![]() |
Quote:
Quote:
As long as the entire list of nodes isn't the police/government/spies then you are ok. Quote:
Also, you can layer it inside of a VPN so all your ISP sees is VPN traffic etc. If you are targeted by your ISP or government because they see a lot of Tor traffic leaving your home or office they will try to exploit you from remote. If remote exploitation doesn't work they'll black bag your house and install a hardware bug such as a keylogger, slow drill listening system on the outside of your building, etc. If you reach this level you are probably already fucked by other means anyway. But for the average joe Tor is probably the best option. |
Quote:
By the way the best way to go in Tor on a windows is whonix: http://sourceforge.net/projects/whonix/ Since the "tor browser bundle" for windows let your ip go direct with flash, also you can't use skype, ftp, etc. over tor, I mean you need a whole machine on tor or its a joke. http://a.fsdn.com/con/app/proj/whoni...ots/whonix.jpg |
Quote:
BTW, hidden darknet/.onion sites like Silk Road never have a "cleartext" exit - encryption is end to end, from the client all the way to the hidden server - so you would have to break the multiple encryption layers of TOR in order to be able to see the content that someone is accessing. |
Quote:
|
Quote:
Tor doesn't magically fix the Internet, but it does enhance privacy a ton. Also, I'm sure some exits are ran by bad people but there are exits ran by good people as well. I should know. I run some of the high speed exits and I don't monitor shit. Hell, I cripple the kernels so the bpf device doesn't work in the unlikely event that one of my nodes is compromised. Quote:
Remember that the DHS and Chinese gov have CAs and can sign whatever SSL keys they want. They can easily MITM (Man in the middle) any SSL connection and have been able to do this since 2004. Proof of this was released online back then. There was some commercial product being sold to law enforcement agencies back then. Quote:
This will properly hammer all traffic over Tor and prevent any leaky applications. Also, if you value privacy and security don't use Windows or OSX. I know I'll get some flack for mentioning OSX, but it is closed source and I'm sure that a future Snowden leak will reveal that the NSA has code signing keys for it like they do with Windows. :2 cents: |
Quote:
|
Quote:
Sure, it is a tad slower but that's what you pay for privacy. Not a bad trade off in my opinion. |
Quote:
|
Quote:
|
Quote:
The LAN IP of your computer behind the router which is utterly useless. :winkwink: |
Quote:
To quote Theo de Raadt: "You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes." A separate computer (to do your routing/Torification) with its own memory/MMU/CPU is always more secure. :thumbsup |
Quote:
192.168.0.1 FTW. |
|
Quote:
|
Quote:
I trust open source software far more than some closed source blob like Windows or OSX (Yes, I know that *some parts* of OSX are open. It's the closed parts that scare me.) I remember reading parts of the Linux kernel in 1998 and seeing a lot of todo/fixme/"should this even be here" type comments. That's why I went over to the BSDs. The source was far more mature. Look at the security track record of OpenBSD for example. It blows most other OSes out of the water. Sure, it has very limited features but it's awesome for a router/torifyed router. The Tor bundle and the one you mention lower the technical skills required to browse anonymously, but at the expense of a little bit of security. The biggest problem with VPN is that people buy them for the wrong reasons. They don't fully understand how they work and are sold on an illusion of privacy. That was more or less what I was getting at originally. :2 cents: |
All times are GMT -7. The time now is 09:06 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc