pow(n00b, 3):
> On Tuesday, January 7, 2014 4:20:57 PM UTC, Axon wrote:
>>
>> Alex Dubois:
>>>
>>> On Tuesday, 7 January 2014 03:52:54 UTC, Axon wrote:
>>>> But there are other ways to identify someone as a Qubes users which
>>>> doesn't entail the discovery of his/her physical location. For example,
>>>> an attacker who compromises an AnonVM can learn that it belongs to a
>>>> Qubes user without learning that user's physical location.
>>
>>>> I think this is not correct if the user use a tor VM (Assuming the
>> netvm
>>> is not compromized) as any outbound packet will go via tor and be
>>> anonymized.
>>
>> The packets will go through the torvm, but those packets can contain
>> information which indicates that they're coming from a Qubes AppVM. This
>> was in the previous thread about the TorVM itself. IIRC, things like the
>> internal IP address, possibly machine description attributes, etc.
>> Things that would identify you as *a* Qubes user. This would diminish
>> but not destroy anonymity.
>>
>>
>>
> These same things may also be used to fingerprint unique Qubes users too.
Some (not all) of them *can* be, if you don't take appropriate
precautions, but the appropriate precautions are not difficult to take
(see below).
> For example, screen size, IP, MAC, browser/kernel version, installed
> packages etc.
Screen resolution: Sure, this could be used for fingerprinting, but it's
rarely unique.
Internal IP: IIRC, this is assigned automatically by Qubes, so I don't
see how this would allow an attacker to fingerprint a *unique* Qubes
user. (Care to explain?)
External IP: The attacker can't learn this by compromising *only* the
AnonVM. That's the point of having a transparent Tor ProxyVM (aka TorVM).
MAC: Again, protecting this is the point of the TorVM.
Browser version: This is easily solved by using Tor Browser in your
AnonVM(s), which you should certainly do if you care about this.
Kernel version: Definitely not unique, right?
Installed packages: This is easily solved by having a dedicated
TemplateVM(s) for your AnonVM(s), which you should certainly do if you
care about this.
> I am against using a TorVM until Qubes has a standard a
> standalone/template VM just for Tor, like Whonix
For the reasons I gave above, I don't think any of the things you
mentioned are good reasons to refrain from using a TorVM right now,
unless you have some pretty unusual anonymity requirements. You can set
up an appropriate AnonVM yourself right now with little effort by
following the guidelines above and in the TorVM documentation.[1]
[1]
http://wiki.qubes-os.org/trac/wiki/UserDoc/TorVM