I figured I would throw this in here since people like to act like they are Gods of knowledge in technocratic heaven and the rest of us peasants cant
understand basic written language.
That is a little device you can build and have 100% secure protection on YOUR end. There is no 100% security though, since the weakest link of
security is the total security.
People like to think TOR is safe. It IS NOT. There have been studies that show with as little as 5 relays and dubious exit nodes on the TOR network,
any traffic can be eavesdropped.
You would have to add encryption to the device you build. If you send plain text over TOR, you sent plain text that people can interpret. Log in
credentials, bitcoins, all of it.
Encryption on one end is nothing. You would need to set up a server (tunnel) that you can put encryption on, that can be the intermediary between two
users like on TOR. You need to wrap up all your entire data stream within it to be safe. YOU have to set up the VPN.
SO basically you and your buddy, lets say you, reporter A, and reporter B are on TOR talking about a major political scandal. They want to use
encryption in their messages over TOR.
They cant get a TOR relay to receive data that is encrypted, decrypt and sort it out, and then send it out again to the recipient encrypted again.
You need a randomizer you control, or have the key to the encryption to. That is what an anonobox type build working with a server you control can do
if you configure it to have encryption.
So by having a server you build that is not a TOR relay, but that reporter A´s box can send encrypted data and commands to so as to send information
to reporter B, you can have 100% encryption on both ends.
Why not just send encrypted data over TOR? You can, but TOR has huge draw backs, especially security wise when accessing the regular internet over it.
Things like speed is awful. If you want to send an email between TOR and the regular internet or vice versa of like 8000 words,of 4-8 characters in
each word before encryption, good luck. A video? Yeah, grow old trying to finish that task. I wouldnt be surprised if security would be compromised
after sitting on the same connection (relay) for hours while you do it.
There are free services you can use on the internet that act as an intermediary for encrypted data, but if you want to be sure, you build your OWN
SERVER, use a box like the one I mentioned and have the other end use a box with the same encryption and protocols.
That pain in the ass way is the only way to be sure. ANY traffic over TOR is vulnerable. If you think using TOR alone without encryption on BOTH ends
makes you safe, you are an idiot.
But like douche bags say, I am no hacker. I just have the freaking internet with all of mankind's knowledge available to my non hacker ass. I dont
understand everything and I am no where capable of implementing any of this. I still know its true!
If you are smart you set up your own relays on a network YOU control, so you control the exit nodes, encrypt your data on both ends and if you are
really good, you could have two whistle blowers chatting about CIA secrets with no problem as long as they are not physically caught.
You have to control the hardware in between the connection. It has to encrypt the data streams and be able to sort it out so commands and such are
HENCE build the hardware....You cant just log onto a random server and ask it to do the work for you and think you are being slick.
TOR is FULL of bad relays now, with exit nodes compromising data as it peels the last layer off the onion.
Unless you adapt, you are as useless as me.
BUT for the average person like myself, what ever.
For an EMBASSY, a news agency or other such entity.....DO THIS.
Here is some reading,
(disclaimer, I know there are other ways of doing this that are easier, but the point is the goal, as close to 100% security as possible since it will
never be there)
edit on 3 14 2016 by tadaman because: (no reason given)
edit on 14-3-2016 by elevatedone because: (no reason given)