Pages:
Author

Topic: How anonymous is TOR really? (Read 24528 times)

full member
Activity: 128
Merit: 250
Free Crypto in Stake.com Telegram t.me/StakeCasino
April 19, 2019, 08:08:46 PM
#54
Actually, TOR helps you anonymously through many different workstations. But with genius hackers, you always leave personal information even when using TOR.
legendary
Activity: 2590
Merit: 1882
Leading Crypto Sports Betting & Casino Platform
April 19, 2019, 05:44:28 PM
#53
I got a way that Tor is totally anonymous, if you use tor and link it with operamini through an add-on, you will not only use the multiple IP that Tor
 can handle, if you activate the VPN option in Operamini you can have anonymity assured, and if You do some
 virtual machine, I think it will be more impossible to trace.
hero member
Activity: 2968
Merit: 605
April 14, 2019, 02:29:56 AM
#52

tor in itself is not completely anonymous but combined with other small tricks you can get good results, for example a vpn paid in crypto (monero) then firefox with tor and a public wi-fi without password, and eventually obscure the mac address of the pc /mobile phone...
legendary
Activity: 2590
Merit: 1882
Leading Crypto Sports Betting & Casino Platform
April 13, 2019, 02:30:10 PM
#51
It may not be totally secure, so it should be done with other add-ons, if you have VPN it is an ideal way for the IP that generates TOR to have its completion in the same cloud, that way it is much easier to have more anonymity. Also protect yourself with a virtual machine, so you will have fewer vulnerability options.
legendary
Activity: 2030
Merit: 1573
CLEAN non GPL infringing code made in Rust lang
February 21, 2019, 12:26:40 AM
#50
If you are truly paranoid, stick to "hidden services" (.onion addresses) and avoid the normal web (no exit nodes), use the Tor Browser from a live linux like Tails. The rest depends on your attitude, as mentioned earlier some people can't control their ego...

Tor is vital in oppressive regimes. People living nice countries only think about doing "bad" things, but under oppressive regimes a "bad thing" might mean reading an article from a "banned" media outlet or buying bitcoin. There is people who can get imprisoned years without seeing any lawyer or family only for expressing their political opposition on social media against the regime they live under.

Of course the original intention was protecting navy operatives passing Intel while remaining undetected behind enemy lines. It HAS to be anonymous enough, as there are people lives at risk here. But not everyone knows how to use it properly as that requires a strict discipline.
newbie
Activity: 185
Merit: 0
February 20, 2019, 04:10:43 AM
#49
He is pretty good at anonymity if you know how to use it.
sr. member
Activity: 613
Merit: 305
August 15, 2017, 01:42:24 PM
#48
They (feds) have only ever caught people using Tor who talked to much in IRC/forums. So if you aren't telling the feds where you live and everything about yourself while you engage in freedom fighting activities then you are basically as anonymous as it gets.

Although unlikely, it could be possible for an ISP to scan looking for Tor connections. China does this, but they don't dispatch black helicopters they just shut the connection down. So if you are worried about this obviously you would want to tunnel Tor through a VPN, or use Obfsproxy to hide the Tor connection from your ISP.

It could also be possible they trap you in some sort of page full of browser exploits and then learn what your real IP is, though unlikely if java plugins are all removed and you aren't randomly going to suspicious pages people have emailed or linked you in IRC. If you are worried run it in a vm, or even better use virtual routing in openbsd to lock down the Tor daemon to local IP, chroot it, and set up your firewall to deny all outbound connections that aren't through Tor and these exploits are foiled.

Feds found out who China's l337 haxors were because they were dumb enough to log into facebook while hacking the gibson and the NSA got their cookies and found their real names. So, if these idiots are the super dangerous government hackers you are worried about sounds like they have no idea what they are doing and no chance at all tracing their own hand on a piece of paper let alone some sort of hollywood-esque backtrack through Tor hops to find you.



Did they login to FB from TOR or did they use a separate non-TOR browser for that ?
hero member
Activity: 899
Merit: 1002
June 12, 2013, 04:54:16 PM
#47
They (feds) have only ever caught people using Tor who talked to much in IRC/forums. So if you aren't telling the feds where you live and everything about yourself while you engage in freedom fighting activities then you are basically as anonymous as it gets.

Although unlikely, it could be possible for an ISP to scan looking for Tor connections. China does this, but they don't dispatch black helicopters they just shut the connection down. So if you are worried about this obviously you would want to tunnel Tor through a VPN, or use Obfsproxy to hide the Tor connection from your ISP.

