one types on the keyboard (timing-wise, or other) is also being used. Interesting stuff.
Re: Deep Web Dark Web etc..
I would expect the password needs to be sufficiently long for something like this to be possible. Besides, I think there must be heaps of differences depending on the keyboards (key mapping, dimensions, key response times etc.) that would need to be addressed somehow unless the password is for a specific, physical machine.Sporkin wrote:I've always wondered if typing cadence can be recorded with a password i.e it's not just the password itself that has to match but also the flow of the typing, its probably difficult to maintain the same cadence in milliseconds but if we quantize it in 100, 250, 500ms blocks it should afford a certain degree of fudginess. If nothing else it just lengthens the password by embedding this extra data before hashing, but it does not strengthen the encryption algo itself.
Re: Deep Web Dark Web etc..
True i was thinking only on QWERTY keyboards, the cadence would change immensely if say you were using your mobile for input. I suppose you could always use a biometeric anal probe if you wanted that nth degree of security....
x9200 wrote:I would expect the password needs to be sufficiently long for something like this to be possible. Besides, I think there must be heaps of differences depending on the keyboards (key mapping, dimensions, key response times etc.) that would need to be addressed somehow unless the password is for a specific, physical machine.Sporkin wrote:I've always wondered if typing cadence can be recorded with a password i.e it's not just the password itself that has to match but also the flow of the typing, its probably difficult to maintain the same cadence in milliseconds but if we quantize it in 100, 250, 500ms blocks it should afford a certain degree of fudginess. If nothing else it just lengthens the password by embedding this extra data before hashing, but it does not strengthen the encryption algo itself.
- rajagainstthemachine
- Manager
- Posts: 2856
- Joined: Sat, 24 Nov 2012 10:45 am
- Location: Singapore
Re: Deep Web Dark Web etc..
one could do what sporkin stated with an analog telephone and simulate dtmf pulses, back in the day people actually used to lock the keypad on a telephone in India lol
eg image below

you didnt need the rotary dial or for that matter pulse dialing to initiate an outbound call from that telephone, you just needed to go off hook and presh the hookflash with a certain frequency of your hand that matched the digit outpulsing.
eg image below
you didnt need the rotary dial or for that matter pulse dialing to initiate an outbound call from that telephone, you just needed to go off hook and presh the hookflash with a certain frequency of your hand that matched the digit outpulsing.

To get there early is on time and showing up on time is late
Re: Deep Web Dark Web etc..
That used to work on payphones in the US, too, many, many years ago.rajagainstthemachine wrote:one could do what sporkin stated with an analog telephone and simulate dtmf pulses, back in the day people actually used to lock the keypad on a telephone in India lol
eg image below
you didnt need the rotary dial or for that matter pulse dialing to initiate an outbound call from that telephone, you just needed to go off hook and presh the hookflash with a certain frequency of your hand that matched the digit outpulsing.
Re: Deep Web Dark Web etc..
It was called freaking or something like that wasn't it?
Sent from my C6903 using Tapatalk
Sent from my C6903 using Tapatalk
- nakatago
- Moderator
- Posts: 8363
- Joined: Tue, 01 Sep 2009 11:23 pm
- Location: Sister Margaret’s School for Wayward Children
Re: Deep Web Dark Web etc..
https://en.wikipedia.org/wiki/PhreakingSporkin wrote:It was called freaking or something like that wasn't it?
Sent from my C6903 using Tapatalk
"A quokka is what would happen if there was an anime about kangaroos."
Re: Deep Web Dark Web etc..
I remember doing that in call boxes to save a few cents as a kid. We used to call it phone tapping. You would generally get through, but not always to the number you wanted.
-
- Similar Topics
- Replies
- Views
- Last post
-
-
Moving HKG-->SIN - Costs, mover recommendations, etc
by er2 » Tue, 15 Jan 2019 12:21 pm » in Relocating, Moving to Singapore - 1 Replies
- 3168 Views
-
Last post by caroline0929
Wed, 23 Jan 2019 12:11 pm
-
-
-
Accommodation with fitness classes like Zumba, Aerobics, etc.
by new2sipore » Mon, 13 May 2019 7:25 pm » in Relocating, Moving to Singapore - 1 Replies
- 1756 Views
-
Last post by abbby
Mon, 09 Sep 2019 9:36 pm
-
-
-
FISHING TRIP - COST ETC.
by martincymru » Mon, 29 Jul 2019 3:14 pm » in Entertainment, Leisure & Sports - 3 Replies
- 1591 Views
-
Last post by martincymru
Tue, 30 Jul 2019 3:01 pm
-
-
-
EMPLOYMENT ISSUE (SPass, EPass, Multiple IPA & etc)
by thenotsocuriousguy » Sat, 23 Nov 2019 7:05 pm » in Careers & Jobs in Singapore - 6 Replies
- 3809 Views
-
Last post by shriram4196
Wed, 10 Jun 2020 3:59 pm
-
-
-
You Tube, Twitter, Google etc.:.Censorship
by martincymru » Fri, 22 May 2020 2:18 pm » in Computer, Internet, Phone & Electronics - 2 Replies
- 1863 Views
-
Last post by sundaymorningstaple
Fri, 22 May 2020 5:30 pm
-
Who is online
Users browsing this forum: No registered users and 6 guests