Yeah it was pretty safe until it got cracked by some law enforcement agency! :'( :'( >:(Not only ^^
Not only ^^
I've seen somewhere around how to crack Tor ahaha.
Anyways, it might be a good tool, but I prefer to use several proxy's or something, Proxifier, HSS, CyberGhost, so many ways...
Thanks for spreading FUD about Tor with no evidence whatsoever. These claims have been refuted over and over again. Tor is free software with several independent implementations. It's used by tens of thousands of people and the code is viewed by a number close to several hundred people. You can see yourself where you're connections go and how the encryption works. If Tor was really cracked, how do people get away with all the sketchy shit they do through it? Duh.
The encryption is cracked, it is now possible to sniff all the traffic others route throuh you if you are are TOR node, dosent mean all nodes and everyone do it. And even if they do, why would they bother reporintg people who do "sketchy" shit. They simply want usefull information.
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.
Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.
First of all. If you really need a proxy to do the activities you want to do online, you are obviously up to no good and should perhaps reconsider your actions.
But in any case. Just get a trusted VPS/VPN/Server which does not state anything about logging in their TOS(s) and is not placed in the US(depends a little where you live). And when you pay for it, use an anonymous method of payment(payments which does not require you to give up your real name/phone/address etc). I don't know if I need to write this; But don't sign up with legit information upon registration/payment.
The method described above should be more than enough for most of your activities, in case you think it is not. There is always other ways getting a hold of servers/computers.
Say a used proxy is in one of these countries. Chaining proxies would solve this problem yeah?
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? TechnicallyRead up on data mining by the NSA. Everything you do on the internet is logged and the NSA uses what is called a dragnet to search for "terrorists." The dragnet sifts through our telecom systems and looks for keywords. Keywords such as greenpeace can classify you as a potential terrorist. Due to the massive amount monitoring that they do their system generates a huge number of false hits. In the world of today everyone is a terrorist. I'm sure this paragraph that I just typed up is probably grounds for being inspected. Hence the growing reason to become "anonymous" if such a thing is really possible at all anymore.
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.
Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.
Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.
Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?
This kind of stuff has been debated over and over again, depends on the usage you want to give it.
Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.
This kind of stuff has been debated over and over again, depends on the usage you want to give it.
If you want to be anonymous towards the server(advertising, info gathering standards, etc...) you can simply use a free proxy/VPN.
If, however, you wish to be completely anonymous you have to be more careful when chosing a VPN, of course. You should just keep in mind that you never have proofs that they don't log, just because they don't specify it.
Anyhow chaining with some encryption should do it, TOR is/was a good option, before everyone learn they can sniff if they're the exit node.
Risking going against EZ new policies (I don't remember them right now), the "real deal" option is having your botnet and use them as proxys. You have access so you can make sure they aren't logging, just make them establish several connections at the same time with several external IP's, connect, again, encrypted and after you've done your stuff, spam some pings, telnets, GET's, POST's, etc...
The major ISP companys can't log all the traffic from every client, not in detail at least, maybe the number of times they use TCP connections, and so on, but that's it, otherwise after some time/size of the log will get deleted, presuming its size-related (safest option for ISP side) just spam connections for 1 day and your log will be clean.
Keep the feedback coming, it's the best way to share information!
PS: I had to re-write due to stupid proxy, I'm sorry if there's any mistakes or anything not well explained.
How about HMA Pro VPN, secure? Or not?
Is it worth it?
Although highly illegal, there's always the timeless DIY ssh tunneling & socks network. It's just as good as a private vpn + you control all of the logs at every node + you can rm any box at any time if you get scared...+ it's encrypted all the way up to the socks proxy. idk why more people don't do that...
Hi
i have a question about Tor and i thought it would be better to ask here than creating a new topic.
What do you think of this combination: One Tor node(for speed improvement) + SSL
Does it grant anonymity ? if No how technically it can be corrupted?
The SSL does little really. If your exit node is tapped you are fucked anyway. The SSL may secure the data from you to the exit node slightly tho.
Slightly? Why slightly?
I get it that if the exit node is compromised but ssl is not breakable right? I mean someone sniffing in between won't know what is sent...?
Although highly illegal, there's always the timeless DIY ssh tunneling & socks network. It's just as good as a private vpn + you control all of the logs at every node + you can rm any box at any time if you get scared...+ it's encrypted all the way up to the socks proxy. idk why more people don't do that...
Why u gravedig...
ssh tunnels are illegal?
ssh tunnels are illegal?
No they are not, but installed on servers/machines you don't own is. m0rp didn't say that's what he meant in his post, but after all..@AnarchyAngel, just wanted to clarify and build on what ande said: I did mean creating ssh tunnels/socks proxies on servers you don't own. That's really the only way that method of anonymity becomes effective.
@AnarchyAngel, just wanted to clarify and build on what ande said: I did mean creating ssh tunnels/socks proxies on servers you don't own. That's really the only way that method of anonymity becomes effective.
Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.
Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?
This kind of stuff has been debated over and over again, depends on the usage you want to give it.
Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.