![]() |
VPNs are horseshit anyway.
They don't provide full location privacy and are prone to traffic correlation attacks. Sure, they are useful for protecting yourself from the local spies at the coffee shop WiFi, but not much more than that. Any VPN company that you pay directly and/or send traffic to from your IP directly has enough intel to identify you. Prepaid Visa cards from the 7/11 won't save you from this. Tor, and systems like it, are the way forward. The relays are ran by volunteers, it's free, and onion-routed. It requires 3 nodes to collude to identify you (vs. VPN providers that are only ONE node usually.) Combine Tor with Bitcoin and you have an unstoppable force for internet and financial privacy. :thumbsup |
Quote:
|
Quote:
|
Quote:
If someone wants to find out what you do online no system will stop them. |
Quote:
Do you really think that the various police agencies don't have access to dozens of law enforcement run nodes ? Furthermore, you still have the transport layer. You still connect to the Tor network using the transport layer provided by your ISP. So it's an easy thing to determine if you are connecting to known Tor nodes or not. Once such a determination is made then a more substantive effort can be made to track what you are doing through other means. |
Quote:
It's also probably the only project to be both funded by the EFF and the US Navy. lol |
Quote:
|
Quote:
If you are using Tor inside of the VPN tunnel the benefit would be that you could hide that you were using Tor from your local ISP (or any other local spies.) If you chained a VPN (assuming OpenVPN/TCP etc) at the end of your Tor connection you would benefit by having the remote website not be able to tell that you were using Tor. Of course, they would see that you were using a VPN if it is a publically known one. It all depends on your threat model I suppose. |
Quote:
|
Quote:
|
Quote:
Quote:
As long as the entire list of nodes isn't the police/government/spies then you are ok. Quote:
Also, you can layer it inside of a VPN so all your ISP sees is VPN traffic etc. If you are targeted by your ISP or government because they see a lot of Tor traffic leaving your home or office they will try to exploit you from remote. If remote exploitation doesn't work they'll black bag your house and install a hardware bug such as a keylogger, slow drill listening system on the outside of your building, etc. If you reach this level you are probably already fucked by other means anyway. But for the average joe Tor is probably the best option. |
Quote:
By the way the best way to go in Tor on a windows is whonix: http://sourceforge.net/projects/whonix/ Since the "tor browser bundle" for windows let your ip go direct with flash, also you can't use skype, ftp, etc. over tor, I mean you need a whole machine on tor or its a joke. http://a.fsdn.com/con/app/proj/whoni...ots/whonix.jpg |
Quote:
BTW, hidden darknet/.onion sites like Silk Road never have a "cleartext" exit - encryption is end to end, from the client all the way to the hidden server - so you would have to break the multiple encryption layers of TOR in order to be able to see the content that someone is accessing. |
Quote:
|
Quote:
Tor doesn't magically fix the Internet, but it does enhance privacy a ton. Also, I'm sure some exits are ran by bad people but there are exits ran by good people as well. I should know. I run some of the high speed exits and I don't monitor shit. Hell, I cripple the kernels so the bpf device doesn't work in the unlikely event that one of my nodes is compromised. Quote:
Remember that the DHS and Chinese gov have CAs and can sign whatever SSL keys they want. They can easily MITM (Man in the middle) any SSL connection and have been able to do this since 2004. Proof of this was released online back then. There was some commercial product being sold to law enforcement agencies back then. Quote:
This will properly hammer all traffic over Tor and prevent any leaky applications. Also, if you value privacy and security don't use Windows or OSX. I know I'll get some flack for mentioning OSX, but it is closed source and I'm sure that a future Snowden leak will reveal that the NSA has code signing keys for it like they do with Windows. :2 cents: |
Quote:
|
Quote:
Sure, it is a tad slower but that's what you pay for privacy. Not a bad trade off in my opinion. |
Quote:
|
Quote:
|
Quote:
The LAN IP of your computer behind the router which is utterly useless. :winkwink: |
Quote:
To quote Theo de Raadt: "You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes." A separate computer (to do your routing/Torification) with its own memory/MMU/CPU is always more secure. :thumbsup |
Quote:
192.168.0.1 FTW. |
|
Quote:
|
Quote:
I trust open source software far more than some closed source blob like Windows or OSX (Yes, I know that *some parts* of OSX are open. It's the closed parts that scare me.) I remember reading parts of the Linux kernel in 1998 and seeing a lot of todo/fixme/"should this even be here" type comments. That's why I went over to the BSDs. The source was far more mature. Look at the security track record of OpenBSD for example. It blows most other OSes out of the water. Sure, it has very limited features but it's awesome for a router/torifyed router. The Tor bundle and the one you mention lower the technical skills required to browse anonymously, but at the expense of a little bit of security. The biggest problem with VPN is that people buy them for the wrong reasons. They don't fully understand how they work and are sold on an illusion of privacy. That was more or less what I was getting at originally. :2 cents: |
All times are GMT -7. The time now is 08:00 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc