0  

LOOK FOR 
 Get Wired News Your Way
  Newsletters, handheld versions, alerts ...
 



Privacy Matters
Today's Headlines
11:22 a.m. July 12, 2002 PDT

Cursor Company's Conduct Cursed

A New Code for Anonymous Web Use

Get Ready for New ID Standards

High Court Rules Against Students

Supremes OK Anonymous Free Speech

Britain Halts 'Big Brother' Regs

EarthLink's Passwords Are Naked

Craig Gets Listed in Replay Suit

ReplayTV Users Sue Hollywood

Act Would OK Snail Mail Searches

Airport Face Scanner Failed

Survey: Opt-Out Is a Cop-Out

More ...
 A New Code for Anonymous Web Use
By Noah Shachtman



Print this  •  E-mail it


2:00 a.m. July 12, 2002 PDT
NEW YORK -- Peer-to-peer networks such as Morpheus and Audiogalaxy have enabled millions to trade music, movies and software freely. A group of veteran hackers is about to unveil a new peer-to-peer protocol that may eventually let millions more surf, chat and e-mail free from prying eyes.

Hacktivismo, a politically minded offshoot of the long-running hacker collective Cult of the Dead Cow, will announce the protocol -- called "Six/Four," after the June 4, 1989 massacre in Beijing's Tiananmen Square -- in a presentation Saturday at the H2K2 hacker conference in New York City.

See also:
•  The Hackers Who Ate New York City
•  Virus Girl Finds Hacker Boyfriend
•  Super-Secure Linux, Inch by Inch
•  Read more Technology news
•  Keep an eye on Privacy Matters
The group will publish the Six/Four code on its website in early August to coincide with Las Vegas' DefCon security confab.

Six/Four combines peer-to-peer technologies with virtual private networking and the "open proxy" method for masking online identities to provide ultra-anonymous Internet access.

Virtual private networks, also known as "tunnels," allow one computer to establish direct, secure communications with another over the Internet. Banks and government agencies use these VPNs all the time for money transfers and talks that they want kept quiet.

Traditional VPNs take the information along a single path from Point A to Point B. Six/Four's route is more circuitous, sending its tunnel through a series of computers on its peer-to-peer network before heading to the public Internet. Data goes from Point A to Point K to Point Z to Point G, only eventually winding up at Point B.

"It's like a highway that's redesigned for every Brinks truck that rides on it," said Oxblood Ruffin, Hacktivismo's founder.

Once this roller-coaster ride is over -- the end point is called a "trusted peer" in the Six/Four scheme -- the information then makes its way to the Web pages, chat sessions and file servers of the open Internet.

Currently, hackers and other privacy-minded folk go through "open proxies" -- misconfigured corporate servers -- to mask their identities before chatting or visiting Web pages. It's a little like snail-mailing a letter from a post office box in another state.

"Theoretically, for every server in between you and the destination server, another search warrant is required to view that computer's logs, if they still exist, to get your IP (Internet Protocol) address," said a former dot-com technology executive who's now an open-proxy devotee.

Six/Four takes this about 100 steps further by adding layer after layer of additional anonymity, because "each link in the chain only knows the link immediately before, not the final destination," said "The Mixter," the 23-year-old German hacker who authored Six/Four.

The Mixter is best known for his "Tribe FloodNet" program, which makes possible the distributed denial-of-service attacks popular with online activists.

Security experts, for the most part, are impressed with what they've seen so far of The Mixter's latest work.

"If it's implemented properly, it could be on the scope of PGP (Pretty Good Privacy)," said Chris Wysopal, of the security firm @Stake, referring to the 1990s e-mail security standard.

John Henson, chief scientist of the peer-to-peer software maker Open Cola, added, "It's at least a first crack at a working model of the next phase of the Internet -- secure communications by trusted peers over an untrusted network."

Some hackers were unimpressed, however, calling it little more than a regurgitation of long-standing programs.

1 of 2  Next  >>


Have a comment on this article? Send it.
Printing? Use this version.
E-mail this to a friend.





     » Lycos Worldwide © Copyright 2002, Lycos, Inc. All Rights Reserved.  Lycos® is a registered trademark of Carnegie Mellon University.
     About Terra Lycos | Help | Feedback | Jobs | Advertise | Business Development

     Your use of this website constitutes acceptance of the Lycos Network Privacy Policy and Terms & Conditions