Pages:
Author

Topic: Any Tor network users here? (Read 1597 times)

legendary
Activity: 840
Merit: 1000
March 19, 2015, 10:52:59 PM
#31
The cool thing about Tor's encryption model is that only node 3 (the 'exit node') is ever able to read your traffic (but they don't know who it's from). The other nodes in the middle only ever see encrypted packets they can't fully decrypt, so they can be completely untrusted.
legendary
Activity: 1512
Merit: 1005
March 19, 2015, 09:36:51 PM
#30
I just posted this but anyway: can you tell me an example of someone that got compromised using tor + javascript off/flash off/stupid shit off and didn't do stupid mistakes like revealing your real name like the silk road dude? as far as i know it never happened but im not sure.
it is virtually impossible to track somebody with these conditions unless you post your name and where you live

I use tor, and it is quite evident that google have no problems identifying me. I suppose they use browser fingerprinting and of course cookies. And flash has its own cookie system, other extensions too, I suppose. So in addition to using tor, you should turn off lots of stuff in the browser, which is already done in the tor-browser.

If you want more untracability, you could use a separate machine or virtual machine, and make sure you don't ever use your real identity on that machine. Maybe shred everything after use, and start every session on a clean machine.

When you write something on a message board or whatever, it is easy to let slip through information that can reveal your identity.

As you understand, it is quite difficult, in practice, to avoid being tracked.

newbie
Activity: 56
Merit: 0
March 19, 2015, 05:42:37 PM
#29
I just posted this but anyway: can you tell me an example of someone that got compromised using tor + javascript off/flash off/stupid shit off and didn't do stupid mistakes like revealing your real name like the silk road dude? as far as i know it never happened but im not sure.
it is virtually impossible to track somebody with these conditions unless you post your name and where you live
newbie
Activity: 56
Merit: 0
March 19, 2015, 05:41:03 PM
#28
i use tor, its pretty easy to use if your main browser is firefox
sr. member
Activity: 320
Merit: 250
March 18, 2015, 11:06:00 PM
#27
You can use and instal a web browser right? Just download the tor browser, install it, then use it. It'd really not that difficult. Just watch a youtube video or something to get the gist of it.

It work for the first time. Wheb I tried to connect again it took a long time to connect.
hero member
Activity: 910
Merit: 1000
March 18, 2015, 09:03:29 PM
#26
I would not recommend doing this at work. It would be hard to justify and you might have people accuse you of doing things you aren't doing.
legendary
Activity: 1652
Merit: 1016
March 17, 2015, 04:01:04 AM
#25
But with TOR you have no control over the exit IP.

You can manually choose which exit node you wish to use in your circuit. You will need to manually edit your torrc conf file.
Code:
ExitNodes server1, server2, server3
StrictExitNodes 1
full member
Activity: 168
Merit: 100
March 16, 2015, 08:03:09 PM
#24
I just posted this but anyway: can you tell me an example of someone that got compromised using tor + javascript off/flash off/stupid shit off and didn't do stupid mistakes like revealing your real name like the silk road dude? as far as i know it never happened but im not sure.
hero member
Activity: 519
Merit: 500
March 16, 2015, 07:57:27 PM
#23


May be overkill but I need to use a vpn because I want to control the end IP.




Best not to mix Tor and VPN. Tor on its own is good enough, especially if there are lots of other users around you.

But with TOR you have no control over the exit IP.

legendary
Activity: 1008
Merit: 1000
March 16, 2015, 03:04:29 AM
#22
Watch out for those "trusted" VPN honeypots.

Best not to mix Tor and VPN. Tor on its own is good enough, especially if there are lots of other users around you.
legendary
Activity: 1652
Merit: 1016
March 16, 2015, 02:37:57 AM
#21
Watch out for those "trusted" VPN honeypots.
legendary
Activity: 1008
Merit: 1000
March 16, 2015, 01:15:05 AM
#20



But is it technically impossible or just overkill?



It is possible I guess, go ahead and try.


I don't know how to do it. I was just asking.

It is possible. The problem is that then you are trusting the VPS service provider. Tor data is not encrypted so if they want they can find out what you were surfing.
full member
Activity: 253
Merit: 100
March 15, 2015, 07:22:25 PM
#19



But is it technically impossible or just overkill?



