Help - Search - Members - Calendar
Full Version: Does SSL (using HTTPS://) actively reduce your anonymity?
HTMLHelp Forums > General Interest > Off Topic
Professor_99
Does SSL (using HTTPS://) actively reduce your anonymity?

First, let me say that I understand that SSL is not a technology for anonymity. My question is does it actively destroy your anonymity?

The way I understand it is that basically your browser and the HTTPS site exchange PUBLIC KEYS and use them to encrypt traffic between each other.

My question is, what PUBLIC KEYS am I sending? Is it randomly generated each time or is my PUBLIC KEY stored on my system that is always used when going to an HTTPS site?

The anonymity concern I have is the following process:

1. On 1/1/15 I visit HTTPS:Google.com, For simple purposes lets say my PUBLIC KEY is "101" and I am using my own ISP.com to connect to the internet. Google.com at this time could easily have a database to record those three pieces of information (1/1/15 12:00am, 101, ISP.com)

2. On 1/2/15 I am using some sort of proxy to protect my anonymity. I visit HTTPS:Google.com. My PUBLIC KEY is still "101" and now it shows PROXY.com as my connection. Google records (1/2/15 12:00am, 101,PROXY.com)

As you can see.. If my PUBLIC KEY is a static value, Google could use it to identify me by searching for that PUBLIC KEY and listing all used ISPs. If it is a static value across all sites I visit, it is even more destructive to anonymity.

Am I not understanding this correctly?

Thanks.
pandy
Not my forte, this, but if I've got it half right the browser creates a session key that's only used for that session. But don't trust my word for it. As said, not my thing.
Christian J
I don't know either, but there are many other ways to identify a browser (even if cookies are disabled and the IP changes), see e.g. https://panopticlick.eff.org/ and https://panopticlick.eff.org/browser-uniqueness.pdf
Professor_99
Thanks Pandy... I was missing the term "Session Key".

Now I understand how it works, and no it does not hurt anonymity.

Public/Private encryption uses asymmetric keys, and these keys have to be fairly large for strong encryption (1024 bit is the minimum recommended).. The larger the key, the more processing is needed to do encryption.

Public/Private keys are useful because you can share the public key with anyone and yet only the private key can decrypt the data.

Symmetric keys are single keys that can be used to both encrypt and decrypt data. They have the advantage of being small (strong encrypting possible at 128 or 256 bits) but disadvantaged that anyone that knows them can both encrypt and decrypt the message.

SSL uses both asymmetric and symmetric methods to encrypt traffic.

1. The HTTPS Server sends a copy of its asymmetric public key to my browser.

2. My Browser creates a symmetric session key (random and created for just this one session) and encrypts it with the server’s asymmetric public key and sends it to the Server.

3. Server decrypts the asymmetric public key with its asymmetric private key to get the symmetric session key.

4. Server and Browser now encrypt and decrypt all transmitted data with the symmetric session key. This allows for a secure channel because only the browser and the server know the symmetric session key, and the session key is only used for that session. If the browser was to connect to the same server the next day, a new session key would be created.

So in that way my session key is not useful to track me, as it is randomly generated per session.
pandy
Just for the reference, I googled a little and found this page almost understandable.
https://www.digicert.com/ssl-cryptography.htm
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Invision Power Board © 2001-2024 Invision Power Services, Inc.