It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

TOR network

page: 1
1

log in

join
share:

posted on Jun, 18 2011 @ 08:29 AM
link   
Ive just started using a program called TOR.
Im sure many of you have heard of it or are using it yourself.

Heres a quick overview from wikipedia:


Tor is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis. Using Tor makes tracing Internet activity, including "visits to Web sites, online posts, instant messages and other communication forms", to the user more difficult.[7] It is intended to protect users' personal freedom, privacy, and ability to conduct confidential business, by keeping their internet activities from being monitored.[8] The software is open-source and the network is free of charge to use.


It seems to me that everyone should be using this software. Why should you be traced online if you arent doing anything illegal?? Well....you shouldnt and this program stops it.

Ive only been using it for a couple of days but it seems pretty good.
There is a button for Firefox but you actually need the TOR program to run it (their servers).

It slows your internet down a bit...well not the internet, the connection is slower as its routed all around the world.

Has anyone else used this?? What do you think?? Do you think you will give it a go if you havent heard of it before??




posted on Jun, 18 2011 @ 08:49 AM
link   
I use "Tor"; but the thought occurred: "There's not any reason any one of the "network hops servers" couldn't be a server owned (plumbed) by the intelligence gathering services either private data mining or fed gov.( even an overseas server).So I don't trust anything "publically available" .

Keep your "junk mail"
photo twitters to yourself "Anthony"!

edit on 18-6-2011 by 46ACE because: (no reason given)

edit on 18-6-2011 by 46ACE because: (no reason given)

edit on 18-6-2011 by 46ACE because: (no reason given)



posted on Jun, 18 2011 @ 08:53 AM
link   
reply to post by loves a conspiricy
 


Use some caution...if you are using TOR (it's been around for awhile now) then don't you think it is plausible that others that might use it maliciously know about it too (the FBI, CIA, etc...)?

I have TOR installed also, but rarely use it for browsing...because it's so damn slow...IMO.



posted on Jun, 18 2011 @ 08:57 AM
link   
Tor sounds like a good idea, but as with anything on an open network its open to hacking.
Theres been a whole list of incidents where tor has been compromised going back for years, so I wouldnt trust it to be honest

From 2006

A group called Packet Storm has published a paper detailing how the true IP addresses of Tor users can be discovered by the party that controls their traffic's exit node
link

From 2009

tomorrow there's a talk at Black Hat DC by Xinwen Fu on an active attack that can allow traffic confirmation in Tor. He calls it a "replay attack", whereas we called it a "tagging attack" in the original Tor paper, but let's look at how it actually works.

link

2011

Tor is a network of virtual tunnels which allows separate persons or groups of people to increase their security and protect their anonymity on Internet. In early January we discovered that two of the seven servers that run directory authorities were compromised.

link

I could go on
edit on 18-6-2011 by davespanners because: (no reason given)

edit on 18-6-2011 by davespanners because: (no reason given)



posted on Jun, 18 2011 @ 09:01 AM
link   
Damn I need to start a tor exit node to catch all this groovy data.

I can you know. You can too.

Tor puts your traffic in my hands, if I participate.

Let me see it, use tor



posted on Jun, 18 2011 @ 09:25 AM
link   
Interesting thread: thanks for making me look further into this and thanks to "Davespanners" above for the links. Seems I have a real untapped curiosity about "network security"


here's oneof the papers in .pdf:
dl.packetstormsecurity.net...

conclusion:" Tor"is fine: but the common software people use on their systems( flash and _javascript) can be exploited to tag and expose a users IP."

Good stuff toknow.




edit on 18-6-2011 by 46ACE because: (no reason given)



posted on Jun, 18 2011 @ 01:01 PM
link   
reply to post by loves a conspiricy
 


just use the Backtrack distro

comes with firefox w/ Tor

and java and flash disabled already installed
edit on 18-6-2011 by DerepentLEstranger because: added correction



new topics

top topics



 
1

log in

join