It is possible I guess, go ahead and try.


I don't know how to do it. I was just asking.
b!z
legendary
Activity: 1582
Merit: 1010
March 12, 2015, 08:10:46 PM
#18
Download the TOR Browser Bundle from the website and verify that you have the right files. It should work out of the box.
legendary
Activity: 1512
Merit: 1005
March 12, 2015, 07:35:31 PM
#17
Probably best to use it inside Tails OS.

https://tails.boum.org/

Too easy to leak your IP otherwise.


You can always remember that NSA tracks down everyone who checks for the download page of tor or tails Roll Eyes

This is correct. Tor doesn't protect it's users from others finding out they are using the Tor network.
Tor is a tool, it has limitations like any other tool.


Is it possible to chain a vpn to TOR, ie the vpn provider sees your TOR exit node.

What about 2+ vpns or a proxy and a vpn?

Overkill. Just use TOR, heed the basic rules of caution, know the limitations.



May be overkill but I need to use a vpn because I want to control the end IP.



So use only the vpn. You can get it anonymously, but the provider knows your ip, and you have to trust them just a bit more than you have to trust the tor project.


But is it technically impossible or just overkill?



It is possible I guess, go ahead and try.
hero member
Activity: 519
Merit: 500
March 12, 2015, 06:22:49 AM
#16
I was wondering if there is any alternative available to the Tor Browser?

There are freenet and i2p.

I2P VS Freenet VS Tor

full member
Activity: 138
Merit: 100
March 12, 2015, 01:09:15 AM
#15
I was wondering if there is any alternative available to the Tor Browser?
full member
Activity: 253
Merit: 100
March 11, 2015, 10:00:42 PM
#14
Probably best to use it inside Tails OS.

https://tails.boum.org/

Too easy to leak your IP otherwise.


You can always remember that NSA tracks down everyone who checks for the download page of tor or tails Roll Eyes

This is correct. Tor doesn't protect it's users from others finding out they are using the Tor network.
Tor is a tool, it has limitations like any other tool.


Is it possible to chain a vpn to TOR, ie the vpn provider sees your TOR exit node.

What about 2+ vpns or a proxy and a vpn?

Overkill. Just use TOR, heed the basic rules of caution, know the limitations.



May be overkill but I need to use a vpn because I want to control the end IP.



So use only the vpn. You can get it anonymously, but the provider knows your ip, and you have to trust them just a bit more than you have to trust the tor project.


But is it technically impossible or just overkill?

legendary
Activity: 1512
Merit: 1005
March 11, 2015, 08:42:14 PM
#13
Probably best to use it inside Tails OS.

https://tails.boum.org/

Too easy to leak your IP otherwise.


You can always remember that NSA tracks down everyone who checks for the download page of tor or tails Roll Eyes

This is correct. Tor doesn't protect it's users from others finding out they are using the Tor network.
Tor is a tool, it has limitations like any other tool.


Is it possible to chain a vpn to TOR, ie the vpn provider sees your TOR exit node.

What about 2+ vpns or a proxy and a vpn?

Overkill. Just use TOR, heed the basic rules of caution, know the limitations.



May be overkill but I need to use a vpn because I want to control the end IP.



So use only the vpn. You can get it anonymously, but the provider knows your ip, and you have to trust them just a bit more than you have to trust the tor project.
full member
Activity: 253
Merit: 100
March 11, 2015, 08:35:04 PM
#12
Probably best to use it inside Tails OS.

https://tails.boum.org/

Too easy to leak your IP otherwise.


You can always remember that NSA tracks down everyone who checks for the download page of tor or tails Roll Eyes

This is correct. Tor doesn't protect it's users from others finding out they are using the Tor network.
Tor is a tool, it has limitations like any other tool.


Is it possible to chain a vpn to TOR, ie the vpn provider sees your TOR exit node.

What about 2+ vpns or a proxy and a vpn?

Overkill. Just use TOR, heed the basic rules of caution, know the limitations.



May be overkill but I need to use a vpn because I want to control the end IP.

Pages:
Jump to: