About as much as this thread: Turkey Cooking - 5 years running best turkey ever. Are you TGT's self-designated Hall Monitor?UH...... this has what to do with fire arms and ammo????
About as much as this thread: Turkey Cooking - 5 years running best turkey ever. Are you TGT's self-designated Hall Monitor?
Thanks, that's the kind of info I was interested in hearing.I tried it just to see what it was about. You're going through 7 other peoples computers so it's incredibly slow. Makes the web pages load weird sometimes because of things that get lost in the process. A lot of the servers used have been blocked by different message boards and e-mail websites so you can't log onto them. It's just a pain and I haven't tried it again since I first downloaded it.
If that's the case, then I apologize for snapping at Fool's Gold.I think his comment has more to do with the section you posted in and not a non firearm topic overall.
Mods can probably move it for you. I would be interested in some talk on Tor myself.
I've used it. Keep in mind that it's estimated that about 75% of the exit nodes are run by the FBI. It's basically a big honey pot.
That is interesting. I was waiting for what your thoughts were on it.
The persistent impression in the darknet community is that paid VPNs are simply too easy to abuse. It is inconceivable that some are not set up specifically as traps. I have never figured out which ones are trustworthy and I don't know anyone credible who purports to be able to do so.If you're really searching for anonymity, look into some offshore anonymous VPN services.
If you're really searching for anonymity, look into some offshore anonymous VPN services.
The persistent impression in the darknet community is that paid VPNs are simply too easy to abuse. It is inconceivable that some are not set up specifically as traps. I have never figured out which ones are trustworthy and I don't know anyone credible who purports to be able to do so.
Thanks Ben, that was the kind of info I was looking for.Using TOR moves you from "easily logged at the backbone in case we want to look at you later" to "at least mildly painful to track online." IOW, unless you're a high-value target, it keeps you off the radar.
No, it's not perfect. Yes, if enough nodes are run by attackers (specifically including government entities) then it's compromised.
However, monitoring you is no longer *easy* and makes someone do extra work. Generally, monitoring of you, specifically, is best done at your local ISP. But since you're off the radar at the backbone, you're far less likely to attract the attention necessary for you to be specifically monitored. That means you're no longer the low-hanging fruit in the surveillance game. That has, imo, substantial value.
If you're at all security conscious, you try to encrypt wherever possible. If you believe the open web is too open, you can use TOR. (For some really basic info, see: https://www.eff.org/files/2013/12/02/tormythsandfacts12-1-2013.pdf ). And if you're totally paranoid, go live on Freenet.
I use TOR regularly. If it's new to you, I suggest you download the Tails liveCD, a Linux distro that will demonstrate the basics. It's easy and doesn't touch your hard drive unless you specifically tell it to. After booting it, however, the first thing to do is turn off Javascript in the browser.
You can get it here: https://tails.boum.org/
That's a good article. Thanks for the link.Appreciate it. As pro tech as I am, some people find it funny how cynical I am about some of it.
Errata Security: Anonymity Smackdown: NSA vs. Tor
Tor has many weaknesses, especially the "Tor Browser Bundle". Experts might be able to protect their privacy with Tor against the NSA, but the casual user probably can't.
...if you have your Outlook mail or Twitter open (and aren't using SSL), these will cause a new path to be created through the Tor network every 15 minutes, or 96 new paths every day, or 3000 new paths a month.
That means over the long run, there's a good chance that the NSA will be able to catch one of those path with a three-hop configuration, and completely unmask you.
...Tor was hacked -- kinda. A guy hosting hidden services was arrested (with help from FBI), and his servers changed to deliver malware to expose user IP addresses (with help from NSA).
Experts can probably use Tor safely, hiding from the NSA -- assuming they control a smaller number of nodes, and that their 1024-bit key factoring ability is small. It would require a lot of opsec, putting apps on a different [virtual] machine than the proxy, and practicing good opsec to make sure egress connections are encrypted.
However, the average person using the Tor Browser Bundle is unlikely to have the skills needed to protect themselves. And this might be good thing: it means dissidents throughout the world can probably hide from their own government, while our NSA cleans the network of all the drug dealers and child pornographers.
I wish I knew what all of that stuff means.
I never, while in TOR, tie my TOR life to my meatspace life. I mostly use it to passively consume data from websites that the government doesn't like. Most folks would be surprised how much very interesting news can be gleaned from sites that would get you put on a watch list in the U.S. Until Al-Jazeera was finally recognized as a legitimate news source, for example, anyone who visited it a great deal could find that patronage rewarded with official suspicions in the U.S. That's just one example.