EvilZone

Hacking and Security => Anonymity and Privacy => : ande March 27, 2011, 12:24:16 AM

: Tor project
: ande March 27, 2011, 12:24:16 AM
(http://www.torproject.org/images/onion.jpg)
What is Tor?
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis (http://www.torproject.org/about/overview.html.en)


Why Anonymity Matters
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.


Homepage: http://www.torproject.org/ (http://www.torproject.org/)
Download: http://www.torproject.org/download/download.html.en (http://www.torproject.org/download/download.html.en)
Firefox plugin: http://www.torproject.org/torbutton/index.html.en (http://www.torproject.org/torbutton/index.html.en) - This is a one click on/off proxy switch for firefox


Personally I don't use Tor, its to slow for my taste, and logs are always a danger. Aswell as sniffing from Tor nodes. But its a neat tool in some cases.
: Re: Tor project
: pl4f0rd March 27, 2011, 10:28:19 AM
Very true it is slow and leaves too many logs about  I think they are currently working on the speed issue.

On the plus side though You could be an exit node for the onion network,  this way you can see all the traffic and get up to all sorts of mischief, you could modify the traffic for your own gain, MITM attacks by injecting some java script to re direct to a malicious website to install malware.

I would recommend either a highly anonymous proxy or use ssh tunnel for proxy connections

Even better nowadays is the use of cellular connections, pretty hard to track as normally each time you connect they are dynamically assigned, of course the operator could tie the ip to you.  So if you think someone is tracking your activities just reconnect.
: Re: Tor project
: Rafy March 28, 2011, 03:35:41 PM
Yeah it was pretty safe until it got cracked by some law enforcement agency! :'( :'( >:(
: Re: Tor project
: I_Learning_I March 29, 2011, 01:37:51 AM
Yeah it was pretty safe until it got cracked by some law enforcement agency! :'( :'( >:(
Not only ^^
I've seen somewhere around how to crack Tor ahaha.
Anyways, it might be a good tool, but I prefer to use several proxy's or something, Proxifier, HSS, CyberGhost, so many ways...
: Re: Tor project
: gh0st March 31, 2011, 02:10:22 AM
I have to admit that I really admire the curriculum of TOR`s coders just check them out:
Roger Dingledine: http://www.freehaven.net/~arma/cv.html (http://www.freehaven.net/~arma/cv.html)
Nick Mathewson: http://www.wangafu.net/~nickm/ (http://www.wangafu.net/~nickm/)
their profesional degrees are below just scrool down till the bottom
well TOR works in others things as a tool for leakers I really like the way why was it designed I mean that it to works as a protector of leakers you know
: Re: Tor project
: xwire April 01, 2011, 06:37:48 AM
Not only ^^
I've seen somewhere around how to crack Tor ahaha.
Anyways, it might be a good tool, but I prefer to use several proxy's or something, Proxifier, HSS, CyberGhost, so many ways...

Thanks for spreading FUD about Tor with no evidence whatsoever. These claims have been refuted over and over again. Tor is free software with several independent implementations. It's used by tens of thousands of people and the code is viewed by a number close to several hundred people. You can see yourself where you're connections go and how the encryption works. If Tor was really cracked, how do people get away with all the sketchy shit they do through it? Duh.
: Re: Tor project
: ande April 01, 2011, 11:59:39 AM
Thanks for spreading FUD about Tor with no evidence whatsoever. These claims have been refuted over and over again. Tor is free software with several independent implementations. It's used by tens of thousands of people and the code is viewed by a number close to several hundred people. You can see yourself where you're connections go and how the encryption works. If Tor was really cracked, how do people get away with all the sketchy shit they do through it? Duh.

The encryption is cracked, it is now possible to sniff all the traffic others route throuh you if you are are TOR node, dosent mean all nodes and everyone do it. And even if they do, why would they bother reporintg people who do "sketchy" shit. They simply want usefull information.
: Re: Tor project
: 10n1z3d April 01, 2011, 10:15:06 PM
The encryption is cracked, it is now possible to sniff all the traffic others route throuh you if you are are TOR node, dosent mean all nodes and everyone do it. And even if they do, why would they bother reporintg people who do "sketchy" shit. They simply want usefull information.

The encryption is NOT cracked. It have always been possible to to sniff the traffic if you are tor exit node. Tor by design gives you only anonymity but it doesn't protect your data from sniffing because there is no way for tor to encrypt your traffic between the tor exit node and the target server. Unless you do it yourself by using SSL/TLS, but you still can't be protected from rogue CA's and your own stupidity.

(http://img543.imageshack.us/img543/6769/htw2.png)
: Re: Tor project
: I_Learning_I April 03, 2011, 11:04:07 AM
I won't start a debate about this without any proves, so I'll search for the post that I've seen and post back here, but if I recall correctly TOR had been cracked, not just sniffed IF you were an exit point, but cracked, perhaps the term was misapplied and it was meant to mean sniffed since most people use HTTP and not HTTPS, but still I'll check.
: Re: Tor project
: Jath April 19, 2011, 04:12:15 AM
Thank you, US Navy for giving us TOR

For anyone confused about what I'm talking about. Just take a look at the patent

http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN%2F6266704 (http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN%2F6266704)
: Re: Tor project
: easle February 22, 2012, 09:20:07 PM
Bumping topic.

As there are about 2800 relays in total (https://metrics.torproject.org/network.html (https://metrics.torproject.org/network.html)), but only some are online at a given time,

...would it be theoretically possible for a malicious person or group to make enough relays to make it probable a circuit gets formed only on his/their relays + the original client + the endpoint (or narrowing the number of third party relays to a very small number e.g. 1) making the whole "anonymizing circuit" ineffective??
: Re: Tor project
: AnTiHer0 February 23, 2012, 07:42:56 AM
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.

Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.
: Re: Tor project
: imation February 23, 2012, 10:08:50 AM
Ive been looking at Offshore VPN's... i havent found one that i honestly can say i would trust!
: Re: Tor project
: neusbeer February 23, 2012, 08:51:51 PM
2 weeks ago they had a program about Tor Network on the Dutch tv
(I'm using it a lot btw)
Was a member of Anonymous (claimed he was, couldn't tell.. he was wearing a mask :-) :P) which exposed a kiddyporn network all across Tor and they got one in jail which was dum enough to get in contact with an undercover duwd. When the meet the cops did arrest that guy :)

: Re: Tor project
: lucid February 25, 2012, 09:34:37 AM
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.

Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.

What would you suggest doing? Of course its impossible to be absolutely anonymous as it sounds like most VPNs are logged. I hear plenty on what NOT to use/do

Not that I'm an advocate for TOR I'm sure you're right about the feds.
: Re: Tor project
: ande February 25, 2012, 10:55:10 PM
First of all. If you really need a proxy to do the activities you want to do online, you are obviously up to no good and should perhaps reconsider your actions.

But in any case. Just get a trusted VPS/VPN/Server which does not state anything about logging in their TOS(s) and is not placed in the US(depends a little where you live). And when you pay for it, use an anonymous method of payment(payments which does not require you to give up your real name/phone/address etc). I don't know if I need to write this; But don't sign up with legit information upon registration/payment.

The method described above should be more than enough for most of your activities, in case you think it is not. There is always other ways getting a hold of servers/computers.
: Re: Tor project
: lucid February 26, 2012, 07:16:05 AM
First of all. If you really need a proxy to do the activities you want to do online, you are obviously up to no good and should perhaps reconsider your actions.

But in any case. Just get a trusted VPS/VPN/Server which does not state anything about logging in their TOS(s) and is not placed in the US(depends a little where you live). And when you pay for it, use an anonymous method of payment(payments which does not require you to give up your real name/phone/address etc). I don't know if I need to write this; But don't sign up with legit information upon registration/payment.

The method described above should be more than enough for most of your activities, in case you think it is not. There is always other ways getting a hold of servers/computers.


I think there is legitimate reasons to be anonymous. Of course freedom of speech "technically" still exists, however there are so many loopholes and personally I consider this country a fascist country even though we operate under the guise of "freedom." Considering that the word greenpeace can classify you as a terrorist in the NSA data mining scheme I would say that we are well on our way to an Orwellian society. So striving for anonymity is no longer only a goal for people who are "into some bad shit".

And no you don't need to write the part about not using legit information. I would hope most people wouldn't need to be told that.

Also thank you for your clear concise response as such a response has proven hard to come by.
: Re: Tor project
: ande February 27, 2012, 01:12:19 AM
Additionally, a lot of EU countries are now setting up a global backbone logging system called Data Retention Directive. This system will store the connectivity information of all your activities(IP to<->from and timestamps etc). Meaning, its very very easy to track you down if both you and your proxy server is inside Data Retention Directive countries. So keeping either yourself or your proxy server outside such countries is a rather high recommendation.

EDIT: And I am sure there are other logging systems in development, planning and whatnot in other places, so watch out :P
: Re: Tor project
: lucid February 27, 2012, 06:44:17 AM
Say a used proxy is in one of these countries. Chaining proxies would solve this problem yeah?
: Re: Tor project
: ande February 27, 2012, 12:45:10 PM
Say a used proxy is in one of these countries. Chaining proxies would solve this problem yeah?

Not if both of the proxies are in logged countries.
: Re: Tor project
: netizenx February 27, 2012, 01:45:19 PM
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically
: Re: Tor project
: ande February 28, 2012, 03:45:18 AM
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically

Sure its possible, I sure hope people will stand up. But in all honesty, I dont know.
: Re: Tor project
: lucid February 28, 2012, 05:46:34 AM
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically
Read up on data mining by the NSA. Everything you do on the internet is logged and the NSA uses what is called a dragnet to search for "terrorists." The dragnet sifts through our telecom systems and looks for keywords. Keywords such as greenpeace can classify you as a potential terrorist. Due to the massive amount monitoring that they do their system generates a huge number of false hits. In the world of today everyone is a terrorist. I'm sure this paragraph that I just typed up is probably grounds for being inspected. Hence the growing reason to become "anonymous" if such a thing is really possible at all anymore.


EDIT: At least here in the US. I have no idea about other countries, although according to ande's recent comment it sounds like its that way elsewhere
: Re: Tor project
: I_Learning_I February 28, 2012, 10:22:09 AM
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.

Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.

Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.

Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?

This kind of stuff has been debated over and over again, depends on the usage you want to give it.

Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.
: Re: Tor project
: lucid February 29, 2012, 01:03:33 AM
Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.

Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?

This kind of stuff has been debated over and over again, depends on the usage you want to give it.

Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.

Because I don't want to buy new clothes and go 100 miles away to a starbucks every time I want to search the web anonymously.

Good info though
: Re: Tor project
: I_Learning_I February 29, 2012, 11:03:05 AM
This kind of stuff has been debated over and over again, depends on the usage you want to give it.

If you want to be anonymous towards the server(advertising, info gathering standards, etc...) you can simply use a free proxy/VPN.
If, however, you wish to be completely anonymous you have to be more careful when chosing a VPN, of course. You should just keep in mind that you never have proofs that they don't log, just because they don't specify it.
Anyhow chaining with some encryption should do it, TOR is/was a good option, before everyone learn they can sniff if they're the exit node.


Risking going against EZ new policies (I don't remember them right now), the "real deal" option is having your botnet and use them as proxys. You have access so you can make sure they aren't logging, just make them establish several connections at the same time with several external IP's, connect, again, encrypted and after you've done your stuff, spam some pings, telnets, GET's, POST's, etc...
The major ISP companys can't log all the traffic from every client, not in detail at least, maybe the number of times they use TCP connections, and so on, but that's it, otherwise after some time/size of the log will get deleted, presuming its size-related (safest option for ISP side) just spam connections for 1 day and your log will be clean.

Keep the feedback coming, it's the best way to share information!

PS: I had to re-write due to stupid proxy, I'm sorry if there's any mistakes or anything not well explained.
: Re: Tor project
: lucid February 29, 2012, 09:28:02 PM
If you want to be anonymous towards the server(advertising, info gathering standards, etc...) you can simply use a free proxy/VPN.
If, however, you wish to be completely anonymous you have to be more careful when chosing a VPN, of course. You should just keep in mind that you never have proofs that they don't log, just because they don't specify it.
Anyhow chaining with some encryption should do it, TOR is/was a good option, before everyone learn they can sniff if they're the exit node.


Risking going against EZ new policies (I don't remember them right now), the "real deal" option is having your botnet and use them as proxys. You have access so you can make sure they aren't logging, just make them establish several connections at the same time with several external IP's, connect, again, encrypted and after you've done your stuff, spam some pings, telnets, GET's, POST's, etc...
The major ISP companys can't log all the traffic from every client, not in detail at least, maybe the number of times they use TCP connections, and so on, but that's it, otherwise after some time/size of the log will get deleted, presuming its size-related (safest option for ISP side) just spam connections for 1 day and your log will be clean.

Keep the feedback coming, it's the best way to share information!

PS: I had to re-write due to stupid proxy, I'm sorry if there's any mistakes or anything not well explained.

What about hiding from your smalltown ISP? Would changing the MAC address to hide from your network admin suffice?

EDIT: Also as long as you find a proxy that supports SSL then you know its encrypted and your all good right?
: Re: Tor project
: I_Learning_I March 05, 2012, 11:03:20 AM
Nope. You can't "hide" from ISP. You can communicate using PGP which means the ISP won't be able to read it. So if you're using a shared IP the only way to identify you is through MAC, so changing it would make you locally anonymous.

About SSL, if someone sniffs and records the communication or act as MiTM it's possible to decrypt it, that's PGP's advantage, the server already has an encryption and decryption method, being the decryption method private and therefor being uncrackable. Of course this is makes the communication a lot slower, but in some cases it's worth it, specially to establish the SSL key!
: Re: Tor project
: common April 01, 2012, 07:29:31 PM
Not sure what its like were you guys are, but where i stay legislation dictates that it is the account holder who is legally liable for activities such as illegal downloads, therefore no amount of mac address changing fixes that.
If they get served a notice and the activity is associated with an ip allocated to "xxx"account "xxx"is toast.
I've never found an isp that requires government issued id to open an account.

Of interest is that isp's are allowed to have copyright material etc stored in there cache's legally. So if you can keep your transactions isolated to just you n your isp your sweet.... which probably extends to the caches of other isp's linked to your isp through a local peering exchange.

Its certainly not the isp's you need to worry about its the owners of copyright materials, owners of hacked sites, and governmental organisations. (country dependent of course, as reporting requirements will vary by country)

: Re: Tor project
: Conch June 12, 2012, 12:41:11 PM
Interesting information in this thread :)

I read many years ago, that the FBI is constantly monitoring the tor protocol, whether that is true or not, I don't know. Not that it matters. It's slow as shit.

I can't really state that as a fact though as I know nothing about Tor, I actually wish I knew more about it, time to read up I think :)

I don't do any illegal activites (unless I'm bored), I use anonymous services for their main purpose, like SSH + VPN for hotspots, Bouncers for IRC, Proxies for tracker websites, etc :)
: Re: Tor project
: artymig June 16, 2012, 08:15:08 PM
How about HMA Pro VPN, secure? Or not?

Is it worth it?
: Re: Tor project
: ande July 15, 2012, 06:21:32 PM
How about HMA Pro VPN, secure? Or not?

Is it worth it?

I would say no. They are too big/commercial. You can get a much cheaper VPS or something alike and make your own VPN/Proxy.
: Re: Tor project
: Z3R0 July 16, 2012, 09:59:33 AM
Although highly illegal, there's always the timeless DIY ssh tunneling & socks network. It's just as good as a private vpn + you control all of the logs at every node + you can rm any box at any time if you get scared...+ it's encrypted all the way up to the socks proxy. idk why more people don't do that...
: Re: Tor project
: ande July 16, 2012, 01:32:52 PM
Although highly illegal, there's always the timeless DIY ssh tunneling & socks network. It's just as good as a private vpn + you control all of the logs at every node + you can rm any box at any time if you get scared...+ it's encrypted all the way up to the socks proxy. idk why more people don't do that...

Smart people already do eheh ;P
: Re: Tor project
: spark September 17, 2012, 03:18:48 AM
Hi
i have a question about Tor and i thought it would be better to ask here than creating a new topic.

What do you think of this combination: One Tor node(for speed improvement) + SSL
Does it grant anonymity ? if No how technically it can be corrupted?


: Re: Tor project
: ande September 17, 2012, 03:23:21 AM
Hi
i have a question about Tor and i thought it would be better to ask here than creating a new topic.

What do you think of this combination: One Tor node(for speed improvement) + SSL
Does it grant anonymity ? if No how technically it can be corrupted?

The SSL does little really. If your exit node is tapped you are fucked anyway. The SSL may secure the data from you to the exit node slightly tho.
: Re: Tor project
: spark September 17, 2012, 03:47:56 AM
Ok then i think i should only keep this for accessing country-specific content, hiding address and anything else than malicious activities
: Re: Tor project
: p_2001 September 17, 2012, 04:48:10 AM
The SSL does little really. If your exit node is tapped you are fucked anyway. The SSL may secure the data from you to the exit node slightly tho.

Slightly? Why slightly?
I get it that if the exit node is compromised but ssl is not breakable right? I mean someone sniffing in between won't know what is sent...?
: Re: Tor project
: lucid September 17, 2012, 08:20:35 AM
Well, there is that exploit that just came out that works on TLS. CRIME (Compression Ratio Info-Leak Made Easy). It uses malicious javascript to modify encryption requests.

Also, I'll just leave this here I think it's relevant.

https://www.networkworld.com/news/2012/091212-botnet-masters-hide-command-and-262402.html
: Re: Tor project
: ande September 17, 2012, 02:47:48 PM
Slightly? Why slightly?
I get it that if the exit node is compromised but ssl is not breakable right? I mean someone sniffing in between won't know what is sent...?

SSL is by still a secure algorithm, or uses one at least. However, there is nothing stopping someone from performing a Man-in-the-middle attack.

(http://www.pburkholder.com/sysadmin/SSL-mitm/webmitm.jpg)
: Re: Tor project
: AnarchyAngel April 18, 2013, 03:41:01 PM
Although highly illegal, there's always the timeless DIY ssh tunneling & socks network. It's just as good as a private vpn + you control all of the logs at every node + you can rm any box at any time if you get scared...+ it's encrypted all the way up to the socks proxy. idk why more people don't do that...


ssh tunnels are illegal?
: Re: Tor project
: WirelessDesert April 18, 2013, 06:14:29 PM

ssh tunnels are illegal?
Why u gravedig...
: Re: Tor project
: proxx April 18, 2013, 06:55:20 PM
Because its a reasonable question.
Also I think the statement that is questioned is multi interpretable.
SSH tunneling is not illegal at all.

: Re: Tor project
: ande April 18, 2013, 07:03:22 PM
ssh tunnels are illegal?

No they are not, but installed on servers/machines you don't own is. m0rp didn't say that's what he meant in his post, but after all.. If you install socks and make a socks network on your own machines, there is no privacy, or little at least. Depends on your intentions.
: Re: Tor project
: Z3R0 April 22, 2013, 02:40:44 PM
No they are not, but installed on servers/machines you don't own is. m0rp didn't say that's what he meant in his post, but after all..
@AnarchyAngel, just wanted to clarify and build on what ande said: I did mean creating ssh tunnels/socks proxies on servers you don't own. That's really the only way that method of anonymity becomes effective.
: Re: Tor project
: Darkvision April 26, 2013, 10:51:12 PM
@AnarchyAngel, just wanted to clarify and build on what ande said: I did mean creating ssh tunnels/socks proxies on servers you don't own. That's really the only way that method of anonymity becomes effective.


Ive never really had to hide before but i had this idea, and sure some of it can be added/subtracted speed wise.


why not purchase/rent servers in different countries through cleaned money(not going to get into a tutorial on this, im sure most of you know how to do this anyway). no trace back to you, then you can ssh tunnel/proxy from them. hell you could even set them up to try to recoup some of the cash spent(re rent them out as game servers or something) and make it look like they were "broken" into. not to mention you then fully control all those logs, and KNOW for instance that it isnt storing incriminating evidence. from their or before their you could add in vpn/proxie services, Tor, and hell carrier pidgins  Use a laptop, mask your MAC, use public/open wifi networks and finding you or proving you did something wrong should be all but impossible. That is ofc till some agency figures out a way to track you through all of that....


Anyway to me the real issue with this kind of security tends to fall flat is that unless you are REALLY REALLY breaking the law (hacking gov sites, child porn etc) you tend to be lost in all the noise, yes their is a log out their of you searching how to make home made explosives, but to my knowledge ive only ever heard of ONE instance where all this "search" history has stopped someone BEFORE a crime is committed  Besides the vast majority of this information is sold off to companys so they can make better target ad's and targeted products. To me startpage is enough in most cases to provide the extra security needed. because if what your doing is that bad, they will eventually find a way to catch you. We have all read about private proxy companys being pressured into releasing account holder information, hell a few times its even happened to the swiss banks and they would rather be nuked than reveal information. In the end their is almost always a lot of you doing something you shouldnt, and with enough resources dedicated to finding it, you will be caught.


Also and ive thought this for a long time, but i figure ill share this because i feel its relevant to some degree:
(http://i44.tinypic.com/24l0zcz.png)
: Re: Tor project
: evensteven May 07, 2013, 10:26:16 PM
In my opinion, one of the bigger problems is regarding ISPs. Even using something like TOR can in some places trigger red flags through ISPs automated systems.   
: Re: Tor project
: omegaflare June 17, 2013, 05:55:56 AM
Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.

Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?

This kind of stuff has been debated over and over again, depends on the usage you want to give it.

Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.


Cryptoheaven solved that problem, email only. This is WHY I don't want NSA to keep track of my  internet activity. I am no longer using email service in the US because of NSA breach of privacy. Cryptoheaven is located in Canada and all of the email content is encrypted with AES 256 before sending it out. Like learning said, NSA can't decrypt it (man in the middle attack).


- You can use AES CRYPT to encrypt your files (http://www.aescrypt.com/ (http://www.aescrypt.com/)), and then you can put it via clouds (google drive, skydive, and etc). Even if NSA sees the encrypted files, it won't be able to crack it as long you have the password randomly generated with 12+ characters. Will it be cracked? Not for another 10,000 or 100,000 years. You would be dead by then -- waste of tax payer's money.
: Re: Tor project
: Karpz March 29, 2015, 03:32:53 PM
Lol, I love how when ande makes a thread providing info on tor, everybody kisses his ass. But when a nobody does it, he gets shitted on
: Re: Tor project
: HTH March 29, 2015, 03:53:57 PM
Be that true or not, I don't love how you necro'd a two year old thread just to say that.

Two years ago tor wasnt in the same sad state of affairs it is now.