/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 8001

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Ghost Screen
Don't forget the global announcement this week
Saturday Evening


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(17.16 KB 474x253 th-2382814816.jpeg)

Connect to Tor Anonymous 05/10/2022 (Tue) 14:22:14 No. 8395
What is the safest way to connect to the Tor-Network? Is this the safest possible way: Tails (VM) -> VPN -> Bridge -> Tor-Network
>>8470 Does that matter though? I don’t care if my IP is known, I care if what I see or type is connected to me. My isp already knows if I use tor, all that matters if the second 2 nodes are good enough to hide my traffic.
>>8471 >Connect to Tor before anything else I have Tor Browser on my PC and Mullvad VPN on my router, is this ok?
>>8481 >By connecting to a proxy before Tor you are undoing the entire purpose of using Tor So all the gov't has to do to defeat your Tor protection is insert a proxy between you and the Tor node?
>>8395 Any way
>>9126 It will work
How can I use facebook and Twitter with Tor?
>>8395 >>8400 >all the hoops and network gymnastics you would have to go through just to peep on some underage cunny.
>>10610 But it is worth it
>>10620 on zeronet you used to find terabytes of Democrat activism within 5 minutes of opening the browser window. I mean i was there for free speech but cp was everywhere
>>8481 vpn before tor doesn't make you more secure, it also doesn't make you less secure. it has almost no effect whatsoever once the traffic is routed through the network.
(57.27 KB 680x440 truckload-o-laffs.jpeg)

>>8395 >Tor >safe
>>11238 Not necessarily true. There's a ~95% chance my ISP has glowniggers on their payroll (see Twitter files). They will notice my Tor traffic and target me specifically for deanonymyzation. Mullvad might have glowniggers in their IT staff too, but it's only ~10% chance. Same concept with copyright infringement. My ISP has copyright lawyers and FBI agents spying on all my torrent traffic. I get a threatening email every time I download a move without using a VPN. Mullvad does not have agents of the MPAA/RIAA/etc doing their network administration
>>11275 I will say though, there's a good chance there are ADL stooges working at the big name VPN companies. So I can't fedpost too hard even from behind a VPN
>>11238 >it has almost no effect whatsoever once the traffic is routed through the network. Additionally, if my ISP notices I am using Tor, even if they can't decrypt my traffic, I would still be put on their shitlist for heavy monitoring and possibly termination of service for "abuse of network resources" or some bs
>>8395 >Tails Its unnecessary unless you are under surveillance(by a parole officer typically) or are using a shared computer. If you have your own computer and are not under surveillance, Tails is unnecessary and cumbersome for everyday practical use. >Safest Way to connect to Tor-Network? If you aren't visiting any dark web/onion sites, typically Tor is sufficient but a having a properly configured browser with a VPN is provides more speed and compatibility with most websites. Cookies are a thing but you can configure your browser not to accept them and have a separate internet browser for everyday shit like banking, shopping, etc. >>10650 >CSAM on Zeronet Not surprised that's why it never took off outside of China where they have their own isolated communities. >>11275 VPNs are essential if you l live in any part of the European Union or the United States. Copyright can fuck you up big time if they catch you downloading your favorite series or games. >Mullvad One of the few good ones left. Most of the major VPNs have sold out. Mullvad offers a variety way to pay for their service including in cash, or crypto. >>11276 >ADL stooges working a big name VPN companies ExpressVPN easily fits the bill, owned by a guy whose wanted by the FBI, and bought for 1 billion dollars by an Israeli "cybersecurity" company. 1 Billion bucks for a VPN company? Tells ya all you need to know about them.
>>11341 >Most of the major VPNs have sold out. Mullvad will protect you from copyright attorneys, not much more. Don't trust any VPN to protect you from feds.
>>8395 read the tor wiki or the tails wiki or the darknet guide to buy stuff online. It is never 100% save unlesss you use tails and trip from puplic hotspot to hotspot. turn of java script.
So, no one can agree on anything. Got it. >>11341 >Most of the major VPNs have sold out. What about ProtonVPN?
>>14492 necking yourself would be a more secure/whateverthefuck option than using that honeypot sjw vpn
>>14517 OK, fed.
>>14528 First of all, nice archive. The edit says they've added nothing to their terms about keeping logs. Their privacy policy for both email and VPN says they don't keep logs. Yes, if a court forces them to log a specific user, they will do so. So will EVERY other company, because they're legally required to. But it's extremely unlikely that a foreign government is going to go through the legal trouble of forcing a Swiss company to log information about a specific user unless the user is doing something highly illegal or trying to hurt said government, megacorps, or the elites of society. More information: https://archive.ph/jBb2O
>>11341 >If you aren't visiting any dark web/onion sites, typically Tor is sufficient How would Tor alone not be sufficient if you're going on the dark web?
>>8395 TOR is a honeypot. 70%+ of TOR nodes are under control of the NSA. This is a feature, not a bug. TOR was created in the first place so that "dissidents" (read: CIA assets) in Russia, China, and Iran could do their work and evade getting caught by the local secret police. For anyone else, it's waving a giant flag that says "HEY LOOK AT ME I LIKE CP," "HEY LOOK AT ME I DON'T LIKE THE GOVERNMENT AND I'M PROBABLY SOME KIND OF MILITIA EXTREMIST," etc. See also, "supercookies." https://www.itpro.com/security/privacy/358637/what-are-supercookies You've maybe heard the term "cookies," right? It started out as a persistent text file stored locally that your browser would use for things like individual site settings. That goes back to the dialup days. Very quickly people whose stock in trade is gathering information about you (marketing departments, spammers, etc.) decided they really liked the idea of storing personal information about you locally, on your own computer, in files either hidden or with non-obvious names, made as obscure as possible and as difficult to remove as possible. Adobe got into this with secret spaces for additional hidden cookies files in the cache folders used by Flash. Got all that? "Supercookies" are not stored on your computer. They are information that your ISP has about you, like your real full name and your billing address, your IP addresses, full traffic logs, and they are available to marketers. They are also available to the glowbois, for free, just for the asking, no warrant required. The government has investigated itself and determined that there is no wrongdoing here. Theoretically you have a right to opt out of the selling-to-marketers part, but every ISP buries this a hundred screens deep in the terms of service so that you'll scroll past it. In 2016 Verizon got their peepee slapped with a pocket-change fine for selling people's "supercookie" information after they'd opted out. It cost them about a week's worth of that particular revenue. What I am saying here is that there is no anonymity on the Internet. That went away when dialup went away. Every other week there's a news story about another series of 2am US Marshals' Service SWAT team raids on guys who thought TOR made them invisible, for "CP" or "dangerous extremism" or maybe the warrant says the guy shot President McKinley. If one Federal judge won't sign off on it, another will. Legally speaking, US courts have found that you have no expectation of privacy when you use the Internet. Look up Projects CARNIVORE, MYSTIC, BULLRUN, PINWALE, RAMPART-A, ECHELON, XKEYSCORE, FAIRVIEW, DISHFIRE, PREFER, and PRISM if you don't believe me. Do you think that there is more Internet traffic in the US than they can analyze? Go look up Project SENTIENT. ChatGPT is quaint. They had AI tools parsing Internet traffic to find patterns and actionable intelligence 10+ years ago. Look up "automatic inferencing." This shit's on Wikipedia now, for fuck's sake, so there's no excuse for saying "I didn't know." The NSA is looking over all our shoulders as we type, geolocating us from second to second, parsing every sentence for "actionable intelligence." The Russians, Chinese, and North Koreans are rank amateurs when it comes to spying on their own people, at least from a technical perspective. The tl;dr here is, you aren't hidden. TOR is compromised by design. Any VPN traffic is still going to get logged by your ISP in real time. The takeaway is that each man is responsible to his own conscience, but never forget that you're under the microscope every second. If you still want to do things on the Internet that will give the State a pretext to come after you, after all that, you need to get your head examined. If you insist on doing so anyway, and there are consequences, don't say you weren't warned.
If anyone cares about DNS-over-QUIC and DNS-over-HTTPS/3 gaining traction, PowerDNS released DNSdist 1.9.0 today. https://archive.ph/ovN6K
>>14576 Discussions years ago about known weaknesses in TOR covered this. If an adversary has control of enough nodes, they could determine who was doing what through the use of timing attacks and payload analysis. The thought was that the more nodes, the greater the anonymity was available. But they don’t need ownership or control of the nodes. They only need access to monitor the data. Already, this is built in to the Internet’s core. Local level routers can be of many brands and may not be compromised. But it is acknowledged that edge and core router brands likely have built in back doors. The Five Eyes and China at the least, can access and monitor all traffic. Even with end-to-end encryption, they can at least see who is accessing what. Companies like Cisco, Juniper, Huawei, ZTE, and a few other key players make the Internet work. Nothing is transmitted without it crossing their networks. There are ways to improve one’s anonymity, but VPN isn’t it. That is just a red herring. It may prevent your ISP from knowing what you’re doing (maybe, certainly no guarantee), but when one can follow every packet of data from end-to-end, VPN does relatively little to enhance security.
What about RiseUp VPN?
>>14639 >There are ways to improve one’s anonymity, but VPN isn’t it. Then what IS the solution?
>>14660 Anonymity and security are two seperate things, you can wear a mask and go to a net cafe or big box store with a wifi device that rerolls mac addresses to be pretty anonymous, as long as your device isn't sending fingerprintable traffic or accessing any credentialed services.
>>14664 Pretty much overkill expect for extreme situations.
>>14660 There are really only two plausible solutions and only one of these is guaranteed to work. 1. Don't go online. This is the only guaranteed method to make sure you're not being tracked online. 2. Use a network that has no connection to you in any way. No cameras with ANI-based detection in parking lots, no mobile devices tracking movements, no in store cameras with facial recognition, etc. If you can be on a network without any other nearby devices identifying you then maybe you have a chance.
>>8395 the safest way is to not be in the country you're fucking with. that's why top hackers who have the state's acceptance always target the state's enemies and no one else. i've read many articles in my life where state employed hackers spend five whole months, or more, tracking down one single very good hackerman. also, the nsa controls/owns like 90 percent of all the tor nodes, if not straight-up all of them. if they want to catch somene, they can easily do so, i'm sure.
>>14815 Do you have proof that NSA owns most of tor relays?
>>14659 Hyper political and they oust people they don't like, same with their email service.
>>14660 Scatternet is the new hotness
(132.88 KB 1024x1425 1711472860377607.jpg)

Here's an invite code. https://t.ly/OV04N


Forms
Delete
Report
Quick Reply