Author

Topic: DPI (Read 2036 times)

full member
Activity: 182
Merit: 100
DPI
December 08, 2012, 09:20:29 AM
#14
Quote
Personally I removed all ca's from my browser and only trust certificates I add manually.
I am using certpatrol in FF instead, but with google's services it's useless. They has so many different certificates...

Yha, there are some services that will simply not work when removing ca's or at least not within reason, they have to meany or dynamic certs (google being one of them idd). I just have a unsafe os setup to use those and keep things separated.

IPv6 should support IPSec natively, I am not an expert of crypto stuff, but to me it seems strong enough to prevent DPI. We should just use it.

It has the same issue, what certificate to trust ? Only if you manually add a certificate that you personally trust is it secure, any exciting type of dynamic/automated distribution creates holes.
legendary
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
December 08, 2012, 09:17:36 AM
#13
In the soon to be released CIYAM open source project all sensitive content is encrypted over plain HTTP that is injected dynamically (think AJAX).

With the page calling for the injection being able to be formatted any way you like it should be very hard to determine what is going on unless they also plan to ban all dynamic HTML injection.
hero member
Activity: 501
Merit: 500
December 08, 2012, 09:16:03 AM
#12
IPv6 should support IPSec natively, I am not an expert of crypto stuff, but to me it seems strong enough to prevent DPI. We should just use it.
hero member
Activity: 482
Merit: 502
December 08, 2012, 09:10:27 AM
#11
Quote
Personally I removed all ca's from my browser and only trust certificates I add manually.
I am using certpatrol in FF instead, but with google's services it's useless. They has so many different certificates...
full member
Activity: 182
Merit: 100
December 08, 2012, 07:58:03 AM
#10

Then again you can't deep packet inspect an encrypted packet.


Of course you can.  DPI hardware has the capability to decrypt using phony certificates and then reencrypt.  You wouldn't even notice it happening, unless you have a browser extension that flagged those phony certs.  They have been doing this for YEARS already.

+1

SSL has become a joke and this will just hollow it out even further. Playing man in the middle was already easy for isp's, cloadflare was a nice beta test to scale this up and to get around specific tools that warned about possible false certificates.

More Info: http://perspectives-project.org/

Personally I removed all ca's from my browser and only trust certificates I add manually.
newbie
Activity: 56
Merit: 0
December 08, 2012, 03:31:18 AM
#9

Then again you can't deep packet inspect an encrypted packet.


Of course you can.  DPI hardware has the capability to decrypt using phony certificates and then reencrypt.  You wouldn't even notice it happening, unless you have a browser extension that flagged those phony certs.  They have been doing this for YEARS already.
member
Activity: 83
Merit: 10
December 08, 2012, 02:29:56 AM
#8
No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli



Next will come steganographic streaming algorithms that look like mpeg but carry unidentifiable encrypted data.

casascius,

I'm not sure this would be feasible, how much data do you need to hide current blockchain inside it?

spiccioli


of course it's feasible. the point is that governments cannot stop the free flow of information no matter how hard they try. we will always find ways to route around the damage they try to cause.
legendary
Activity: 1379
Merit: 1003
nec sine labore
December 07, 2012, 03:28:05 PM
#7
No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli



Next will come steganographic streaming algorithms that look like mpeg but carry unidentifiable encrypted data.

casascius,

I'm not sure this would be feasible, how much data do you need to hide current blockchain inside it?

spiccioli
vip
Activity: 1386
Merit: 1140
The Casascius 1oz 10BTC Silver Round (w/ Gold B)
December 07, 2012, 02:45:08 PM
#6
No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli



Next will come steganographic streaming algorithms that look like mpeg but carry unidentifiable encrypted data.
legendary
Activity: 1379
Merit: 1003
nec sine labore
December 07, 2012, 02:42:36 PM
#5
No I am sure on that.

Death&Taxes,

next step will be stopping every packet that cannot be deeply inspected ...

spiccioli

member
Activity: 83
Merit: 10
December 07, 2012, 10:47:28 AM
#4
If this goes on, internet gonna be renamed as in-TOR-net.
donator
Activity: 1218
Merit: 1079
Gerald Davis
December 06, 2012, 06:54:33 PM
#3
No I am sure on that.
donator
Activity: 1218
Merit: 1079
Gerald Davis
December 06, 2012, 05:49:24 PM
#2
Govts control ... that is what they do ... that is all they do.

Then again you can't deep packet inspect an encrypted packet.

Deep Packest Inspector "Hmm I deeply know this packet is still encrypted".
legendary
Activity: 1288
Merit: 1043
:^)
December 06, 2012, 05:28:16 PM
#1
"."
Jump to: