Author Topic: Tor project  (Read 28215 times)

0 Members and 2 Guests are viewing this topic.

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Tor project
« on: March 27, 2011, 12:24:16 am »
What is Tor?
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis


Why Anonymity Matters
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.


Homepage: http://www.torproject.org/
Download: http://www.torproject.org/download/download.html.en
Firefox plugin: http://www.torproject.org/torbutton/index.html.en - This is a one click on/off proxy switch for firefox


Personally I don't use Tor, its to slow for my taste, and logs are always a danger. Aswell as sniffing from Tor nodes. But its a neat tool in some cases.
« Last Edit: March 27, 2011, 12:26:32 am by ande »
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline pl4f0rd

  • Serf
  • *
  • Posts: 20
  • Cookies: -1
    • View Profile
    • Hacking With Backtrack
Re: Tor project
« Reply #1 on: March 27, 2011, 10:28:19 am »
Very true it is slow and leaves too many logs about  I think they are currently working on the speed issue.

On the plus side though You could be an exit node for the onion network,  this way you can see all the traffic and get up to all sorts of mischief, you could modify the traffic for your own gain, MITM attacks by injecting some java script to re direct to a malicious website to install malware.

I would recommend either a highly anonymous proxy or use ssh tunnel for proxy connections

Even better nowadays is the use of cellular connections, pretty hard to track as normally each time you connect they are dynamically assigned, of course the operator could tie the ip to you.  So if you think someone is tracking your activities just reconnect.
The greatest lesson in life is to know that even fools are right sometimes

Offline Rafy

  • Peasant
  • *
  • Posts: 111
  • Cookies: 5
    • View Profile
Re: Tor project
« Reply #2 on: March 28, 2011, 03:35:41 pm »
Yeah it was pretty safe until it got cracked by some law enforcement agency! :'( :'( >:(
If it moves shoot it,if it runs... hack it!

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: Tor project
« Reply #3 on: March 29, 2011, 01:37:51 am »
Yeah it was pretty safe until it got cracked by some law enforcement agency! :'( :'( >:(
Not only ^^
I've seen somewhere around how to crack Tor ahaha.
Anyways, it might be a good tool, but I prefer to use several proxy's or something, Proxifier, HSS, CyberGhost, so many ways...
Thanks for reading,
I_Learning_I

Offline gh0st

  • Sir
  • ***
  • Posts: 575
  • Cookies: 8
  • #DEDSec
    • View Profile
Re: Tor project
« Reply #4 on: March 31, 2011, 02:10:22 am »
I have to admit that I really admire the curriculum of TOR`s coders just check them out:
Roger Dingledine: http://www.freehaven.net/~arma/cv.html
Nick Mathewson: http://www.wangafu.net/~nickm/
their profesional degrees are below just scrool down till the bottom
well TOR works in others things as a tool for leakers I really like the way why was it designed I mean that it to works as a protector of leakers you know

Offline xwire

  • /dev/null
  • *
  • Posts: 9
  • Cookies: 1
    • View Profile
Re: Tor project
« Reply #5 on: April 01, 2011, 06:37:48 am »
Not only ^^
I've seen somewhere around how to crack Tor ahaha.
Anyways, it might be a good tool, but I prefer to use several proxy's or something, Proxifier, HSS, CyberGhost, so many ways...

Thanks for spreading FUD about Tor with no evidence whatsoever. These claims have been refuted over and over again. Tor is free software with several independent implementations. It's used by tens of thousands of people and the code is viewed by a number close to several hundred people. You can see yourself where you're connections go and how the encryption works. If Tor was really cracked, how do people get away with all the sketchy shit they do through it? Duh.

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Tor project
« Reply #6 on: April 01, 2011, 11:59:39 am »
Thanks for spreading FUD about Tor with no evidence whatsoever. These claims have been refuted over and over again. Tor is free software with several independent implementations. It's used by tens of thousands of people and the code is viewed by a number close to several hundred people. You can see yourself where you're connections go and how the encryption works. If Tor was really cracked, how do people get away with all the sketchy shit they do through it? Duh.

The encryption is cracked, it is now possible to sniff all the traffic others route throuh you if you are are TOR node, dosent mean all nodes and everyone do it. And even if they do, why would they bother reporintg people who do "sketchy" shit. They simply want usefull information.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline 10n1z3d

  • Serf
  • *
  • Posts: 42
  • Cookies: 8
    • View Profile
Re: Tor project
« Reply #7 on: April 01, 2011, 10:15:06 pm »
The encryption is cracked, it is now possible to sniff all the traffic others route throuh you if you are are TOR node, dosent mean all nodes and everyone do it. And even if they do, why would they bother reporintg people who do "sketchy" shit. They simply want usefull information.

The encryption is NOT cracked. It have always been possible to to sniff the traffic if you are tor exit node. Tor by design gives you only anonymity but it doesn't protect your data from sniffing because there is no way for tor to encrypt your traffic between the tor exit node and the target server. Unless you do it yourself by using SSL/TLS, but you still can't be protected from rogue CA's and your own stupidity.


« Last Edit: April 01, 2011, 10:22:44 pm by 10n1z3d »
Code: [Select]
python -c "print ''.join(chr(x) for x in [int(oct(39)) + 2, 24 * 2, 313 % 203, 0x31, (2 ** 7) - 6, int('051'), (3 << 6) - 92])"

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: Tor project
« Reply #8 on: April 03, 2011, 11:04:07 am »
I won't start a debate about this without any proves, so I'll search for the post that I've seen and post back here, but if I recall correctly TOR had been cracked, not just sniffed IF you were an exit point, but cracked, perhaps the term was misapplied and it was meant to mean sniffed since most people use HTTP and not HTTPS, but still I'll check.
Thanks for reading,
I_Learning_I

Offline Jath

  • Peasant
  • *
  • Posts: 116
  • Cookies: 2
    • View Profile
Re: Tor project
« Reply #9 on: April 19, 2011, 04:12:15 am »
Thank you, US Navy for giving us TOR

For anyone confused about what I'm talking about. Just take a look at the patent

http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN%2F6266704

Offline easle

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Tor project
« Reply #10 on: February 22, 2012, 09:20:07 pm »
Bumping topic.

As there are about 2800 relays in total (https://metrics.torproject.org/network.html), but only some are online at a given time,

...would it be theoretically possible for a malicious person or group to make enough relays to make it probable a circuit gets formed only on his/their relays + the original client + the endpoint (or narrowing the number of third party relays to a very small number e.g. 1) making the whole "anonymizing circuit" ineffective??

AnTiHer0

  • Guest
Re: Tor project
« Reply #11 on: February 23, 2012, 07:42:56 am »
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.

Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.

Offline imation

  • Peasant
  • *
  • Posts: 141
  • Cookies: 2
    • View Profile
Re: Tor project
« Reply #12 on: February 23, 2012, 10:08:50 am »
Ive been looking at Offshore VPN's... i havent found one that i honestly can say i would trust!

Offline neusbeer

  • Knight
  • **
  • Posts: 223
  • Cookies: 11
  • Beer makes you stronger XD
    • View Profile
    • http://www.facebook.nl/hackneus
Re: Tor project
« Reply #13 on: February 23, 2012, 08:51:51 pm »
2 weeks ago they had a program about Tor Network on the Dutch tv
(I'm using it a lot btw)
Was a member of Anonymous (claimed he was, couldn't tell.. he was wearing a mask :-) :P) which exposed a kiddyporn network all across Tor and they got one in jail which was dum enough to get in contact with an undercover duwd. When the meet the cops did arrest that guy :)

--Neusbeer

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Tor project
« Reply #14 on: February 25, 2012, 09:34:37 am »
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.

Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.

What would you suggest doing? Of course its impossible to be absolutely anonymous as it sounds like most VPNs are logged. I hear plenty on what NOT to use/do

Not that I'm an advocate for TOR I'm sure you're right about the feds.
« Last Edit: February 25, 2012, 09:35:49 am by LuciD »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python