Pages:
Author

Topic: [Guide] Use Bitcointalk (more) privately (Read 626 times)

legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
June 16, 2023, 12:24:26 AM
#47
The information shared in this thread may be useful while using other sites on internet in future.
You're missing the point: I'm much less worried about my privacy on KnittingParadise.com than I am on Bitcointalk. I'm pretty sure a knitting granny doesn't do $5 wrench attacks to steel my wool.
I left you neutral feedback from LoyceMobile (not on DT) after your plagiarism in January. I've replaced it by the same feedback from this account.
full member
Activity: 1274
Merit: 106
Well, too late Sad And that's the thing with privacy: once it's gone, you can't get it back.

But it is never late to learn something new. The information shared in this thread may be useful while using other sites on internet in future.
newbie
Activity: 18
Merit: 2
Online wallet, one email for all services, one password for all services - this is the harsh reality of most crypto users.

For many of them it is enough and it does not raise any problems for them. It is common for other services like normal banking as well. Some bad instances may occur to some users but for majority, life will complete peacefully even after not following the precautions in this thread.
legendary
Activity: 3234
Merit: 5637
Blackjack.fun-Free Raffle-Join&Win $50🎲
~snip~
But does TOR for example work in China? I've always wondered about this.

According to what can be read on the official site TOR can be used in China, but requires some additional actions by users. It would be interesting to know how many people in China use TOR or VPN, or how many dare to go against the regime, given the penalties in that country. I assume that every ISP can see what the user is doing, and therefore I do not doubt that the Chinese ISPs in its fanatical surveillance monitors these activities as well.

Quote
There are three options to unblock Tor in China:

Snowflake: uses ephemeral proxies to connect to the Tor network. It's available in Tor Browser and other Tor powered apps like Orbot. You can select Snowflake from Tor Browser's built-in bridge menu.

Private and unlisted obfs4 bridges: contact our Telegram Bot @GetBridgesBot and type /bridges. Or send an email to [email protected] with the phrase "private bridge cn" in the subject of the email. If you are tech-savvy, you can run your own obfs4 bridge from outside China. Remember that bridges distributed by BridgeDB, and built-in obfs4 bridges bundled in Tor Browser most likely won't work.

meek-azure: makes it look like you are browsing a Microsoft website instead of using Tor. However, because it has a bandwidth limitation, this option will be quite slow. You can select meek-azure from Tor Browser's built-in bridges dropdown.

legendary
Activity: 1722
Merit: 1242
Thank you for this guide, certainly very useful especially in countries where there is repression.
It is not only useful for using bitcointalk but in general where some things are not allowed.
But does TOR for example work in China? I've always wondered about this.
full member
Activity: 443
Merit: 110
So having a reputation doesn't go with having privacy.
i have to agree with this statement. it's difficult to choose both coz eventually you'll have to choose one and proceed with that.

i do prefer using my opera rather than tor and changing browsers is not that convenient for me, i have tried tor once and we are not compatible so i just choose a browser which is convenient for me.
legendary
Activity: 1792
Merit: 1296
keep walking, Johnnie

TOR is terribly inconvenient, I'd rather continue to use Opera. Most users do not need it at all, as well as its use, this option is more suitable for those who are completely turned on privacy or those who have something to hide. There is a strong opinion that privacy is a myth, and if really want to, will still find you.
Why Opera and not another browser? For example, Firefox. Will Opera be able to provide a level of privacy at least close to TOR, or have you chosen what is convenient and familiar to you without giving a damn about privacy?


I disagree; you should try it out. In my experience, websites did load pretty slowly a few years back. But nowadays, it has gotten a lot better, especially if the website doesn't need JavaScript and doesn't use lots of graphics (like Bitcointalk).

I tried repeatedly. He loses on almost all fronts. Moreover, TOR itself does not provide proper privacy, without the necessary settings. I do not argue, it's a matter of habit, but for most users, this TOR will instill not a sense of privacy, but a feeling of irritation. And then they think for a moment, why the hell do they even need this privacy? For what? And after that, they will choose what is more convenient.
But other browsers also need to be configured before initial use, and not use the default settings.

Although, you can’t argue here: most users will always choose convenience and practicality over privacy.
hero member
Activity: 854
Merit: 772
Watch Bitcoin Documentary - https://t.ly/v0Nim
Even if you want to hide your VPN usage from ISP, you can use VPN with obfuscated servers like ProtonVPN with Stealth mode or setup OpenVPN with obfsproxy.

ProtonVPN servers can also be exported as OpenVPN profiles. None will work in eg. China, unfortunately.
But ProtonVPN's obfuscated servers work in Russia, Iran and Egypt.
China is a very individual case, sometimes some VPNs work in China, sometimes - not. At the moment, Astrill VPN is very popular in online Chinese communities. Chinese usually use Shadowsocks, V2Ray, Xray, Trojan, VLESS, or gRPC to bypass Great Firewall of China.
By the way it's a good idea to add in my thread VPNs or methods that work in China to bypass their internet cencorship.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
For iOS, 'Onion Browser' exists and is recommended by the Tor Project:
https://onionbrowser.com/

I use an app called "TOR Browser", because the onion browser does not reliably work for me (or should I say not at all)!

It's good if you don't mind the occasional nagging to use the built-in VPN - honestly, I never use it, as a Proton Visionary subscriber.

Even if you want to hide your VPN usage from ISP, you can use VPN with obfuscated servers like ProtonVPN with Stealth mode or setup OpenVPN with obfsproxy.

ProtonVPN servers can also be exported as OpenVPN profiles. None will work in eg. China, unfortunately.
legendary
Activity: 1638
Merit: 4508
**In BTC since 2013**
Sorry but I have to say that you are making perfect recipe for disaster with your unique password model, whatever that is.

Why? We all have models for passwords, even if it is the simple fact of using "software" to create passwords.

Also, the main passwords should be kept in a safe place, in case something goes wrong.
legendary
Activity: 2212
Merit: 7064
Cashback 15%
"I'd like to give the t-shirt I won to a Newbie who lives in the same country as me"....
I don't think your are the only guy in bitcointalk forum from same country, but they could also send that same t-shirt to any neighboring country PO Box of mysterious person, since there are no real borders in EU  Wink

I also wouldn't trust passwords created by a password system, because if a system can create them, it can also crack them.
LoL, but you brain is also a system, and when it breaks that means you don't have any backups.
You can do whatever you want, but most cases of people losing passwords and bitcoin keys is when they tried to act smart creating their own ''systems''.

Either way, you can rest assured that I have my own password model, different in many aspects from those discussed here, which, as you may understand, I will not share here. Wink
Sorry but I have to say that you are making perfect recipe for disaster with your unique password model, whatever that is.


hero member
Activity: 1078
Merit: 509
Leading Crypto Sports Betting & Casino Platform

There is not much to discuss; it is mathematically proven that truly randomly generated passwords are much stronger than real words and sentences. We don't need to mix a strong system with a weaker system, either, that only reduces security.
My mate, I honestly suggest you go and change all of your passwords, now.. Grin

Having strong passwords is good, but 2FA is better because no password is strong enough not to be cracked with a quality config and combolist. A lot of accounts could get cracked using good checkers, so when that happens even if the cracker got the username and password they can't access the account if s/he don't pass through the 2FA requirements. For a forum like this having the question and answer feature set up is also recommended, to enable easy account recovery. Hence, since the forum is not a target to crackers, its nothing to worry about, since the forum account sales market is falling on daily basis. Though, your thread is very excellent, as we are meant to be security conscious online and keeping things private is important.

I also have a question, what happens to a person that doesn't have a picture anywhere online, how can he be traced? if their privacy is leaked that is they don't use VPN, Tor or all the tools you just mentioned, between the forum encourage users not to attach their real faces on the site.
legendary
Activity: 1638
Merit: 4508
**In BTC since 2013**
That's entirely backwards. The second option is orders of magnitude easier to crack, since it is just 7 words and a number. As the sentence even makes semantic sense, some crackers should have an even easier time guessing that password.
Meanwhile the first option consists of 15 random characters, so wordlist-based attacks don't work and one would have to default back to the much slower / 'legacy' byte-by-byte bruteforcing approach.

Maybe I didn't explain it well. And what I did was just an example. Furthermore, the world does not only speak in English.
The idea I mean is that it doesn't necessarily have to be random in human eyes, but rather random in machine eyes.

This is a little bit what I want to say:
That's true but I always wonder what kind of prediction can someone find, for example, in this password: 'railWayZDanieAccCausticCornUebung'. I'll explain: Railway is railway, ZD is Russian word, short version of здapoвa (Hello), Zdanie is also Russian word здaниe and means building, Acc is a short version of Account, Caustic is caustic, for example caustic soda, Corn is a corn and Uebung is a German word Übung that means practice.
I agree that humans are very bad at randomness but I'm curious why these combination of words doesn't sound or look random.

Maybe my English is not the best and I can't explain it in the best way.
I apologize.



My mate, I honestly suggest you go and change all of your passwords, now.. Grin

I also wouldn't trust passwords created by a password system, because if a system can create them, it can also crack them.

Either way, you can rest assured that I have my own password model, different in many aspects from those discussed here, which, as you may understand, I will not share here. Wink
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
I only remember a few passwords, but I use hundreds of different ones. Most of them look like "(f#L!{p[oKGzz[2aV$'[P6!n$", and I'm not even going to try to remember them.
That's the type of password everyone should be using. It's your choice if you try to remember them or not but believe me, if you try, that's not difficult to remember. Type that hard password frequently for months, for a year and then you'll realize that you have memorized it
Like I said, I can remember a few passwords. But I can't remember hundreds of them, and most of them I don't need very often. If I'd try to remember them all, I'd either have weak passwords, of lose access all the time.

Quote
you can type it with your eyes closed.
I always type with my eyes closed Wink
hero member
Activity: 854
Merit: 772
Watch Bitcoin Documentary - https://t.ly/v0Nim
Is it better idea to show your ISP that you are using Tor? Don't you think it's alarming?
Is it less alarming to show your ISP that you are using a VPN?
Definitely it is less alarming. VPN is used by people to bypass restrictions that mostly include access to some games, game servers, netflix/hulu and so on. A lot of people use vpn with servers in Turkey to get cheap access to digital services.
Even if you want to hide your VPN usage from ISP, you can use VPN with obfuscated servers like ProtonVPN with Stealth mode or setup OpenVPN with obfsproxy.

By the way, if you use Tor bridges without VPN, node owner may know your IP address and in case nodes get compromised, others will know it too.

I think the use of real words, depending on how they are used, is a not bad model.
A machine finds random letters faster than real words. Logically it cannot be just a word or two. But, a sentence, with three or four words, can be very difficult to crack as a password.

In reality it all depends on how you build your password.
Random letters and numbers can be as easy to break as a few words together.

The suggestion I always give is to build passwords that you can memorize, but at the same time are complex.

"Waterwithsaltandsugar!1" it could be someone's password, which will be very difficult to be cracked.
Well... now it's not... it's better that no one uses it.  Roll Eyes Tongue
That is unfortunately completely wrong. Your example password is extremely easy to crack. Password crackers nowadays don't brute-force letter by letter anymore, but are based on wordlists. They also take into consideration that people like to append special characters and numbers to the beginning or the end of the password. Humans are way too predictable to be trusted to generate randomness; this is a scientifically proven fact.
That's true but I always wonder what kind of prediction can someone find, for example, in this password: 'railWayZDanieAccCausticCornUebung'. I'll explain: Railway is railway, ZD is Russian word, short version of здapoвa (Hello), Zdanie is also Russian word здaниe and means building, Acc is a short version of Account, Caustic is caustic, for example caustic soda, Corn is a corn and Uebung is a German word Übung that means practice.
I agree that humans are very bad at randomness but I'm curious why these combination of words doesn't sound or look random.
hero member
Activity: 882
Merit: 5818
not your keys, not your coins!
But it's not the special characters that make the difference in this example password. It's the phrase. Systems typically match words, but not phrases.
The system can combine "water" "salt" "sugar". But combining as a phrase "water" "with" "salt" "and" "sugar" is more unlikely.
No, that's wrong. These are all regular English words found in every wordlist and cracked in minutes.
https://en.wikipedia.org/wiki/Dictionary_attack

As you said rightly, the systems normally check letter by letter.
No, I said the opposite. Letter-by-letter bruteforcing is probably dead for well over a decade now.
https://ieeexplore.ieee.org/document/4799025

Therefore, it is more likely to pick up a combination of random letters than a sentence that is understood by a human.

Which do you think is easier for an automatic system to find:
"1McY1aGwc8jvFtA."
or
"My2YearOldCatLikesYoWalk."

Both are equally strong, but the second option is much more difficult to be recognized by an automatic system than the first.
That's entirely backwards. The second option is orders of magnitude easier to crack, since it is just 7 words and a number. As the sentence even makes semantic sense, some crackers should have an even easier time guessing that password.
Meanwhile the first option consists of 15 random characters, so wordlist-based attacks don't work and one would have to default back to the much slower / 'legacy' byte-by-byte bruteforcing approach.

  • Ironically: mix, tumble, CoinJoin or submarine-swap your campaign funds to a Lightning wallet. Anything that improves your on-chain privacy.
It will be great if anyone can tell the procedure of doing this with a lighting wallet. A step by step procedure or guide may be really helpful along with links to site / wallets etc. Usually how much fee is involved in this process ?
Sure; thanks for the suggestion. I will do such a guide in the future. But in essence, you just connect to https://boltz.exchange/ via Tor (you will be redirected to their Tor site), enter the amount you want to send to your Lightning wallet (such as Core Lightning) and send the amount shown on screen through a regular on-chain transaction.

The point I wanted to emphasize is that for a hacker who steals hundreds of passwords, he will use automatic systems that will try to match the victim's password letter by letter.
No, he won't.

The probability of him hitting random letters is greater than a sentence.
That is wrong. By definition, a sentence has less entropy since it does not consist of random letters.

I am not recommending this or any other type of password here. Just to point out that both types of passwords can be safe if used correctly.

Perhaps a mix of the two options could be something interesting to explore.
There is not much to discuss; it is mathematically proven that truly randomly generated passwords are much stronger than real words and sentences. We don't need to mix a strong system with a weaker system, either, that only reduces security.
My mate, I honestly suggest you go and change all of your passwords, now.. Grin
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
I think the use of real words, depending on how they are used, is a not bad model.
A machine finds random letters faster than real words.
It depends: if you're comparing one random character to a word, the word is harder to find. But if you compare 4 random characters to a 4-letter word, the word is easier to brute-force (by using a dictionary attack).

Is it better idea to show your ISP that you are using Tor? Don't you think it's alarming?
Is it less alarming to show your ISP that you are using a VPN?
Both isn't ideal, but VPNs are often used to connect to a company network too. Or for streaming.

You could eaisly use secondary accounts for purchasing stuff from forum... and I don't mean LeyoceV Mobile  Cheesy, but some random newbie account.
"I'd like to give the t-shirt I won to a Newbie who lives in the same country as me"....

Which do you think is easier for an automatic system to find:
"1McY1aGwc8jvFtA."
or
"My2YearOldCatLikesYoWalk."

Both are equally strong, but the second option is much more difficult to be recognized by an automatic system than the first.
What makes you think they're equally strong? If the first one is generated randomly, it's much stronger. If you want to use words as a password, at least generate them randomly. Kinda like Electrum does it.

The probability of him hitting random letters is greater than a sentence.
You should look up the words "dictionary attack" Wink
legendary
Activity: 1638
Merit: 4508
**In BTC since 2013**
If it is people around you and know you love cat and some other information about your cat, he will put words like "cat" "2" "old" into inputs of brute force and make it becomes more easily to bruteforce your passwords.

The phrase indicated was just an example, I do not recommend that it be used, much less that it be so logical.

The point I wanted to emphasize is that for a hacker who steals hundreds of passwords, he will use automatic systems that will try to match the victim's password letter by letter. The probability of him hitting random letters is greater than a sentence.

I am not recommending this or any other type of password here. Just to point out that both types of passwords can be safe if used correctly.

Perhaps a mix of the two options could be something interesting to explore.
hero member
Activity: 2226
Merit: 834
Well, too late Sad And that's the thing with privacy: once it's gone, you can't get it back.

When I started with Bitcoin, I was bright enough to use a random generator to create a username. But I now realize that isnt' enough, and I never expected to use it this long. By now I've also used it on other sites. I can't take that back without giving up everything I've done in the past 8 years, and being a Newbie again. So having a reputation doesn't go with having privacy.

Guess what, i have made a username with my real name. Never thought about the privacy back then when i created this bitcointalk account, but now its too late.

Generally, the IPs are logged for last 30 days. So if we opt for this limited IP retention, won't they be logged at all ?

  • Ironically: mix, tumble, CoinJoin or submarine-swap your campaign funds to a Lightning wallet. Anything that improves your on-chain privacy.
It will be great if anyone can tell the procedure of doing this with a lighting wallet. A step by step procedure or guide may be really helpful along with links to site / wallets etc. Usually how much fee is involved in this process ?


sr. member
Activity: 658
Merit: 354
I stand with Ukraine!
"My2YearOldCatLikesYoWalk."

Both are equally strong, but the second option is much more difficult to be recognized by an automatic system than the first.
The second one looks pseu-do strong but in fact it is not. It is more vulnerable to bruteforce process because you don't know what are bad guys who intend to steal your passwords.

If it is people around you and know you love cat and some other information about your cat, he will put words like "cat" "2" "old" into inputs of brute force and make it becomes more easily to bruteforce your passwords.

If a person has his habit to create password like this, possibly he will have other passwords like
My3YearOldCatLikesYoWalk
My4YearOldCatLikesYoWalk
My2YearOldCatLikesFish

https://www.youtube.com/watch?v=rMtW8vIHHek
Pages:
Jump to: