Author Topic: Tor project  (Read 28214 times)

0 Members and 1 Guest are viewing this topic.

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Tor project
« Reply #15 on: February 25, 2012, 10:55:10 pm »
First of all. If you really need a proxy to do the activities you want to do online, you are obviously up to no good and should perhaps reconsider your actions.

But in any case. Just get a trusted VPS/VPN/Server which does not state anything about logging in their TOS(s) and is not placed in the US(depends a little where you live). And when you pay for it, use an anonymous method of payment(payments which does not require you to give up your real name/phone/address etc). I don't know if I need to write this; But don't sign up with legit information upon registration/payment.

The method described above should be more than enough for most of your activities, in case you think it is not. There is always other ways getting a hold of servers/computers.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Tor project
« Reply #16 on: February 26, 2012, 07:16:05 am »
First of all. If you really need a proxy to do the activities you want to do online, you are obviously up to no good and should perhaps reconsider your actions.

But in any case. Just get a trusted VPS/VPN/Server which does not state anything about logging in their TOS(s) and is not placed in the US(depends a little where you live). And when you pay for it, use an anonymous method of payment(payments which does not require you to give up your real name/phone/address etc). I don't know if I need to write this; But don't sign up with legit information upon registration/payment.

The method described above should be more than enough for most of your activities, in case you think it is not. There is always other ways getting a hold of servers/computers.


I think there is legitimate reasons to be anonymous. Of course freedom of speech "technically" still exists, however there are so many loopholes and personally I consider this country a fascist country even though we operate under the guise of "freedom." Considering that the word greenpeace can classify you as a terrorist in the NSA data mining scheme I would say that we are well on our way to an Orwellian society. So striving for anonymity is no longer only a goal for people who are "into some bad shit".

And no you don't need to write the part about not using legit information. I would hope most people wouldn't need to be told that.

Also thank you for your clear concise response as such a response has proven hard to come by.
« Last Edit: February 26, 2012, 07:17:26 am by LuciD »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Tor project
« Reply #17 on: February 27, 2012, 01:12:19 am »
Additionally, a lot of EU countries are now setting up a global backbone logging system called Data Retention Directive. This system will store the connectivity information of all your activities(IP to<->from and timestamps etc). Meaning, its very very easy to track you down if both you and your proxy server is inside Data Retention Directive countries. So keeping either yourself or your proxy server outside such countries is a rather high recommendation.

EDIT: And I am sure there are other logging systems in development, planning and whatnot in other places, so watch out :P
« Last Edit: February 27, 2012, 01:14:50 am by ande »
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Tor project
« Reply #18 on: February 27, 2012, 06:44:17 am »
Say a used proxy is in one of these countries. Chaining proxies would solve this problem yeah?
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Tor project
« Reply #19 on: February 27, 2012, 12:45:10 pm »
Say a used proxy is in one of these countries. Chaining proxies would solve this problem yeah?

Not if both of the proxies are in logged countries.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline netizenx

  • /dev/null
  • *
  • Posts: 5
  • Cookies: -1
    • View Profile
Re: Tor project
« Reply #20 on: February 27, 2012, 01:45:19 pm »
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically
In Your Face

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Tor project
« Reply #21 on: February 28, 2012, 03:45:18 am »
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically

Sure its possible, I sure hope people will stand up. But in all honesty, I dont know.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Tor project
« Reply #22 on: February 28, 2012, 05:46:34 am »
That is some scary shit. The main reason why I got onto these forums. So what are your opinions? Can they succesfully (governments) monitor entire of the web traffic? Technically
Read up on data mining by the NSA. Everything you do on the internet is logged and the NSA uses what is called a dragnet to search for "terrorists." The dragnet sifts through our telecom systems and looks for keywords. Keywords such as greenpeace can classify you as a potential terrorist. Due to the massive amount monitoring that they do their system generates a huge number of false hits. In the world of today everyone is a terrorist. I'm sure this paragraph that I just typed up is probably grounds for being inspected. Hence the growing reason to become "anonymous" if such a thing is really possible at all anymore.


EDIT: At least here in the US. I have no idea about other countries, although according to ande's recent comment it sounds like its that way elsewhere
« Last Edit: February 28, 2012, 05:55:12 am by LuciD »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: Tor project
« Reply #23 on: February 28, 2012, 10:22:09 am »
Look guys one way or another don't use this Shit. It is great if you are in some foreign country and can't access th web, however for anonymity it blows. TOR has had several attack lately , and I would put money on it half the bridges are ran by the feds.

Also to the idiot who suggested cyberghost. that is a logged vpn. I suggest not using proxies or vpns unless they are an offshore vpn.

Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.

Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?

This kind of stuff has been debated over and over again, depends on the usage you want to give it.

Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.
Thanks for reading,
I_Learning_I

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Tor project
« Reply #24 on: February 29, 2012, 01:03:33 am »
Who cares if they're logged? Using SSL and chaining proxies(different countries) takes care of it.
Do I care if they log "AAKAHAGAJAJ1234417AHJSJ" ? As long as they don't log any 401 it's fine by me.
Even if they know that the IP 202.202.93.202 (Proxy) sent a 401 to this website and that I was connected to it, doesn't mean anything, 1 proxy server can be used by so many people.

Also if you want to be anonymous why using a web proxy? Pick the train to a city 100miles away from your home town and access a free public WiFi , use some new clothes and have some stickers in your laptop, change the MAC before, afterwards burn your clothes and remove the stickers , change MAC back to original and it can't be proven.
Are you really that paranoid?

This kind of stuff has been debated over and over again, depends on the usage you want to give it.

Also about the record by governmental parties, you can't do anything except encrypting the data before sending it through their server, something like PGP, use the public key and send the data, they can't decrypt it.

Because I don't want to buy new clothes and go 100 miles away to a starbucks every time I want to search the web anonymously.

Good info though
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: Tor project
« Reply #25 on: February 29, 2012, 11:03:05 am »
This kind of stuff has been debated over and over again, depends on the usage you want to give it.

If you want to be anonymous towards the server(advertising, info gathering standards, etc...) you can simply use a free proxy/VPN.
If, however, you wish to be completely anonymous you have to be more careful when chosing a VPN, of course. You should just keep in mind that you never have proofs that they don't log, just because they don't specify it.
Anyhow chaining with some encryption should do it, TOR is/was a good option, before everyone learn they can sniff if they're the exit node.


Risking going against EZ new policies (I don't remember them right now), the "real deal" option is having your botnet and use them as proxys. You have access so you can make sure they aren't logging, just make them establish several connections at the same time with several external IP's, connect, again, encrypted and after you've done your stuff, spam some pings, telnets, GET's, POST's, etc...
The major ISP companys can't log all the traffic from every client, not in detail at least, maybe the number of times they use TCP connections, and so on, but that's it, otherwise after some time/size of the log will get deleted, presuming its size-related (safest option for ISP side) just spam connections for 1 day and your log will be clean.

Keep the feedback coming, it's the best way to share information!

PS: I had to re-write due to stupid proxy, I'm sorry if there's any mistakes or anything not well explained.
Thanks for reading,
I_Learning_I

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Tor project
« Reply #26 on: February 29, 2012, 09:28:02 pm »
If you want to be anonymous towards the server(advertising, info gathering standards, etc...) you can simply use a free proxy/VPN.
If, however, you wish to be completely anonymous you have to be more careful when chosing a VPN, of course. You should just keep in mind that you never have proofs that they don't log, just because they don't specify it.
Anyhow chaining with some encryption should do it, TOR is/was a good option, before everyone learn they can sniff if they're the exit node.


Risking going against EZ new policies (I don't remember them right now), the "real deal" option is having your botnet and use them as proxys. You have access so you can make sure they aren't logging, just make them establish several connections at the same time with several external IP's, connect, again, encrypted and after you've done your stuff, spam some pings, telnets, GET's, POST's, etc...
The major ISP companys can't log all the traffic from every client, not in detail at least, maybe the number of times they use TCP connections, and so on, but that's it, otherwise after some time/size of the log will get deleted, presuming its size-related (safest option for ISP side) just spam connections for 1 day and your log will be clean.

Keep the feedback coming, it's the best way to share information!

PS: I had to re-write due to stupid proxy, I'm sorry if there's any mistakes or anything not well explained.

What about hiding from your smalltown ISP? Would changing the MAC address to hide from your network admin suffice?

EDIT: Also as long as you find a proxy that supports SSL then you know its encrypted and your all good right?
« Last Edit: February 29, 2012, 09:33:34 pm by LuciD »
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: Tor project
« Reply #27 on: March 05, 2012, 11:03:20 am »
Nope. You can't "hide" from ISP. You can communicate using PGP which means the ISP won't be able to read it. So if you're using a shared IP the only way to identify you is through MAC, so changing it would make you locally anonymous.

About SSL, if someone sniffs and records the communication or act as MiTM it's possible to decrypt it, that's PGP's advantage, the server already has an encryption and decryption method, being the decryption method private and therefor being uncrackable. Of course this is makes the communication a lot slower, but in some cases it's worth it, specially to establish the SSL key!
Thanks for reading,
I_Learning_I

Offline common

  • /dev/null
  • *
  • Posts: 14
  • Cookies: 5
    • View Profile
Re: Tor project
« Reply #28 on: April 01, 2012, 07:29:31 pm »
Not sure what its like were you guys are, but where i stay legislation dictates that it is the account holder who is legally liable for activities such as illegal downloads, therefore no amount of mac address changing fixes that.
If they get served a notice and the activity is associated with an ip allocated to "xxx"account "xxx"is toast.
I've never found an isp that requires government issued id to open an account.

Of interest is that isp's are allowed to have copyright material etc stored in there cache's legally. So if you can keep your transactions isolated to just you n your isp your sweet.... which probably extends to the caches of other isp's linked to your isp through a local peering exchange.

Its certainly not the isp's you need to worry about its the owners of copyright materials, owners of hacked sites, and governmental organisations. (country dependent of course, as reporting requirements will vary by country)

« Last Edit: April 01, 2012, 07:31:42 pm by common »

Offline Conch

  • Serf
  • *
  • Posts: 44
  • Cookies: 8
  • ls -a /dev/null | grep Conch
    • View Profile
Re: Tor project
« Reply #29 on: June 12, 2012, 12:41:11 pm »
Interesting information in this thread :)

I read many years ago, that the FBI is constantly monitoring the tor protocol, whether that is true or not, I don't know. Not that it matters. It's slow as shit.

I can't really state that as a fact though as I know nothing about Tor, I actually wish I knew more about it, time to read up I think :)

I don't do any illegal activites (unless I'm bored), I use anonymous services for their main purpose, like SSH + VPN for hotspots, Bouncers for IRC, Proxies for tracker websites, etc :)