/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Uncommon Time Winter Stream

Interboard /christmas/ Event has Begun!
Come celebrate Christmas with us here


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(17.16 KB 474x253 th-2382814816.jpeg)

Connect to Tor Anonymous 05/10/2022 (Tue) 14:22:14 No. 8395
What is the safest way to connect to the Tor-Network? Is this the safest possible way: Tails (VM) -> VPN -> Bridge -> Tor-Network
tails > dnscrypt/unbound > proxy > obfs4 wrapper > VPN > bridge > tor
>>8395 >>8400 Why would you go through VPN to connect to Tor?
>>8436 Because some nodes are compromised and expose your IP when in clearnet anon this is /t/ 101
>>8395 You seem inexperienced with anonymizing software, I will give you some advice. Connect to Tor before anything else. If you wish to obfuscate your Tor connections, use Tor bridges, don't connect to a VPN before Tor. Do not listen to the dunces telling you to connect to a VPN before Tor newfriend, by relaying your connection through another proxy before Tor you are routing your traffic through their servers before Tor, this is idiotic as that traffic can and inevitably will be linked to you. These services are not trustworthy, nor is Tor, Tor is a damn sight better than any VPN service. By using Tor to mask your IP address you are allowing yourself to hide among the countless other people using the Tor network, this is just one of the many reasons Tor is superior to normal proxies. If you must connect to proxies, chain said proxies to the end of your Tor circuit, never before. Why are you running Tails in a VM? Just use Whonix, Whonix outclasses Tails, Whonix can be run live just like Tails. There is no need to use Tails anymore, use Whonix. I would recommend running Whonix KVM to avoid Virtualbox, however it almost certainly makes no difference at all as regular Whonix is KVM, Virtualbox just acts as a paravirtualizer interface. Are you using Windows with Tails in vmware? It tends to be windowsniggers running Tails in vmware.
>>8436 You wouldn't. By connecting to a proxy before Tor you are undoing the entire purpose of using Tor: hiding among the millions of people using the Tor network. >>8470 >Because some nodes are compromised and expose your IP when in clearnet Your VPN is compromised. There has never been a privacy respecting VPN service. You can never know a VPN provider is not logging your traffic or spying on you. Tor has a far better track record than any VPN service, where are all of the people being arrested through the Tor network for crimes? Zero. Not a single one, only people who made operational security errors (like connecting to a honeypot proxy before Tor). IP leaks have rarely happened to people who used Tor properly, those vulnerabilities were also patched long ago so I don't know why people keep harping on about it. VPNs can also leak your IP, they are far more likely to leak your IP than Tor. People at risk of IP leakage now are tor users with janky configurations, and they still have a very low chance of leaking their IP. The chance is there, they should check their IP regularly to ensure it is not leaking. Everyone should do that.
>>8436 Tor relies on encryption. Encryption relies on relatively slow brute forcing. If computers improve significantly in your lifetime then you are vulnerable to anyone who can grab your traffic. Governments of the world have already claimed they grab all encrypted traffic and likely have vast processing power.
>>8470 Does that matter though? I don’t care if my IP is known, I care if what I see or type is connected to me. My isp already knows if I use tor, all that matters if the second 2 nodes are good enough to hide my traffic.
>>8471 >Connect to Tor before anything else I have Tor Browser on my PC and Mullvad VPN on my router, is this ok?
>>8481 >By connecting to a proxy before Tor you are undoing the entire purpose of using Tor So all the gov't has to do to defeat your Tor protection is insert a proxy between you and the Tor node?
>>8395 Any way
>>9126 It will work
How can I use facebook and Twitter with Tor?
>>8395 >>8400 >all the hoops and network gymnastics you would have to go through just to peep on some underage cunny.
>>10610 But it is worth it
>>10620 on zeronet you used to find terabytes of Democrat activism within 5 minutes of opening the browser window. I mean i was there for free speech but cp was everywhere
>>8481 vpn before tor doesn't make you more secure, it also doesn't make you less secure. it has almost no effect whatsoever once the traffic is routed through the network.
(57.27 KB 680x440 truckload-o-laffs.jpeg)

>>8395 >Tor >safe
>>11238 Not necessarily true. There's a ~95% chance my ISP has glowniggers on their payroll (see Twitter files). They will notice my Tor traffic and target me specifically for deanonymyzation. Mullvad might have glowniggers in their IT staff too, but it's only ~10% chance. Same concept with copyright infringement. My ISP has copyright lawyers and FBI agents spying on all my torrent traffic. I get a threatening email every time I download a move without using a VPN. Mullvad does not have agents of the MPAA/RIAA/etc doing their network administration
>>11275 I will say though, there's a good chance there are ADL stooges working at the big name VPN companies. So I can't fedpost too hard even from behind a VPN
>>11238 >it has almost no effect whatsoever once the traffic is routed through the network. Additionally, if my ISP notices I am using Tor, even if they can't decrypt my traffic, I would still be put on their shitlist for heavy monitoring and possibly termination of service for "abuse of network resources" or some bs
>>8395 >Tails Its unnecessary unless you are under surveillance(by a parole officer typically) or are using a shared computer. If you have your own computer and are not under surveillance, Tails is unnecessary and cumbersome for everyday practical use. >Safest Way to connect to Tor-Network? If you aren't visiting any dark web/onion sites, typically Tor is sufficient but a having a properly configured browser with a VPN is provides more speed and compatibility with most websites. Cookies are a thing but you can configure your browser not to accept them and have a separate internet browser for everyday shit like banking, shopping, etc. >>10650 >CSAM on Zeronet Not surprised that's why it never took off outside of China where they have their own isolated communities. >>11275 VPNs are essential if you l live in any part of the European Union or the United States. Copyright can fuck you up big time if they catch you downloading your favorite series or games. >Mullvad One of the few good ones left. Most of the major VPNs have sold out. Mullvad offers a variety way to pay for their service including in cash, or crypto. >>11276 >ADL stooges working a big name VPN companies ExpressVPN easily fits the bill, owned by a guy whose wanted by the FBI, and bought for 1 billion dollars by an Israeli "cybersecurity" company. 1 Billion bucks for a VPN company? Tells ya all you need to know about them.
>>11341 >Most of the major VPNs have sold out. Mullvad will protect you from copyright attorneys, not much more. Don't trust any VPN to protect you from feds.
>>8395 read the tor wiki or the tails wiki or the darknet guide to buy stuff online. It is never 100% save unlesss you use tails and trip from puplic hotspot to hotspot. turn of java script.
So, no one can agree on anything. Got it. >>11341 >Most of the major VPNs have sold out. What about ProtonVPN?
>>14492 necking yourself would be a more secure/whateverthefuck option than using that honeypot sjw vpn
>>14517 OK, fed.
>>14528 First of all, nice archive. The edit says they've added nothing to their terms about keeping logs. Their privacy policy for both email and VPN says they don't keep logs. Yes, if a court forces them to log a specific user, they will do so. So will EVERY other company, because they're legally required to. But it's extremely unlikely that a foreign government is going to go through the legal trouble of forcing a Swiss company to log information about a specific user unless the user is doing something highly illegal or trying to hurt said government, megacorps, or the elites of society. More information: https://archive.ph/jBb2O
>>11341 >If you aren't visiting any dark web/onion sites, typically Tor is sufficient How would Tor alone not be sufficient if you're going on the dark web?
>>8395 TOR is a honeypot. 70%+ of TOR nodes are under control of the NSA. This is a feature, not a bug. TOR was created in the first place so that "dissidents" (read: CIA assets) in Russia, China, and Iran could do their work and evade getting caught by the local secret police. For anyone else, it's waving a giant flag that says "HEY LOOK AT ME I LIKE CP," "HEY LOOK AT ME I DON'T LIKE THE GOVERNMENT AND I'M PROBABLY SOME KIND OF MILITIA EXTREMIST," etc. See also, "supercookies." https://www.itpro.com/security/privacy/358637/what-are-supercookies You've maybe heard the term "cookies," right? It started out as a persistent text file stored locally that your browser would use for things like individual site settings. That goes back to the dialup days. Very quickly people whose stock in trade is gathering information about you (marketing departments, spammers, etc.) decided they really liked the idea of storing personal information about you locally, on your own computer, in files either hidden or with non-obvious names, made as obscure as possible and as difficult to remove as possible. Adobe got into this with secret spaces for additional hidden cookies files in the cache folders used by Flash. Got all that? "Supercookies" are not stored on your computer. They are information that your ISP has about you, like your real full name and your billing address, your IP addresses, full traffic logs, and they are available to marketers. They are also available to the glowbois, for free, just for the asking, no warrant required. The government has investigated itself and determined that there is no wrongdoing here. Theoretically you have a right to opt out of the selling-to-marketers part, but every ISP buries this a hundred screens deep in the terms of service so that you'll scroll past it. In 2016 Verizon got their peepee slapped with a pocket-change fine for selling people's "supercookie" information after they'd opted out. It cost them about a week's worth of that particular revenue. What I am saying here is that there is no anonymity on the Internet. That went away when dialup went away. Every other week there's a news story about another series of 2am US Marshals' Service SWAT team raids on guys who thought TOR made them invisible, for "CP" or "dangerous extremism" or maybe the warrant says the guy shot President McKinley. If one Federal judge won't sign off on it, another will. Legally speaking, US courts have found that you have no expectation of privacy when you use the Internet. Look up Projects CARNIVORE, MYSTIC, BULLRUN, PINWALE, RAMPART-A, ECHELON, XKEYSCORE, FAIRVIEW, DISHFIRE, PREFER, and PRISM if you don't believe me. Do you think that there is more Internet traffic in the US than they can analyze? Go look up Project SENTIENT. ChatGPT is quaint. They had AI tools parsing Internet traffic to find patterns and actionable intelligence 10+ years ago. Look up "automatic inferencing." This shit's on Wikipedia now, for fuck's sake, so there's no excuse for saying "I didn't know." The NSA is looking over all our shoulders as we type, geolocating us from second to second, parsing every sentence for "actionable intelligence." The Russians, Chinese, and North Koreans are rank amateurs when it comes to spying on their own people, at least from a technical perspective. The tl;dr here is, you aren't hidden. TOR is compromised by design. Any VPN traffic is still going to get logged by your ISP in real time. The takeaway is that each man is responsible to his own conscience, but never forget that you're under the microscope every second. If you still want to do things on the Internet that will give the State a pretext to come after you, after all that, you need to get your head examined. If you insist on doing so anyway, and there are consequences, don't say you weren't warned.
If anyone cares about DNS-over-QUIC and DNS-over-HTTPS/3 gaining traction, PowerDNS released DNSdist 1.9.0 today. https://archive.ph/ovN6K
>>14576 Discussions years ago about known weaknesses in TOR covered this. If an adversary has control of enough nodes, they could determine who was doing what through the use of timing attacks and payload analysis. The thought was that the more nodes, the greater the anonymity was available. But they don’t need ownership or control of the nodes. They only need access to monitor the data. Already, this is built in to the Internet’s core. Local level routers can be of many brands and may not be compromised. But it is acknowledged that edge and core router brands likely have built in back doors. The Five Eyes and China at the least, can access and monitor all traffic. Even with end-to-end encryption, they can at least see who is accessing what. Companies like Cisco, Juniper, Huawei, ZTE, and a few other key players make the Internet work. Nothing is transmitted without it crossing their networks. There are ways to improve one’s anonymity, but VPN isn’t it. That is just a red herring. It may prevent your ISP from knowing what you’re doing (maybe, certainly no guarantee), but when one can follow every packet of data from end-to-end, VPN does relatively little to enhance security.
What about RiseUp VPN?
>>14639 >There are ways to improve one’s anonymity, but VPN isn’t it. Then what IS the solution?
>>14660 Anonymity and security are two seperate things, you can wear a mask and go to a net cafe or big box store with a wifi device that rerolls mac addresses to be pretty anonymous, as long as your device isn't sending fingerprintable traffic or accessing any credentialed services.
>>14664 Pretty much overkill expect for extreme situations.
>>14660 There are really only two plausible solutions and only one of these is guaranteed to work. 1. Don't go online. This is the only guaranteed method to make sure you're not being tracked online. 2. Use a network that has no connection to you in any way. No cameras with ANI-based detection in parking lots, no mobile devices tracking movements, no in store cameras with facial recognition, etc. If you can be on a network without any other nearby devices identifying you then maybe you have a chance.
>>8395 the safest way is to not be in the country you're fucking with. that's why top hackers who have the state's acceptance always target the state's enemies and no one else. i've read many articles in my life where state employed hackers spend five whole months, or more, tracking down one single very good hackerman. also, the nsa controls/owns like 90 percent of all the tor nodes, if not straight-up all of them. if they want to catch somene, they can easily do so, i'm sure.
>>14815 Do you have proof that NSA owns most of tor relays?
>>14659 Hyper political and they oust people they don't like, same with their email service.
>>14660 Scatternet is the new hotness
>>14815 >the nsa controls/owns like 90 percent of all the tor nodes, if not straight-up all of them. I thought it was 25%? >>15066 >Hyper political and they oust people they don't like, same with their email service. How could they oust someone if all they have it their IP?
The best way is to use Tor Broweser or Tails. Enable bridges. Tor Browser asks you if your local gov is censoring web or something. Answer "yes" here. You must also disable JavaScript by setting Tor Browser to Highest security setting. Because JS allows for tracking and most browser exploits need JS. >https://en.wikipedia.org/wiki/Evercookie >https://github.com/samyk/evercookie
>>16034 >javascript You should also consider going to about:config and setting "javascript.enabled" to "false".
>>16034 >Tails Tor Browser on Tails uses uBlock Origin, which gives you a different fingerprint than most Tor users. There are plans to add uBlock Origin to Tor Browser, but that's at least 10 months away. https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/17569 https://archive.ph/QtPmP https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/issues/164 https://archive.ph/yc0Ue >>16072 Why? Isn't changing the security settings enough?
>>16075 >Why? Isn't changing the security settings enough? It probably is, I'm just a paranoid nutcase. I always check about:config to make sure it's disabled every time I start the Tor Browser too.
>>8508 Are you retarded? VPN is included in the traffic they grab. If they crack TOR with brute force your VPN is gonna be worth shit. VPN is also encrypted. VPN relies on encryption. >>9122 Yes this is called man in the middle attack. Governments have already used it to give out certificates and wrong DNS to MITM you and get your traffic with the encryption keys. >>11275 Yes, this is one of the few usecases where using a VPN before TOR is legit: You cannot have others know you connect to TOR. If that is a risk for you then yeah, VPN -> TOR. Afaik no other case justifies using a VPN and then TOR.
>switch tor circuit for a site to get a fresh IP >the route ends up Luxembourg, Sweden, Antarctica <someone in the antarctic (or at least that IP range) is running a tor exit
>>16479 That's all fun and games until you realize it is 100% a fed exit node. Only government is allowed to do stuff in Antarctica. No one goes there without a government permission
>>16498 "Only government is allowed to do stuff in Antarctica. No one goes there without a government permission" Well, yes and no. I worked there for a year as a contractor. The private company I worked for had a contract with the federal government to perform specific work and they hired private citizens to complete that work on a contract basis. I was not a direct government employee. There are many companies based there and each have their own networking infrastructure though I never learned if we all share the same satellite connections or if each company had their own. That said, I could so a lot on our network. I don't think I could have gotten away with having a tor exit but did used tor when I was there. Most things we could do here we could do there.
>>16600 >No one goes there without a government permission <Wrong, I went there as a private citizen with government permission!


Forms
Delete
Report
Quick Reply