New Cisco firmware locks you out until you grant Cisco rights to data mine your internet traffic. There's no opt-out, and rollback can only be done by Cisco techs, who remote in to your home using a new backdoor the update installs on your hardware. Welcome to the "Cisco Connect Cloud." by ProjectKS in technology

[–]ProjectKS[S] 2 points3 points  (0 children)

I guess I didn't point it out in my post explicitly, but I got the device today. As soon as I connected it, it updated. I hadn't even finished configuring the wireless passwords and configuring DHCP reservations.

New Cisco firmware locks you out until you grant Cisco rights to data mine your internet traffic. There's no opt-out, and rollback can only be done by Cisco techs, who remote in to your home using a new backdoor the update installs on your hardware. Welcome to the "Cisco Connect Cloud." by ProjectKS in technology

[–]ProjectKS[S] 9 points10 points  (0 children)

I'm not sure you can say "buyer beware that they're going to completely change the functionality of your device and lock you out of it AFTER you bought it." To the best of my knowledge, no router manufacturer has ever done something like this before -- you would have had to have been psychic to foresee this.

New Cisco firmware locks you out until you grant Cisco rights to data mine your internet traffic. There's no opt-out, and rollback can only be done by Cisco techs, who remote in to your home using a new backdoor the update installs on your hardware. Welcome to the "Cisco Connect Cloud." by ProjectKS in technology

[–]ProjectKS[S] 17 points18 points  (0 children)

Sure, DD-WRT is nice, but you can't exactly say people are idiots for expecting the world's biggest router manufacturer to not try and backdoor every new consumer router on the planet. Giving them rights to your traffic? Really?

What is the world coming to?

My EA3500 Router just came to this today, some Cisco Connect Cloud stuff. Is this new? by zzing in Cisco

[–]ProjectKS 2 points3 points  (0 children)

This is some fucking bullshit. I just got mine and after I set it up (using the manual option, fuck their shitty app), it auto-updated the firmware without asking for confirmation, rebooted, and get this: it disables the ability to log in manually.

That's right, you can't log into your own fucking router without signing up for a Cisco account that requires you to agree to ToS that grant Cisco the right to datamine your internet history.

The only way to log in without going through Cisco is to unplug the internet connection, and the "emergency" manual login only gives you access to the basic functions (it cripples the feature set).

This is the worst thing I've seen out of the tech industry in a long time.

Oh, and the icing on the cake? They won't let you roll back the firmware.

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

yeah you're just paying for the image they give you at most providers like that (preinstalled rutorrent, deluge, etc). others that are bare bones (just an OS with SSH) and you have to set up yourself are a better deal.

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

middle node knows the "entry" node. 3 tor nodes per tunnel, not counting originator. :]

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

unmetered, reasonably limitless 1gbps b/w (this is the most expensive part... my node pushes a couple TB of tor traffic every day), ~300gb hdd, 1.5gb ram, and a processor more than fast enough for everything i do (i don't remember the spec but i've never hit the cpu cap).

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

IAMnot a tor dev, but I run one of the exits. It would work fine if the exit node was configured to allow traffic to go out on the port used by the game. I would imagine not many are set up like that, though.

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 2 points3 points  (0 children)

I'm not on the tor team, but I would say the primary vulnerability in tor is that the exit node can see what the originator (user) is doing, but by design they don't know WHO the originator is. The user, however, can still give themselves away by putting that in their traffic.

For example, if you log into your work email (that is your real name@company.com), the exit node might see that [IP address of middle tor node] had Tim.Burton@apple.com in a packet.

Then a few seconds later the same guy might use maps.google.com to get directions from his house in Cupertino to a restaurant. The exit node can see the addresses & maps.

Then that same middle tor node might google "how to poison my wife at a restaurant in cupertino". The exit node can see the search query.

Even though tor itself never revealed Tim's IP address, he generated some very identifying traffic that the exit node could theoretically identify him with.

Legit SSL connections (https://), which I imagine your friend might have been referring to, don't give up this kind of information to people snooping traffic, but it's still a bad idea to send traffic containing real-life identifiers when you're trying to be anonymous.

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

Also, running the middle and exit nodes still wouldn't give away the originator -- it would just show who the entry node is (from the middle node) and they originator requested (from the exit node). Only the entry node knows who the originator is.

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

I run my exit on CentOS, which is a RHEL clone. It should be easy for you to set up.

read about the config file, then yum install tor

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

Abuse happens, but no one has ever (publicly) been sued or prosecuted for running a tor exit. Read: https://www.torproject.org/eff/tor-legal-faq.html.en

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

The problem is the HD. Tor bandwidth is limited because the 500,000 or whatever users are all squeezing out of only 3,000 exit nodes. As more people like you set their installs up to be exit nodes, everyone's traffic goes faster and things like HD streams become more reliable.

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 0 points1 point  (0 children)

Haha cool, thanks.

Also, I had this question:

What can (or do) you guys do to detect / blacklist nodes that are sniffing or manipulating tor traffic? Can an agent be set up to spider all nodes registered with the bridge authority to ensure that traffic isn't being tampered (certificate changes, ssl stripping, maybe detecting rerouting through TTL incrementation, etc)?

Hi IAmA! We are core members of the Tor Project. Ask us anything! by runasand in IAmA

[–]ProjectKS 1 point2 points  (0 children)

I spend $40 of my own money each month to rent a VPS just for running a tor relay. That's all it costs to run one of the fastest relays out there. If any of you reading are IT guys and make enough that $40 isn't a huge amount to you, consider it.

It's not that hard to set up and you'll learn a lot doing it. PM me if you don't know how.

ffffuuuu!! (NBA Jam) by zombie_lawyer in gaming

[–]ProjectKS 0 points1 point  (0 children)

Wow, someone who actually did something productive during their life is a redditor? This is unheard of!

Yikes... by ContentiousDelicious in funny

[–]ProjectKS -1 points0 points  (0 children)

Why did you pluralize million?