It could also be possible they trap you in some sort of page full of browser exploits and then learn what your real IP is, though unlikely if java plugins are all removed and you aren't randomly going to suspicious pages people have emailed or linked you in IRC. If you are worried run it in a vm, or even better use virtual routing in openbsd to lock down the Tor daemon to local IP, chroot it, and set up your firewall to deny all outbound connections that aren't through Tor and these exploits are foiled.

Feds found out who China's l337 haxors were because they were dumb enough to log into facebook while hacking the gibson and the NSA got their cookies and found their real names. So, if these idiots are the super dangerous government hackers you are worried about sounds like they have no idea what they are doing and no chance at all tracing their own hand on a piece of paper let alone some sort of hollywood-esque backtrack through Tor hops to find you.

full member
Activity: 223
Merit: 100
June 12, 2013, 02:05:13 PM
#46
Pretty anonymous I would say, I recommend you don't host a tor node on your personal computer though  Roll Eyes
legendary
Activity: 2912
Merit: 1060
June 12, 2013, 06:43:30 AM
#45
Your tor server should have its own vm.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 12, 2013, 06:23:11 AM
#44
Is this solution too paranoid?

1. You connect to internet via VPN on the router
2. You run one VM (virtual machine) with linux & TOR for each web-page. So you have one VM for Bitcointalk, one VM for google and so on...
3. You delete your VMs every night and use a fresh VM for every new session so you can be 100% sure you dont have any trojans, cookies and other parasites.
full member
Activity: 168
Merit: 100
June 12, 2013, 02:05:31 AM
#43
You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.

But your session ID won't.
newbie
Activity: 56
Merit: 0
June 12, 2013, 12:18:45 AM
#42
Let's just say that if Tor is not anonymous then nobody would bother to buy illegal stuff in silk road.
Once they visit the deep web/invisible web/dark net/onionland without using the Tor bundle they should expect Law Enforcers to bang at their door at any given moment. TOR is anonymous but purchasing a vpn software using your credit card will definitely tie your name to the VPN software. So don't be stupid do not purchase a vpn software using your money. Use free VPN software or better yet use only those that accept bitcoins.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 11, 2013, 06:37:01 PM
#41
If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
Sadly, such complexity only shrugs off non techies as they like most stuff easy to use, very quick and easy to learn and conveniant.

What our noob friends need is a black-box solution: a cheap small wifi-router with upgradeable software where you have three modes:
-VPN mode
-TOR mode
-Default mode (just as all other routers)

As I said before I dont trust TOR fully (some endpoints of TOR is run by criminals, and some are run by NSA), but it is somehow better than revealing ones real IP.
global moderator
Activity: 3794
Merit: 2612
In a world of peaches, don't ask for apple sauce
June 09, 2013, 03:22:24 PM
#40
If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
Sadly, such complexity only shrugs off non techies as they like most stuff easy to use, very quick and easy to learn and conveniant.
staff
Activity: 3304
Merit: 4115
June 09, 2013, 02:23:45 PM
#39
If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
legendary
Activity: 1176
Merit: 1280
May Bitcoin be touched by his Noodly Appendage
June 09, 2013, 02:03:52 PM
#38
After the recent news of NSA spying on internet Im sure lot of the TOR network is run by the NSA itself...
Why would they spy internet if they were running the whole Tor?
It's like spying your grandma's toilet when your hot twin female cousins have their bathtub in your bedroom
Or mining Litecoins with your ASICs
member
Activity: 104
Merit: 10
June 09, 2013, 01:15:30 PM
#37
This is on the frontpage of HN right now: https://www.eff.org/pages/tor-and-https
global moderator
Activity: 3794
Merit: 2612
In a world of peaches, don't ask for apple sauce
June 09, 2013, 11:28:07 AM
#36
After the recent news of NSA spying on internet Im sure lot of the TOR network is run by the NSA itself...
The only secure way to protect ones privacy is to be really paranoid and not use internet or smartphones.
I think you might be on to something however here we are posting messages through the internet.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 09, 2013, 10:58:37 AM
#35
After the recent news of NSA spying on internet Im sure lot of the TOR network is run by the NSA itself...
The only secure way to protect ones privacy is to be really paranoid and not use internet or smartphones.
Pages:
Jump to: