/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 8001

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Ghost Screen
Don't forget the global announcement this week
Saturday Evening


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(73.53 KB 1200x725 100215453035.png)

Tor Discussion Anonymous 06/15/2020 (Mon) 04:52:53 No. 449
So, what's so bad about Tor? >it's a honeypot Not really, I have done extensive research into this and the only people caught on it were dumb fucks who made OpSec mistakes. Plus, the only people championing this point are schizos who use VPN services or set up their own VPN, or even just use their plain ISP-given IP address, all of which are way riskier than using Tor. If you're concerned about onion links being honeypots, then set up your own. It's one of the easiest things in the world to do. >it's slow Fair enough. >a lot of sites block it Yeah, and a lot of sites are fags anyways, a lot of sites are also using ReCatapha and require phone verification and use Cloudflare or AWS. Sites have been against privacy for a long time and are banning VPNs too. >it's operated by sjws&trannies Literally everything is now, including VPN services and ISPs, there is no escape unless you want to fully disconnect from the internet and live in a cabin in the woods, which considering people are still using this site, I don't see happening. Also, the directors are known privacy-advocates. >firefox Firefox is rapidly becoming a shit browser for privacy, yes, Chromium is worse, "Ungoogled" Chromium is still Chrome garbage, same with Brave, alternative Firefox builds are usually outdated, and Opera is blatantly spyware. Meanwhile, Tor usually strips out all the tracking that Firefox tries to push in new releases. >relays and nodes operated by governments Which is more of a reason to get more people using Tor so more people can set up nodes and relays aside from government interference. Not opening this to start an argument or a bash on how bad Tor is or just to simply praise Tor, I want a discussion, because most points about Tor being bad for privacy are easily debunked and usually only used by schizos and I want to ensure my personal privacy.
>>449 >>it's operated by sjws&trannies >Literally everything is now So, why has no one forked it? Tor is open source, isn't it?
>>450 Indeed it is. I think it hasn't been forked because it's not as popular as Firefox, same reason why most of the relays and nodes are still government operated.
>>449 Imagine tomorrow the feds straight up raid 50 people with TOR nodes, publicize it, and charge the people running those nodes for every piece of porn, CP, whiff of a threat etc that ever passed through them (even if the operators never knew) and then railroaded them in court. Because that's a thing they can do. The TOR network would disappear overnight as people fled from it in terror. If that isn't enough, TOR traffic can be blocked by ISPs using DPI. One law makes that mandatory. Its done. TOR relies on the Western authorities' unwillingness to go effectively "door to door" on every node operator in pursuit of one connection. Anything that relies for its survival on the enemy's unwillingness to fuck it over is weak. It will exist exactly as long as it is allowed to, which more or less defeats the real purpose of it that its dedicated users want it to have. They are literally playing around on the enemy's field.
>>452 Which is exactly why Tor can be used to circumvent firewalls in China, which is blocked by ISPs there. Also, if they raided people with Tor nodes they mind as well be raiding themselves, considering governmental bodies host most of the nodes, currently that is. Plus, the US isn't the only country in the world, people could easily set up nodes in, I don't know, Switzerland, Norway, Iceland, Sweden, or any other privacy-respecting country.
>>452 Tor node operators aren't legally liable for content that goes trough their nodes in majority of countries where Tor nodes are operated. Onion sites also do use end to end encryption so feds would be having a hard time accessing contents of requests. >TOR >TOR >TOR >TOR If you aren't capable on typing Tor network's name correctly I doubt you are capable on understanding limitations and strengths of Tor. I consider this post to be a bait or just straight up retarded.
why is everything online run by homosexuals? you'd assume there would be more sane people running information technology, or people that actually look into the information, but instead it's always homosexuals? Is this just picking and choosing what we notice?
>>453 If a government owns most of the entry or exit relays then they already have access to most of cleartext data but they probably have every ssl certificate known to man by now and keep the providers on gag orders if they're not complacent which screws https. Plus, they can do parallel construction to fuck the relays over if they wanted to regardless how legal it is if they want some down so its some more government controlled relay in their place that someone can pass through. >US isn't the only country in the world Five Eyes exist
>>449 Tor is the definative privacy orientated browser that you can count on to safetly browse imageboards, news sites, a couple of torrent sites and several unkown web sites but not all sites will work on it. Having a 2nd browser as backup and a VPN is optimal. I'm using Otter Browser so far and it seems pretty optimal because it has no telementary, uses less ram than most browsers, fully open source, you can spoof your User Agent, and works with Greasemonkey scripts. Also worth mentioning its one of the few browsers made from scratch and not based off Chrome or Firefox.
>>457 Cleartext data yes, they probably don't have SSL certificates. The literal only people who have been tracked down by the government is due to correlation attacks, this is despite the thousands of illegal stuff that passes through the deep web, they also do nothing even though illegal things happen on the clearnet, and they still don't have SSL certificates on clearnet sites. And if you live in a Five Eyes country you're still probably better off using Tor than your plain internet or a VPN. >Five Eyes exist None of the countries I listed are in the Five Eyes. Norway is in the 9 Eyes, sure, and Sweden is in the 14 Eyes, there's still Switzerland and Iceland, and various other countries.
>>456 neuronorms are too busy chasing pussy
Every anti-tor and anti-VPN conversations boils down to this. VPN's could be harvesting your data. Glow niggers could be in control of every single one of your tor nodes. But your ISP IS harvesting your data, and they ARE in control of your "node". Even when you agree with the least charitable perspective on things like tor and VPN's they still come out on top in the game of chance. It's not worth arguing with anti-tor and anti-vpn posters, they are almost always either straight up unironic glow niggers or tech illiterate retards.
>>452 That's no reason not to use any protection at all while it's still legal. That's just retarded.
>>452 Non-western hands wrote this post. What gives it away, even moreso than the "state is omnipotent" mentality, is this part >If that isn't enough, TOR traffic can be blocked by ISPs using DPI. which is blatant propaganda.
>>it's a honeypot this is just some brainlet schizos who think funded by DARPA = combromised
>>449 TBB and onion routing are criticized by VPN shills and by surveillance agency deskwagies because Tor makes their jobs difficult.
>caring about trannies Rent free
>>449 I use Tor as my daily driver browser and I don't really have any qualms with it aside from a few things: 1. I sometimes get kicked off of websites (namely zogtube) for "unusual traffic". 2. Websites I do go on are sometimes in different languages because of the node location or whatever 3. Some websites don't load properly or at all 4. I can't click hyperlinks from my desktop or applications (KDE), even after setting it as my default browser and shit. Tor just starts up on the startpage 5. For some reason when I search duckduckgo using the browser search bar, then click on a link in the results, going back doesn't take me back to the search results page, rather it takes me back to my start page. Really annoying because thats how I do most of my searching and it makes me do a lot of unnecessary searching Other than those relatively minor annoyances I don't see why any non-pleb shouldn't use tor. If a site blocks Tor, then you shouldn't be using that site anyways since it is probably a honeypot Also if anyone has fixes for the above problems I would appreciate it. Might get fixed in opensuse 15.2 which is coming in a week or so
(86.29 KB 486x579 browser.png)

Blackpill for everybody: privacy against the government is dead. You can't stop them, you can only slow them down. If they want something from you, they have a way of breaking into anything and everything eventually. >>449 >Chromium is worse, "Ungoogled" Chromium is still Chrome garbage >Chrome garbage Look at pic related, and also realize that microshit is literally cucking themselves by moving to a chrome-engine base for Edge. Chrome is literally the "best" browser out there and I would use it if it didn't glow so much
Is there any illiterate-friendly guide on how to set up Tor? Every jewtube video or article I come across only discusses about the Browser.
>>516 >2013 Old as hell, chrome is absolutely destroying the competition now somehow.
>>518 Does this count bots?
>>515 >I sometimes get kicked off of websites (namely zogtube) for "unusual traffic". >using zogtube instead of invidio.us (http://fz253lmuao3strwbfbmx46yu7acac2jz27iwtorgmbqlkurlclmancad.onion/) pleb anon, pleb. >I can't click hyperlinks from my desktop or applications (KDE), even after setting it as my default browser and shit. Tor just starts up on the startpage. I think most browsers' desktop files just have an Exec entry that looks something like >Exec=browser %U where %U takes URLs to append as command-line arguments to the browser. So, you might check to see whether launching Tor browser from CLI and providing an .onion link as an argument will actually cause it to load the page. If not then it probably doesn't support opening links given through arguments at all, presumably for security reasons. If it does work, however, then check your .desktop file for an Exec= entry and see whether it lacks a %U at the end. >>517 >Is there any illiterate-friendly guide on how to set up Tor? if you're on linux just install your repo's Tor package and run `tor` in a terminal. it should automatically create a connection to the Tor network that you can set applications to use by pointing their SOCK5 proxy settings to 127.0.0.1:9050 by default. the reason that nobody talks about how to "use Tor" beyond using the browser is because unless you're hosting a node or a bridge, connecting to the network is pretty brain-dead simple, you just launch `tor`. It takes care of opening the SOCKS5 listener for you. To actually *use* that listener means going into the settings of whatever application you want to send through Tor (web browser, irc client, etc) and pointing its SOCKS5 proxy settings at the Tor listener. So the matter isn't so much "using Tor" as it is "making applications use Tor", which is application-specific, not Tor-specific. It's the same instructions for using *any* Sock5 proxy, except that you point it at the Tor listener on localhost instead of some other clearnet proxy IP.
>>517 >Is there any illiterate-friendly guide on how to set up Tor? If you can't figure it out yourself there's no point in you using Tor.
>>517 Whonix has it all automated and with relatively good docs. I think Tails does too, even if it's liveUSB
>>449 >So, what's so bad about Tor? Probably it's just shilling because it works too well. Think about it, it enables people to commit crimes without being noticed, it enables people to post on boards and evade bans, it inhibits browser profiling, it has sites that aren't even available on normalfag web and so on. No matter who you are, chances are you are secretly, subconsciously pissed about one or another thing tor enables people to do freely. But then again everyone has to also admit that tor is a very useful tool. Then add those: >it's operated by sjws&trannies >relays and nodes operated by governments And it's simple to see why people have ambivalent feelings towards it. Everyone who thinks it's more "compromised" than some random VPN company is clearly a idiot.
(623.96 KB 680x479 media_CXAxEgjWMAACIRw.png)

>>449 >Not really, I have done extensive research into this and the only people caught on it were dumb fucks who made OpSec mistakes. True, but it's not like Tor's invincible. The main issue with Tor is that they separate users from Tor's infrastructure. As such there's a drastic disproportion between the number of users and the number of relays (~2.5M vs ~10k). If you have a government which is serious about Tor, injecting shitloads of corrupted nodes and/or (as >>452 said) reducing the network size by force will bring the whole thing crumbling to the ground. >it's slow MB/s is slow for you? Wait till you see I2P! >Literally everything is operated by sjws&trannies don't worry, there's someone nosey behind the scenes too >Which is more of a reason to get more people using Tor so more people can set up nodes and relays aside from government interference. Humble goal. Go ahead. Spoiler, it's not gonna work. You'll get a few more nodes at best and that won't change much. I2P solved this quite nicely making everyone who wants to participate in the network a node by default.
>>449 Tor's main strength is bouncing your IP address every 10 minutes and hiding your user agent from onion supported sites(if you have javascript disabled). That sounds great on paper and better than a VPN except there's a draw here; compromises in speed, and not being compatible/flexible with Cloudflare supported sites. Tor's not practical to use outside imageboards and Tor supported sites. For clearnet sites you're just better off using a VPN. >>800 SJWs and the likes are a cancerous bunch but they can't censor the Tor software as it would rid of the point of using it in the first place. Still though I'd probably just run a Browser with no telemetry/spyware and a VPN and that ought to do the trick.
>>817 To add to this, while Pale Moon exist, I think its probably worth fixing up Firefox, and removing all the telemetry features because it has Noscript which can safeguard you against malicious sites that might have spyware and avoid having to install anti-virus software in the first place.
>>817 >Still though I'd probably just run a Browser with no telemetry/spyware and a VPN and that ought to do the trick. Sure. In most situations it's enough.
>>a lot of sites block it lel how do you block large proxy networks which are supposed to be unblockable?
>>995 You can block Tor by blocking all the exit nodes, and a list of exit nodes is publicly available. Tor provides anonymity because it prevents anyone from tracking who made a request. It does not prevent sites from knowing a request was sent via Tor.
>>817 >>819 The problem with Browser+VPN is that you lack the triple proxy, browser fingerprinting protections and constantly changing IP adress of Tor Browser. You can chain three or more VPN's together to achieve a similar effect to the Onion system, but the fingerprinting and static IP will remain a big problem. Especially if you are trying to use a website with javascript. Big data companies can track you just by knowing your IP, user agent and analysing your browsing habits. Even with a VPN where there are hundreds or thousands of people using that particular IP, their insane AI systems can easily isolate each user of that IP based on the type of websites they visit, how long they stay there, etc. Meanwhile, Tor Browser users will all appear to be the same exact browser, with traffic randomly spread across a wide number of exit nodes. In this case, it is much harder for the AI to isolate individual users. This an especially big advantage when you need to use a website with some JavaScript. A regular browser without full script blocking can easily be identified by any JS trackers it encounters, and then singled out from the other users of the VPN by the tracking server AI. With Tor Browser's identical nature and other fingerprinting countermeasures the AI will still have to go through the process of isolating your browsing habits from those of the different users of the Tor Network.
>running tor through palemoon fine for months since palemoon is the only browser that doesn't memory leak imagebaords until my computer freezes >suddenly tor through palemoon slows to a crawl >tor through TBB loads fine >TBB memory leaks and constant errors when loading pages, more auto refresh timeouts than any other browser This is fucking stupid. Why are browsers all so fucking bad. Why the fuck would TBB load tor faster than palemoon for no reason out of the blue. This is fucking retarded. Fuck the internet.
>>1171 Guess: Javascript on?
>>1172 Yes, but I fixed the loading times by switching to a fresh install of palemoon. But now I can't access hidden services through tor with palemoon. It's bizarre but I don't necessarily need access to hidden services so it's not a big deal. I have to assume either palemoon or tor broke something since I recently updated all my packages. I'm never fucking updating packages on a stable system ever again, rookie mistake.
>>1173 >changed no variables and now hidden services are working I've given up on trying to understand computers.
>>1173 Uhh is palemoon asking your clearnet DNS provider to resolve onions?
>>1175 On second thought yeah that was probably it. I forgot I switched the DNS over to tor which is probably what fixed it.
Would it be possibly to achieve a configuration where you download the contents of a webpage, for example an imageboard, and any files you load like webm's, over the clearnet, but have files and posts you upload to the page be masked with tor?
>>1248 That sounds like a bad idea, in any case you can do it by only lurking on a clearnet browser and posting on tor browser
If you want to be anonymous and care about security. Just fucking use Tor, don't forget to turn off js
>>1315 >If you want to be anonymous yes >and care about security no fuck no Tor is possibly the worst common choice in terms of security. If you're not a target and not a retard it's not a problem but don't spread false advice. Good starting point (see also links at bottom more concerned with Tor than Firefox) https://madaidans-insecurities.github.io/firefox-chromium.html
>>1483 >literally who blog >links to a medium.com shill as a "security expert" source Try again?
(38.47 KB 720x540 kys glownigger.jpg)

>>1486 >i don't know who it is, therefore a well-known security OS dev is a literally who >facts don't matter if the writer isn't an e-celeb >a world renowned security expert who literally sells exploits to nation states and specializes in anti-forensics, counterintelligence and operational security is bad because they published a blog on a platform you don't like
>>1483 >>1486 >>1489 Every browser sucks, use palemoon
(392.90 KB 640x360 77e.gif)

>>1489 >If you want to be anonymous and care about security. Just fucking use [outdated homogeneous Firefox]
>>1489 >a world renowned security expert who literally sells exploits to nation states is totally the first person you should trust when he tells you that you should use a VPN instead of TOR to hide from a nation state Glossing over your abortion of a reply, the fact remains that your "well-known security OS dev" blogpost also contains a link to a hackernews comment as a "security expert" source. Said hackernews comment is full of hot takes, sorely lacking in sources, and written by a user that appears to often shill apple products. Therefore, it's quite interesting how you're eager to label anyone you don't like as spooks yet fail to see obvious signs of shilling as long as the post confirms your opinions.
>>1493 >when he tells you that you should use a VPN instead of TOR to hide from a nation state That's not what he tells you. Read the article properly to avoid strawmanning. The closest to that he says is that if someone is in a nation that would imprison you for Tor usage (like some in the Middle East), saying 'just use TBB' is horrible advice. >contains a link to a hackernews comment as a "security expert" source. >further reading == source That's an EOF for me.
>>1493 >abortion of a reply says the author of >>1486 which doesn't even attempt to refute in any way the insecurity of using a common, outdated version of firefox widely used by enemies of multiple powerful states and by crypto users (financial sector incentive) >inb4 just turn off js that helps a lot, but it's only one part of the gaping problem. just turn off js in any other hardened version of chromium or firefox or palemoon and youre more secure. even the founder and leader of openbsd calls firefox security shit, and this was before they sacked most of the security team due to covid.
>>1315 >secure ok glowdark
>>449 >it's operated by sjws&trannies Because the FOSS paradigm is inherently left of center. Historically ""leftists"" have been the main groups that really cared about anti-government/anti-capitalist software creation. It doesn't mean that all privacy devs were left-wing, they just have to have had a certain left-wing political view (because politics is more complex than a person being left<->right, conservatives can and often do have some leftist opinions). Even Gab is just outdated, rebranded Mastodon.
>>1500 (it is free to be nice to each others)
>>1500 Anti-capitalist I can agree, but anti government? Neither socialism, communism or idpol bullshit left can exist without a BIG state regulating everything. Anti-govenrment is more akin to those on the right/conservative spectrum that lean towards libertarianism, and useless anarchist faggots.
>>1506 Nah, conservatives aren't anti-government. They're anti-government in terms of regulating the economy, but they still want the government to be their buddies in case they need someone there to make laws regarding people that don't follow their religion or any case when they use simple social psychology concepts and create groups in the intent to turn them against each other (both sides do this though). Meanwhile anarchyfags are considered far-left. My views, for reference, is fuck both sides. Both are reliant on the government but they define their reliance in different ways.
>>1506 /t/ not >>>/pol/ so please fuck off
>>1507 >Meanwhile anarchyfags are considered far-left. Who the fuck considers that? That's fucking bullshit. Literally nothing on the left spectrum is compatible with anti-government. >They're anti-government in terms of regulating the economy, That's what I said when I singled out the libertarians. >>1508 Very kind but I'll decline. Thank you very much
>Who the fuck considers that? That's fucking bullshit. Literally nothing on the left spectrum is compatible with anti-government. nigga what? it's a whole quarter of the political compass. Most types of anarchism are considered left-to-center. But the whole left-right paradigm is retarded so there's that to consider.
>>1515 sage for politics, I never understood why anons seem to view leftists in technology as a new phenomena. A lot of open source developers, and especially crypto anarchists, historically were left leaning (anarchists should be a hint). They were just less concerned about diversity and inclusion. Bitcoins really the only thing I can think of that's more right leaning. >>449 >"Ungoogled" Chromium is still Chrome garbage Are you saying it's bloated or you think it's still spying? I think the first is irrelevant and the second onne you'd need proof. >Firefox is rapidly becoming a shit browser for privacy I think most people here could figure out how to customize it to get better privacy protection. Tor is still good, but if you care about privacy I think ublock origin is sufficient for the most part. Anonymity is it's true strength.
>>1519 Lol it removed it after the block bypass
>>1519 >Are you saying it's bloated or you think it's still spying? Not him, but he probably means "it's still strongly controlled by Google": if Google sabotages adblockers with ManifestV3, for example, Ungoogled Chromium can't do much to stop that. The whole project is a bandaid at best. >I think most people here could figure out how to customize it to get better privacy protection. "But you can tweak it" is a short term plan at best, and Mozilla's clear lack of respect for privacy has made that clear.
>>1515 >it's left because I read so! I'm not saying it's not considered left for some weird reason by some authors. I'm saying it shouldn't. It's completely incompatible with the communist-leaning left that requires a gigantic state regulating everything, much like any form of socialism and everything to do with idpol which requires big daddy state telling off the "intolerant" meanies. It's closer to the extreme libertarianism, the anarcho-capitalists that don't want a state at all. Anarchism is inherently capitalist since there's no regulation and there's free trade of goods/services. Even minarchism, a practically applicable form of anarchism (in the sense that State is very at the very least) is very capitalist.
>>1544 >It's completely incompatible with the communist-leaning left The communist-leaning left has as much to do with the rest of the left as the lolbertarian-leaning right has with the rest of the right, the whole left-right axis stops making sense as you go further away from the centre.
>>1546 >The communist-leaning left has as much to do with the rest of the left as the lolbertarian-leaning right has with the rest of the right Which is a lot? Libertarians agree with conservatives on economic liberty and less taxes, idpol faggot leftists agree with communists on big State regulating a lot of shit. Anarchists on the other hand have nothing in common with these 2 branches of the left and quite a bit in common with libertarians. >Left-right dichotomy doesn't work I agree but my point is that in this bullshit conceptology, anarchists should be on the right. I explained why.
>>1548 >Which is a lot? Having a few minor common points doesn't mean they don't fundamentally loathe each other: the right sees libertarians as populist con-men with no respect for traditional values, the left sees communists as fascists trying and failing to fit in. Also, the points you mentioned aren't even common: "economic liberty" for conservatives is subordinated to hundreds of other concerns, which is why you'll never hear a conservative say that you should be able to hire foreigners to pay them less than local workers, and the moderate left absolutely isn't friendly towards Big State as a concept (hence the emphasis on cooperatives and grassroot movements) while communists hate current Big State because they want to be Big State.
>BLAH BLAH BLAH LOLBERG XDDDD remember how you fucks shit up your own boards with this non-tech retardation while DAY OF THE SEAL was carried out
>>1549 >Minor The points I mentioned aren't minor at all, the size of the government is a big deal. According to the shit you described, though, it seems that nothing fits within this left-right axis so it's very useless to call things left or right when there are fundamental differences within the same side of the axis, making the conceptology useless. So yes, let's agree on the axis being dumb and call it a day. Anarchists not being left is only a small part of the problem. I only have one question, in what sense are libertarians populists? There's nothing populist about the idea, those that don't work enough to generate enough revenue are not given any freebies.
>>1552 >the size of the government is a big deal. Ask three people how to measure such size, you'll get four different answers. Outside of lolbertarians (and arguably totalitarians) nobody puts much focus on it. even indirectly: for example, it's common to see the right wing argue for both lower taxes (smaller government?) and more police (bigger government?), or the left wing argue for more worker rights and less military funding. >in what sense are libertarians populists? They're the political equivalent of a pyramid scheme: work hard enough and you'll be rich, every man for himself, morals and laws are antiquated obstacles on the way to success... From a conservative POV, the whole thing is an appeal to the least noble instincts of men, working to tear down even the most sacred social structures and any shred of patriotism that might remain.
>>1554 >Ask three people how to measure such size, you'll get four different answers. That's only relevant to a question of semantics. If you insist on them disagreeing on the meaning of "size", then, instead, present them with whether they think a large amount of institutions, gov. workers, legislators, taxes, public spending, etc, specially relative to the size of the country, constitutes a big deal. >They're the political equivalent of a pyramid scheme How? Pyramidal schemes entrap you on a neverending string of debt. How is this politically analogous at all? >morals and laws are antiquated obstacles on the way to success I understand you're speaking from the hypothetical perspective of a conservative, but where did you get this shit from? Libertarians aren't ant-laws. They're also not anti-morals, they just don't put emphasis on them. Is there any reasoning behind the way conservatives think this way?
"TOR is compromised" is a fun way to mess with paranoids, mostly. There are some suspect things, but nothing is flawless and without concerns. The real concern is that there isn't a proper fork of it that works on ARM architecture, just a proxy to install that hooks into firefox. I want TOR on my pi, dammit!
>>1570 i had tor on my pi years ago. not tor browser though
>>449 >Literally everything is now, including VPN services and ISPs Not at all, you're just not going to have an easy time finding them and using their services. I dropped Tor (Browser) because I was too much of a bitch to handle the slowdown and inconvenience and the Tor Project cucked to terrorists by providing them advice. So I just switched to Pale Moon with a VPN and privacy addons. Dunno how well it works in comparison 'cause I'm frankly new to going this far in keeping my online privacy intact.
>>450 Forks of Tor aren't really necessary when other projects like I2P and Freenet exist.
>>1486 blog is literally written by Whonix's security researcher.
(32.43 KB 640x615 gtfo.jpg)

>>1715 >leddit spacing You need to leave.
(12.77 KB 540x390 problem-solved.jpg)

>>1661 If you're using Linux and want to do some really easy stuff to improve your internet privacy, then try installing the bubblewrap package and then run the following line in a terminal bwrap --dev-bind / / --unshare-user --uid 256 --gid 512 bash That'll create a sandboxed terminal environment on your kernels user namespace. You can use other namespaces with the --unshare command. Then use the cd command to change to the directory that Pale Moon is in. Make sure that you've installed both the Tor and Torsocks packages and run the following command. torsocks ./Pale Moon Pale Moon should open, except it'll connect to Tor. MAKE SURE YOU SET UP A FIREWALL AND SET THE FOLLOWING RULES >deny incoming packets >deny outgoing packets >add an allowance for packets that are going in and out on port 443 and ONLY port 443 >add another rule that all traffic going through port 443 MUST be TCP. Tor Browser uses TCP so if you send UDP traffic over Tor then you're going to stand out. You can also configure your distro to connect to Tor via your VPN (so your connection looks like You --> ISP --> VPN --> Tor network --> Website ) but I've only combined a VPN with Tor before, not Torsocks, so I couldn't help you there.
>>1733 >torsocks ./Pale Moon My bad, that command should actually be >torsocks ./palemoon
>>1733 >bwrap --dev-bind / / --unshare-user --uid 256 --gid 512 bash >dev-bind / / the fuck is the point of sandboxing if you're just giving full access anyway, your not even mounting it read only.... You might awell skip sandboxing alltogether cause every application launched with this will be able to finger print you easily just by reading/writing a file.
(64.26 KB 1200x638 you know what to do.jpg)

>>1715 >some literally who faggot who unironically uses T*legram and has no PGP key on his page Here is even better security researcher: https://darthsecuria.neocities.org/
>>1820 >t. glowing shill
>>449 Tor
>>1570 nigga you blind i've been hosting my onion shit on a rpi for years now
Would the kikes forcing any/all dissidents into using Tor essentially lead to an easier time datamining/tracking them versus VPN on the clearnet?
>>1883 Depends on where you live at. If you live in the US or Western Europe you'll stand out like a sore thumb to your ISP as Tor is not considered a necessity in the West. Your ISP could have your account noted for future investigation were you to ever drop your guard or be flagged for whatever reason. NSA and FBI also have access to your browsing history. While your ISP cannot identify the Tor traffic they do know you are using Tor. Your ISP can also identify VPNs except VPNS are not known for being used for criminal activity like Tor is and they perform the same function of gaining privacy from your Internet Service Provider. There's also a chance an Exit Node can be government/police owned or have prying hackers. Using a VPN would shield your Tor traffic from your ISP and your IP address from Exit Nodes. Though VPNs are usually fine on their own. Tor is slower and has a lot less compatibility with most sites on the web especially those backed by Cloudflare. With VPNs you usually don't have a problem going to whatever site you want and security compromises/arrests with VPNs are usually unheard of.
>>1884 Thanks for the detailed response. So essentially, besides the exit node scenario, using a VPN combined with Tor would mitigate my ISP from knowing I use Tor? I do notice it's slow as balls and barely loads some sites, but I can put up with that if the security is guaranteed. Is it also true you should never use Tor to brows clear-net URLs?
>>517 you click the picture to make it go
>>1884 > Your ISP can also identify VPNs except VPNS are not known for being used for criminal activity like Tor is and they perform the same function of gaining privacy from your Internet Service Provider. Fucking what? The whole purpose of a VPN is for piracy, for criminal activity. It's been pushed into the mainstream recently by concerns of privacy and region-locked content but literally anyone who looks into them the slightest bit knows they are for piracy and not privacy. Hell, a lot of VPNs aren't even private, as noted by the recent case of NordVPN moving their servers to America, in which America forces VPNs, among others, to log data and give it to the government. Meanwhile, at least in the privacy scene, a lot of people have been pushing for people to use Tor. Sure, maybe the average citizen is more likely to use a VPN than Tor, but a solid 26% of Tor's traffic comes from the US, or 500k users, at least if their metrics are anything to go by. Tor is known to governments as being used for privacy. To a regular person, maybe they know it as being used for criminal activity, because it's built up that reputation, but to government agencies, they know a metric fuckton of people connecting to Tor are using it for privacy reasons and not criminal activity.
>>1885 >using a VPN combined with Tor would mitigate my ISP from knowing I use Tor? Yeah as long as you're using a VPN outside the 14 eyes(Express, Nord, Surfshark, Cyberghost), and enable the Kill Switch in your VPN to protect your internet traffic incase of a cutoff. Free VPNs and USA/Chinese based ones would compromise you. You need to be sure your VPN is registered in a country outside surveillance nations. >I do notice it's slow as balls and barely loads some sites, but I can put up with that if the security is guaranteed. Yeah its guranteed as long as you disable javascript either through security settings set to "safest", configuring noscript or about;config. >Is it also true you should never use Tor to brows clear-net URLs? That's what they say and its true that with hidden services(aka onion url sites)you have more privacy but personally haven't seen any data leaks with Tor. Your Tor traffic is likely going to be bouncing back and forth from one node to another so you're likely safe as long as you don't enter personal information or sensitive credentials.The said URLs are unlikely to leak outside of Tor. >>1890 >VPNs used for Piracy True true, however they have a myriad of uses outside of that including protecting your data against hackers in wifi spots, circumventing Geo-blocked sites, etc. Corporations also typically use VPNs to protect their trademarks. >Hell, a lot of VPNs aren't even private as noted by the recent case of NordVPN moving their servers to America, in which America forces VPNs, among others, to log data and give it to the government. Yes but the way it goes in the VPN biz goes is that the FEDs only have jurisdiction over the VPN data if the said VPN company is registered within said country. Even if Nords servers are in United States, in Europe, their business is registered in Panama and therefore aren't required to legally maintain logs in the United States or Europe. If the US wants to get logs from perse from Express VPN or Nord customers, they had to go through the British Virgin Islands or Panama courts to gain access to said information on American subscribers. It also helps that VPN news on logs being turned over to authorities or those being subpoenaed/searched are incredibly rare. PureVPN was one of the recent ones and that happened a few years ago so I think you'll get some millage out of VPNs or at least I'd rather trust my VPN than my ISP with my data. >a solid 26% of Tor's traffic comes from the US, or 500k users That's pretty impressive tbh considering there isn't much to do in the onion network but perhaps its just being used as a browser vpn at this rate for some people. >Tor is known to governments as being used for privacy And that's why they are desperate to crack down on it and stigmatize the tool. Its legal to use Tor but as it stands its rep isn't so great. Maybe if it gets more adopters down the road that might change.
>>1890 >"VPNs are for piracy, not privacy" >doesn't realize how fucking stupid that is to say (how the fuck is a service good for illegal activity if it's supposedly non-private)
>>1890 >The whole purpose of a VPN is for piracy, for criminal activity. VPNs are for connecting to your company's internal network from remote, you fucking nigger. That is and always was the prime use case of VPNs. And yes, they have been memed into a "privacy" device later by braindead consumers (the whole business use case was braindead security theatre in the first place).
>>449 >>it's operated by sjws&trannies Literally everything is now Thread should end before it began considering that that would negate the point of Tor in the first place as law=ethics for many. Drugs and privacy are illegal so Tor can't last if it's sjw and law abiding and ethical and shit. Fuck it.
>>449 >not really whew i feel relieved now...
>>1979 everybody fucking knows that vpns are so they can make money from piracy and everyone knows that isps stopped hosting newsgroups so that they could force y8ou to buy newsgroups from somie people to .. again make some money off piracy
>>1891 it's a lot better to run a VPN on the router itself, such as PFSense, rather than relying on kill switches
why the fuck is 'ExcludeNodes {us}' not in torrc by default
>>3299 also why does sending SIGNAL NEWNYM to the controller do nothing half the time, everytime I want to force new circuits I have to kill tor and fucking restart
(236.58 KB 1454x1500 operating.jpg)

The Tor browser is for normal fags looking to jack off to lolis at work, so they can make noise on the network to hide the rest of us. If you can't tell apart the Tor network from that shit browser they shill, stay off of both.
>>2385 this
>>995 sites like browserleaks.com alert if an IP is a Tor node. Admins use the same tools to block connections.
>>3301 looks like a jawa
>>3308 lol
>>456 Neronormals are too busy murdering anyone that likes little girls.
>>3306 >sites like browserleaks.com alert if an IP is a Tor node. Admins use the same tools to block connections. If white men weren't FAGGOTS, like they are now, they would run unlisted exit nodes (ie: has an input-ip different than the output ip it uses). Also they would fork Tor and actually make this a feature. But white men are FAGGOTS now and let "duh gubbament programmes" do all the work. We used to have hackers in opensource. Now we have NOTHING.
Freenet still doesn't run over Tor. Shows you how much "uncompromised" these projects are.
>>561 > I think Tails does too, even if it's liveUSB Tails uses systemd
>>449 If you're not using a Tor gateway, you're part of the cannon fodder protecting the rest of us. Thank you for your services.
>>3435 Why? That's fucking retarded.
>>3612 superior process management also that killswitch to corrupt ram when pulling the usb out works with a daemon init cucks will swerve to the d
>>1500 Tor didn't used to be run by sjws and trannies. They took over after the software was done. >Because the FOSS paradigm is inherently left of center. >Historically ""leftists"" have been the main group Wrong. From 2000-2009 "foss" (that term didn't exist then) was men-only, pro-loli, anti-feminist. Women kicked us out of all of our projects by taking over the web hosts. Every single one. Any project that didn't bow down was deleted from the webhosts or censored from the announcement websites. That's once we completed the software.
>>3617 No: it is because systemd can be remotely exploited. The Tor people hate pedos, hate anti-feminists, and hate men. They are pro-women's rights, pro-tranny, pro-USA
Now it has script enabled, and it auto enables script on restart but shows no script icon, so this is surely honeypot.
I can say that I've been using tor for illegal activity. Not kiddie bullshit. But actual over state line . Packages filled with drugs etc. I did it for 4 years straight never had an issue. Once FBI showed at my residence but I later pieced together it was an old friend who was knowledgeable of what i was doing . And exactly what he knew is exactly what I was questioned about . The FBI agent had some virgin with him he pays to translate for him because they are literally so behind on tech they need to outsource their nerves. They even offered me to work for them and said I can make alot of money ... ( yeah right ) no I'm good . So anyways the point to this was. Tor was actually more secure than my friends and family was. I looked up recently i transferred over 3 bitcoins over a 4 year period. Just VPN and tor. And sometimes I'd connect to a open wifi. And for messaging always use a PGP program to encrypt your communications back and forth. Or use protonmail etc. I do want to emphasize there is truth to the relays and nodes being owned by some government. And the OP is fully correct by saying the more we use adopt and set up ourselves. Thr less power they have. But just take my story and ask yourself if what your doing is worse than what I was doing and they didn't catch it. Or didn't care enough. . OR tor actually helped keep my identity private . Any and all possibilities are still good to me .I myself have donated to their project . They have helped me greatly .
>>1506 of course they are anti-government. As long as the current government isnt the one they want. Take a look at the newly formed DPR state that was formed in captured Ukraine and youll see the people there talking the usual anti-government talk until Russia took over and now they mysteriously went silent
>>455 Exactly. Not sure why people don't understand this. sure one country might try and block it. but everyone wont.
Ironically my experience with Tor sometimes is that it get less blocked compared to a VPN, I would say it's at least better than it because, there is no profitable company that could get their service shut down if they don't work with the feds.
The only ppl that need to use tor are pedos
Schizo here... One day I was browsing through my internal Google bug bounty hit lists and saw what was like an assembly that I could convert into a plugin that translates a ray to be usable as an entry point from your lanes. On connection it splits the subset into 8-10 usable proxy's . I don't know how much snowflake is helping with speed but I've seen sometimes around 2 megabytes/second now. I've got plenty of designs that I'm still working on too.
So, I will be working on the "lathe" style for encrypting soon. All of it looked good. I was told that discord was not secure utilizing my lattice style I have been helping codevelop, but it all checks out. Lmk if you notice!
I will be testing my "lathe" encryption soon after someone asked me if discord was secure enough with my "lattice" encryption. The only way I can figure it gets breached is possibly with some of those Rusa instructions that were labeled "continuum"
>>450 it really doesn't change much if the browser just werks (TM)
>>455 >If you aren't capable on typing Tor network's name correctly It's an acronym, The Onion Router = TOR. >but we're special snowflakes and use our special snowflake grammar! Fuck you.
>>450 >it's operated by sjws&trannies >So, why has no one forked it? Because it's already it's operated by the main userbase, sjws & trannies...
>>5631 It's not our acronym: https://support.torproject.org/#why-is-it-called-tor Not the original anon, but, again, you should learn more about it before you actually criticize it.
>>5737 >Note: even though it originally came from an acronym, Tor is not spelled "TOR". >Note: even though I'm originally a man, I am not a "man."
(529.77 KB 600x900 13413413434.png)

>>452 The main reason Tor was not axed is because the government and military still use Tor. >>521 >you can set applications to use by pointing their SOCK5 proxy settings to 127.0.0.1:9050 by default. the reason that nobody talks about how to "use Tor" beyond using the browser is because unless you're hosting a node or a bridge, connecting to the network is pretty brain-dead simple At that point if you're going to torify all the crap, then use Whonix. >>1733 Might as well learn to use firejail profiles if you haven't a clue what you're doing. >>everyone >VPN to Tor Unless you're using a Tor bridge or obfuscation of some kind, chances are your ISP already knows you use Tor. Whether or not you're using a VPN, Deep Packet Inspection can be employed to notice Tor traffic. Don't let this stop you from using Tor however. The more people that use networks like Tor the less unique its users become and more socially acceptable Tor becomes. Keep in mind your changing your Tor traffic start from your residential IP to your VPNs. You're increasing latency and could change your threat model depending on what the situation with your VPN is (like VPN breaches, or data retention practices).
I'm having trouble buying or trading for shiba. Coinbase pro won't let me. Is it because im from ny?
It is technically inferior to I2P in every possible way, but since a lot more people use Tor than I2P, it's more practical to use Tor.
>>6315 i2p solves other problems than tor both are important , stop being an edgy kid
>>515 >duckduckgo LoL. >>4349 >pro-loli Sauce on FOSS being Pro-loli, boss?
>>1529 >"But you can tweak it" is a short term plan at best Doesn't that apply to most GNU/Linux distros? >>6010 >The more people that use networks like Tor the less unique its users become and more socially acceptable Tor becomes. Normalfags aren't privacy oriented. Tor usage will most likely increase the more paranoid you can make the average normalfag, which means the more distrust in the gubberment there is and the greater the destabilization of society, the safer using tor is.
>>4464 But did you get revenge on the narc? >>5101 What about drug dealers?
>>6402 Why does distrust in the government cause society to be "unstable"?
>>6407 Not what I meant if you follow the grammar I used. I said >the more distrust in the gubberment there is and the greater the destabilization of society, the safer using tor is. Not, >the more distrust in the gubberment there is, the greater the destabilization of society, the safer using tor is.
>>6385 I2P solves every problem that Tor solves, but better
If Tor worked it would be illegal.
>>6499 the government really doesn't care that much about you doing drugs while watching CP
>>6501 Then why are you using tor? That's all torfags do, so stop using it if no one cares. But you do, because they do, what they don't care about is tor because it does nothing or else it would be illegal since it might interfere with their arrests.
>>6502 >Then why are you using tor? That's all torfags do, so stop using it if no one cares. I thought it was used for white supremecy/domestic terrorism. i bet those jan 6th nazis used tor
>>6499 >If Tor worked it would be illegal. tor isnt a wetback
>>6499 >>6502 >If Tor worked it would be illegal. I disagree. There's lots of things that impede "law" enforcement that are still legal. Guns are the first thing that comes to mind here in the US. Other things are cash, precious metals, Privacy coins, encryption, and P2P programs.
>>6514 >still legal for now
how do I get the client to allow bw runs on built circuits I keep getting [code] 513 Unacceptable option value: TestingTorNetwork may only be configured in combination with a non-default set of DirAuthority or both of AlternateDirAuthority and AlternateBridgeAuthority configured. [\code] its already running a through socks so this message doesnt tell me shit
>>6514 But Tor doesn't impede law enforcement, or it wouldn't be legal. Guns are different because confiscating those door to door gets you killed, Tor not being an impediment just means they ignore you using it because it doesn't do anything but contribute to your hacker LARP lifestyle.
>>6539 >But Tor doesn't impede law enforcement, Well, the word impede means to make something more difficult, which then bears the question, more difficult than what? Also, the NSA and CIA are not law enforcement. When referring to law enforcement I am assuming that in order to gain information on a suspect that they will go to one of the big tech companies, either physically or remotely, and request all the information that they have for a certain IP or IP range. The company will usually hand this information over without objection. So how is getting this same information about a TOR user easier than that? Are you suggesting that the FBI has cracked the encryption and is harvesting data from a gateway node? If so, please post a link because I am genuinely interested.
>>6539 >Tor not being an impediment just means they ignore you using it because it doesn't do anything but contribute to your hacker LARP lifestyle. Never mind, I think I >>6542 misunderstood what you posted
>>6539 >Guns are different because confiscating those door to door gets you killed I believe most gun owners that bothered to register their firearm would also comply with a door to door gun grab. the only ones willing to shoot a cop would be niggers, drug dealers and other felon types. cops are more likely to be killed by their covid vaccine than by a registered gunowner
>>6551 >gun owners that bothered to register their firearm Which states have gun registration laws, besides for a CCW? California perhaps?
>>6551 Based niggers and felons.
(309.57 KB 1366x768 xonotic20211215204954-00.jpg)

>>5109 >I don't know how much snowflake is helping with speed but I've seen sometimes around 2 megabytes/second now. Helpful with uploading ChaosEsque. snowflake got it taken off of moddb tho. Also snowflake likes elliptic curve crypto: which cannot be trusted.
>it's operated by sjws&trannies Literally everything is now, including V SJWs and Trannies did NOT start ANY of these projects. Men did. Electrical Engineers and Hackers. Tor was started by Men in the Navy. Who were NOT SJWs: The Navy is the Traditional place for such men. So no: we don't have to accept it; nor should we. They took our world and then banned us from it.
>>451 >same reason why most of the relays and nodes are still government operated. Everyone wants speed. No one would use it if it wasn't fast. In the beginning mostly hackers and the Navy operated the nodes.
>>470 >>If that isn't enough, TOR traffic can be blocked by ISPs using DPI. which is blatant propaganda. Then the sjw faggots the govt hired better fix the fucking code. The ofbjproxy is supposed to circumvent that problem.
>>6401 > >>4349 >pro-loli Sauce on FOSS being Pro-loli, boss? >"The nominee is quoted as saying that if the choice of a sexual partner were protected by the Constitution, "prostitution, adultery, necrophilia, bestiality, possession of Democrat activismography, and even incest and pedophilia" also would be. He is probably mistaken, legally--but that is unfortunate. All of these acts should be legal as long as no one is coerced. They are illegal only because of prejudice and narrowmindedness." > >RMS on June 28th, 2003 https://stallman.org/archives/2003-mar-jun.html > >-------------------------- > >"I am skeptical of the claim that voluntarily pedophilia harms children. The arguments that it causes harm seem to be based on cases which aren't voluntary, which are then stretched by parents who are horrified by the idea that their little baby is maturing. " > >RMS on June 5th, 2006) https://stallman.org/archives/2006-mar-jun.html#05%20June%202006%20(Dutch%20paedophiles%20form%20political%20party > >-------------------------- > >" There is little evidence to justify the widespread assumption that willing participation in pedophilia hurts children. > >Granted, children may not dare say no to an older relative, or may not realize they could say no; in that case, even if they do not overtly object, the relationship may still feel imposed to them. That's not willing participation, it's imposed participation, a different issue. " > >RMS on Jan 4th, 2013) https://stallman.org/archives/2013-jan-apr.html#04_January_2013_(Pedophilia
Given the fact that ISP's can see you connecting to the network and that the government probably performs deep packet inspection on some users, what is the best way to obfuscate connections to the networks? this is my current setup: >Tunnel VNC through SSH to VPS in another country. >Use Tor Browser via the VNC viewer from that VPS. Ofcource the cloud provider knows who owns the server but im thinking that because its in a differenct jurisdiction my traffic will look legit.
Is there anything like Neocities for Tor? Are there any good Onion-only webrings?
>>6851 Interesting. The traffic coming directly from you will not look like Tor traffic.
>>6851 >>7080 You can use bridges to hide the fact that you are using tor.
There are a lot of sites that already exist that I kind of wish they had an onion link to access them. Or, more generally, it'd be nice to have a lot more 'normal' onion-sites. E.g., news sites (that aren't just crypto and drug news), informational sites (like, idk, a darkweb wikipedia about...normal human history instead of just where to get drugs), stuff like that.
>>7412 https://www.bleepingcomputer.com/news/security/researchers-use-gpu-fingerprinting-to-track-users-online/ Webgl probably should be disabled if you need javascript on to unbreak a website but I don't think it does anything if you're browsing with javascript off as recommended. There's the possibility of having multiple sessions linked together into a single profile if you regularly change your settings to something nobody else uses and that becomes detectable, although whether that profile can be linked to a real world identity is a separate problem. http://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/study-using-stylometry-to-detect-a-vendors-alternate-profiles/ And of course there's other soft methods to take into account.
>>7413 >Webgl probably should be disabled if you need javascript on For sure https://thehackernews.com/2022/01/your-graphics-card-fingerprint-can-be.html >settings to something nobody else uses Guess we should spread the link in >>7412 more often
(782.66 KB 659x1200 1657654654654647.png)

(1.03 MB 659x1200 1657654654654646.png)

Tor marks all my posts with (You) unless I use new identity every post. And at some point I'll use the clearnet version because of how slow Tor is, so it would be pretty easy to determine which posts are mine. Does Tor have any point?
tfw i use opera to buy firecrackers kek
Not a reply since 2022? Damn! Anyway, bumping for a curated list (if possible) of working .onion links, most of the sites I used to visit, like the imperial library of trantor, are dead.
>>12380 This still works. I last checked an hour ago. zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page
what if we started putting our own cube-sats and use it as exit node from tor ?
>>449 >it's a honeypot do people genuinely think this?
>>450 because people who unironically say things like "SJWs" and "trannies" are incompetent
Has anyone else had issues with Tor Browser for the past few weeks? Both Flatpak desktop and Android mobile have broken for me. >>14011 ^
>>14011 Tor isn't just the codebase, it's also the huge network of nodes that form the backbone of its anonymization and are also a significant attack vector for deanonymization. The entire architecture is built around expensive to maintain entry nodes and legally risky exit nodes. An intelligence service can operate many instances of both.
>>449 bruh, it's well known that nsa controls almost all the exit-nodes, if not all of them. tor is as secure as a wet fucking sieve.
>>450 what would be the point? What would you put in your fork? >it's the exact same project but I'm not a tranny


Forms
Delete
Report
Quick Reply