Silk Road forums

Discussion => Security => Topic started by: Heyenezz on March 19, 2012, 05:23 am

Title: TAILS & Persistent Entry Guards
Post by: Heyenezz on March 19, 2012, 05:23 am
I don't fully understand what persistent entry guards are or how to use them but was told that:
Quote
Entry guards make it so if an attacker is trying to locate you they can only get as far as the entry guards you're using (unless they also control the entry guard). If you're not using persistent entry guard nodes then you may randomly select one that's controlled by the feds and has a pen register or trap and trace in effect on it. I have been told by someone that you can make amnesia use persistent entry guards if you commit your guard nodes' IP addresses to memory but that is a huge pain in the ass. I suppose the next best thing to do is use random public wifi hotspots in addition to Tor.

So, I have 3 questions:

1. How do I find my entry guard nodes' IP addresses?
2. How do I use them to keep myself secure?
3. How can I best store them? I do use an encrypted volume uploaded as an attachment to Tormail. I'm not sure whether there's a better option.

Remember, I'm using TAILS (which restricts the use of persistent entry guards) and wish to preserve plausible deniability.

Thanks for any assistance.
Title: Re: TAILS & Persistent Entry Guards
Post by: QTC on March 19, 2012, 03:25 pm
I suppose having bridge node persistence would have at least the same effect as entry guard node persistence although I have to do some more research on this. You can do this by hitting tab during the language selection menu and typing "bridge". Then just type in a bridge address into vidalia and you're good to go. You'll need to remember your bridge address though, here's one that easy to remember: 23.20.19.166:443