![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#51 | |||
Confirmed User
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
|
Quote:
Quote:
As long as the entire list of nodes isn't the police/government/spies then you are ok. Quote:
Also, you can layer it inside of a VPN so all your ISP sees is VPN traffic etc. If you are targeted by your ISP or government because they see a lot of Tor traffic leaving your home or office they will try to exploit you from remote. If remote exploitation doesn't work they'll black bag your house and install a hardware bug such as a keylogger, slow drill listening system on the outside of your building, etc. If you reach this level you are probably already fucked by other means anyway. But for the average joe Tor is probably the best option. |
|||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#52 | |
No, I am not banned
Industry Role:
Join Date: Nov 2003
Location: ChatGF.com
Posts: 5,345
|
Quote:
By the way the best way to go in Tor on a windows is whonix: http://sourceforge.net/projects/whonix/ Since the "tor browser bundle" for windows let your ip go direct with flash, also you can't use skype, ftp, etc. over tor, I mean you need a whole machine on tor or its a joke. ![]()
__________________
TubeCamGirl.com |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#53 | |
Too lazy to set a custom title
Join Date: Mar 2002
Location: Australia
Posts: 17,393
|
Quote:
BTW, hidden darknet/.onion sites like Silk Road never have a "cleartext" exit - encryption is end to end, from the client all the way to the hidden server - so you would have to break the multiple encryption layers of TOR in order to be able to see the content that someone is accessing. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#54 | |
Too lazy to set a custom title
Join Date: Mar 2002
Location: Australia
Posts: 17,393
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#55 | ||
Confirmed User
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
|
Quote:
![]() Tor doesn't magically fix the Internet, but it does enhance privacy a ton. Also, I'm sure some exits are ran by bad people but there are exits ran by good people as well. I should know. I run some of the high speed exits and I don't monitor shit. Hell, I cripple the kernels so the bpf device doesn't work in the unlikely event that one of my nodes is compromised. Use SSL with *certificate pinning*. I can't stress this enough. Especially when banking over any ISP/service/vpn/tor/whatever. Remember that the DHS and Chinese gov have CAs and can sign whatever SSL keys they want. They can easily MITM (Man in the middle) any SSL connection and have been able to do this since 2004. Proof of this was released online back then. There was some commercial product being sold to law enforcement agencies back then. Quote:
This will properly hammer all traffic over Tor and prevent any leaky applications. Also, if you value privacy and security don't use Windows or OSX. I know I'll get some flack for mentioning OSX, but it is closed source and I'm sure that a future Snowden leak will reveal that the NSA has code signing keys for it like they do with Windows. ![]() |
||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#56 | |
So Fucking Banned
Industry Role:
Join Date: Apr 2003
Location: online
Posts: 8,766
|
Quote:
![]() ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#57 |
Confirmed User
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
|
Tor's speed has improved a lot over the years. I force all of my traffic here over it.
Sure, it is a tad slower but that's what you pay for privacy. Not a bad trade off in my opinion. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#58 |
Too lazy to set a custom title
Join Date: Mar 2002
Location: Australia
Posts: 17,393
|
This will stop direct connect attempts from escaping your network, but it won't prevent applications revealing your IP as part of their protocol... for example, non passive FTP sends your IP to the server and invites an inbound connect when you want to fetch a file.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#59 | |
No, I am not banned
Industry Role:
Join Date: Nov 2003
Location: ChatGF.com
Posts: 5,345
|
Quote:
__________________
TubeCamGirl.com |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#60 | |
Confirmed User
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
|
Quote:
The LAN IP of your computer behind the router which is utterly useless. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#61 | |
Confirmed User
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
|
Quote:
To quote Theo de Raadt: "You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes." A separate computer (to do your routing/Torification) with its own memory/MMU/CPU is always more secure. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#62 | |
Too lazy to set a custom title
Join Date: Mar 2002
Location: Australia
Posts: 17,393
|
Quote:
192.168.0.1 FTW. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#63 |
. . .
Industry Role:
Join Date: Apr 2007
Location: NY
Posts: 13,724
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#64 |
No, I am not banned
Industry Role:
Join Date: Nov 2003
Location: ChatGF.com
Posts: 5,345
|
Had you ever browsed the linux (or BSD's) source codes. It is full of /* FIXME: */ and /* TODO */ comments, quite scary. Lots .c's are dated 1993 and untouched since. There's sure space for bugs exploits, that's daily. I was just saying, the "average guy" can easily use whonix system for a decent result. As well as tor bundle browser is for the masses even more. Also to return to the VPN for payment topic, makes VPN's less worth a buy.
__________________
TubeCamGirl.com |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#65 | |
Confirmed User
Industry Role:
Join Date: Jun 2013
Location: a frozen wasteland
Posts: 190
|
Quote:
I trust open source software far more than some closed source blob like Windows or OSX (Yes, I know that *some parts* of OSX are open. It's the closed parts that scare me.) I remember reading parts of the Linux kernel in 1998 and seeing a lot of todo/fixme/"should this even be here" type comments. That's why I went over to the BSDs. The source was far more mature. Look at the security track record of OpenBSD for example. It blows most other OSes out of the water. Sure, it has very limited features but it's awesome for a router/torifyed router. The Tor bundle and the one you mention lower the technical skills required to browse anonymously, but at the expense of a little bit of security. The biggest problem with VPN is that people buy them for the wrong reasons. They don't fully understand how they work and are sold on an illusion of privacy. That was more or less what I was getting at originally. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |