Delivery-Date: Mon, 08 Feb 2016 13:52:01 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 6621C1E0AE8;
	Mon,  8 Feb 2016 13:51:55 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id DE166390E3;
	Mon,  8 Feb 2016 18:51:48 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 3B8B1390C8
 for <tor-talk@lists.torproject.org>; Mon,  8 Feb 2016 18:51:45 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 3infKThNeE4P for <tor-talk@lists.torproject.org>;
 Mon,  8 Feb 2016 18:51:45 +0000 (UTC)
Received: from pitango.safe-mail.net (pitango.safe-mail.net [212.29.227.82])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id C6721390C0
 for <tor-talk@lists.torproject.org>; Mon,  8 Feb 2016 18:51:44 +0000 (UTC)
X-Greylist: delayed 1577 seconds by postgrey-1.34 at eugeni;
 Mon, 08 Feb 2016 18:51:44 UTC
Received: by pitango.safe-mail.net with Safe-mail (Exim 4.84)
 (envelope-from <wirelesswarrior@Safe-mail.net>)
 id 1aSquR-0008G5-Dg; Mon, 08 Feb 2016 13:51:39 -0500
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=N1-0105; d=Safe-mail.net;
 b=F3p7VMJ4hLNyn+l96vOsumDfrCnEAR/7YPOK2oWrC8fkSGRW29/FPF+pHYGFEXAd
 zWDiRfdSZlXUjjh06KQ1YtLcmijioMBOUXTk1KE8dudyDoDJTkdhsTd81hpeIEMm
 NJPCg8ztYan37fXD//VY1t/OpVlsFms/RxtdozGOS7U=;
Received: from pc ([199.87.154.255]) by Safe-mail.net with https
Date: Mon, 8 Feb 2016 13:51:39 -0500
From: wirelesswarrior@Safe-mail.net
To: seanl@literati.org
X-SMType: Regular
X-SMRef: N1P-m3tG4rDdFu
Message-Id: <N1P-m3tG4rDdFu@Safe-mail.net>
MIME-Version: 1.0
X-SMSignature: HRSJl+AIHuzAPuPo/7UMUm+yOw1CUOCRzfdxMGUdMcauRQ2XCOsM1sRyK/bBxVta
 Xmyj/RDvvYfhtygRHuFWT9DkfQLv/xJWdz1f41GZ3fJ6zquH+OVrsXDmKuXlwJsD
 Ebc0PNP2bmicMCvu8RSdrAMVT2bw5k4T92mOXEWDRu0=
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Cc: cypherpunks@cpunks.org, tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Using SDR
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-------- Original Message --------
From: Sean Lynch <seanl@literati.org>
Apparently from: cypherpunks-bounces@cpunks.org
To: tor-talk@lists.torproject.org
Cc: cypherpunks@cpunks.org
Subject: Re: [tor-talk] Using SDR
Date: Sat, 06 Feb 2016 20:40:21 +0000
 

> On Fri, Feb 5, 2016 at 7:23 PM coderman <coderman@gmail.com> wrote:
> > 
> > On 2/5/16, Sean Lynch <seanl@literati.org> wrote:
> > > ... Radio is being used right now to provide anonymity, but it's being used[1]
> > > to hide endpoints similar to the duct-taped payphone trick depicted in
> > > Hackers, in order to avoid attacks like the one used to capture Ross
> > > Ulbricht without giving him a chance to wipe his computer (they snuck up
> > > behind him and pinned his arms, but they would have just rushed him had
> > > that not been possible). If you use a device like the ProxyHam and you sit
> > > somewhere where you can see it, there's a reasonable chance you'd spot
> > > someone who's trying to find you, giving you a chance to hit your panic
> > > button and escape.
> > 
> > this assumes you're keeping it under constant supervision, of course :P
> 
>  
> Indeed. Having a spotter there is probably the best solution.
> 
> Alternatively, if you aren't too clumbsy or forgetful, is to have a some sort of hidden/innocuous band tied to you and to your device (e.g., a laptop) that when pulled too hard (like a grenade pin) starts the wiping process. So if you are jumped/pinned the process starts before the attackers realize it.
>  
> > 
> >  > The older, lower-tech version of this trick is to use a high-gain antenna
> > > like the Cantenna or a Yagi to use a public wifi AP from a stealthy,
> > > defensible location. The problem with this is that this presents no
> > > challenge to RDF (radio direction finding) equipment designed for WiFi.
> > > That's the big advantage of the ProxyHam, since whoever is looking for you
> > > probably won't know in advance what frequency you're using. And solving
> > > that problem in a general way requires MUCH more expensive gear than just
> > > locating WiFi clients.
> > 
> > one of my favorite tricks, but rather rude in spectrum,
> >  is setting high power amplifier to maximum. DF tends to see this
> > signal arriving from all around...  *grin*
> > 
> > this introduces it's own trade-offs, of course.
> 
>  
> This is why you use an attenuator. I wouldn't think law enforcement DF equipment would be fooled by such a thing, since for example FCC will often be looking for people who are outputting too much power, which on the ham bands is going to be multiple kilowatts (I think they've mostly given up on CB except when it starts interfering with licensed users).
>  
> > 
> > > It MAY be possible to use SDR to achieve LPI while still remaining within
> > 
> > if you're building LPI, you don't give a fuck about the FCC (compliance).
> >  by definition, if they've found you, you fucked up!
> > 
> > +1
> > 
> 
>  
> Perhaps, but I'm not about to suggest that anyone break the law.
>  
> > 
> >  > Actually, that gives me an idea: MIMO precoding[2] (versus spatial
> > > multiplexing, which is useless for your purposes). MIMO precoding devolves
> > > to beam-forming in the absence of reflectors like buildings, but in an
> > > urban environment, you get a complex combination of signal paths,
> > >
> > > MIMO precoding requires a "training" phase where they discover one another
> > > by transmitting some easily "locked-onto" signal so that each receiver can
> > > find the other transmitter independently.
> > 
> > it is now possible for a professional's budget to accodomate the SDR
> > equipment necessary to do this type of phase sync'ed active beam
> > forming MIMO transmission, and not all methods require the training
> > phase. in fact, omission of this (by out of band training, in a sense)
> > in a method of "keying" phased delivery of UWB MIMO in a way more
> > likely to achieve LPI.
> > 
> > A related LPI method is to use a separate, well disciplined, carrier (in-band, co-located or not) that  participant devices listen to and use the sync their clocks and/or their codes. If used carefully Eve won't know about it and will find it too difficult to synch in time catch Alice and Bob's comms.
> > 
> 
>  
> How do you train out of band? By modelling the environment? That's an interesting thought, and I suspect Google Earth has enough data to be able to do it in a lot of places. Are you aware of free or inexpensive software packages for doing this?
>  
> > 
> >  synthetic aperature millimeter wave vision systems are also pushing
> > along this boundary, for cross-pollination of suitable phased sync'ed
> > UWB MIMO signal processing.
> 
>  
> Aren't you just talking phased array for something like this though? Or do you mean using phase information from the receive antennas to reconstruct the environment rather than using phasing at the transmit side to steer your beam? That's a very interesting idea since it can give you a 360 degree view with no need to steer your beam, in the same way that some blind humans can use clicks to get a picture of their entire environment. (I use humans and not bats because I think bat sonar is pretty directional, whereas human ears can localize sound quite precisely without any need to turn one's head.)
> 
> Beam stearing be accomplished much cheaper than via a phased array using nearfield plasmas to block or steer the beam. For example, a vertical cluster of flourescent tubes surrounding a simple dipole can, with proper circuitry, quickly switched so that only one of the tubes is "off" (transparent) at a time allowing incoming/outgoing signasl to only propagate in that direction. The other tubes are "on" and reflect the signals.
>  
> > 
> >  i could go on, if you're curious, but perhaps on another list? :)
> 
>  
> This is definitely an area I'm interested in, so I'd love to hear more of your ideas, as may Jeremy, so if it's beyond what is generally tolerated on this list, private email would be fine, or if you have a list in mind I'd be happy to subscribe if I'm not already. 
> 
> 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

