prince_igor
Bluelighter
- Joined
- Jul 6, 2021
- Messages
- 434
so were all talking tor.
lets now talk about its problems.
tor over your network...
when I run a windows machine it calls back home all the time.
this traffic is a tell tail sign of a normal tax paying noob.
they like that.
you run a linux distro this stops.
next tor runs on its own port that is not normally used by noobs.
so no windows signature and your not talking over port 80 anymore so its starting to look weird to
your isp.
next
tor to onion site.
it is possible for what is called a decloaking of the network at any time if the decloaker has enough
tor nodes under there control (this has been done a few times by the USA in the past)
it takes great means and a lot of money but if your a big enough target they may do it.
or you may be unfortunate enough to be decloaked when they were hunting a big figure
as its a network decloak not a user.
tor to clearnet.
so we enter tor through an entrance node it then goes through the network through a few steps
to the exit node back into clearnet.
all is encrypted until you get out of the last node the exit to clearnet.
there are many and I mean heaps of exit nodes owned by government and hackers.
they can read everything you send though not were you are if you exit through there node.
most people turning on tails just exit were ever it lets them.
this changes all the time so the chances of you touching a "poisoned" node is near 200%
so it will happen.
were does that leave you as a tor and anonymous user.
1 don't trust a system you do not understand snowden or not.
2 learn the system like really learn it (yes im lazy but im not playing darkent)
3 if you exit to clearnet do not ever put any personal info in any site.
ie no banking or logging into email etc.
4 if you run tor in any form if the country you are entering the network watches for this (many do)
they will know your using it.
5 learn about vps and enter to tor in a country that sets internet privacy above DMCA.
6 if you are really doing some dodgy stuff hack someone else's wifi then jump to tor and make sure
you do not use the same wifi more than once and that it is remote were there would be no camera's.
7 if your going to look into this learn about snaking the exit node or testing it before the packets of
real data are sent.
ultimately don't trust technology trust physical impossibility.
ie not your link no camera live cd like tails or kali and then on to tor.
for legit details being transferred keep it clear.
finally tor has had some bugs over the years that allowed people to run software on your machine.
now fixed but something to think of.
really the best way to think is like someone shoplifting.
if there is a camera or digital trace to your name tor, i2p, vpn or not don't trust it if your in the position
to think that way.
lets now talk about its problems.
tor over your network...
when I run a windows machine it calls back home all the time.
this traffic is a tell tail sign of a normal tax paying noob.
they like that.
you run a linux distro this stops.
next tor runs on its own port that is not normally used by noobs.
so no windows signature and your not talking over port 80 anymore so its starting to look weird to
your isp.
next
tor to onion site.
it is possible for what is called a decloaking of the network at any time if the decloaker has enough
tor nodes under there control (this has been done a few times by the USA in the past)
it takes great means and a lot of money but if your a big enough target they may do it.
or you may be unfortunate enough to be decloaked when they were hunting a big figure
as its a network decloak not a user.
tor to clearnet.
so we enter tor through an entrance node it then goes through the network through a few steps
to the exit node back into clearnet.
all is encrypted until you get out of the last node the exit to clearnet.
there are many and I mean heaps of exit nodes owned by government and hackers.
they can read everything you send though not were you are if you exit through there node.
most people turning on tails just exit were ever it lets them.
this changes all the time so the chances of you touching a "poisoned" node is near 200%
so it will happen.
were does that leave you as a tor and anonymous user.
1 don't trust a system you do not understand snowden or not.
2 learn the system like really learn it (yes im lazy but im not playing darkent)
3 if you exit to clearnet do not ever put any personal info in any site.
ie no banking or logging into email etc.
4 if you run tor in any form if the country you are entering the network watches for this (many do)
they will know your using it.
5 learn about vps and enter to tor in a country that sets internet privacy above DMCA.
6 if you are really doing some dodgy stuff hack someone else's wifi then jump to tor and make sure
you do not use the same wifi more than once and that it is remote were there would be no camera's.
7 if your going to look into this learn about snaking the exit node or testing it before the packets of
real data are sent.
ultimately don't trust technology trust physical impossibility.
ie not your link no camera live cd like tails or kali and then on to tor.
for legit details being transferred keep it clear.
finally tor has had some bugs over the years that allowed people to run software on your machine.
now fixed but something to think of.
really the best way to think is like someone shoplifting.
if there is a camera or digital trace to your name tor, i2p, vpn or not don't trust it if your in the position
to think that way.