It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Tor (anonymity network)

page: 7
<< 4  5  6    8  9  10 >>

log in


posted on Jan, 22 2012 @ 08:17 PM

Originally posted by hungrydirt
I am begging the mods to take this topic down. The people that don't know TOR exists should not know TOR exists. Period. This will be the next sacrificial lamb, and it will only be revealed to the brain-dead elite because the layman will have access to it and will bring it negative attention. MODS, PLEASE DELETE.

Too much coffee buddy TOR is far from being anywhere near as good as it looks neither as dangerous as it sound. TOR was started by the US Navy whom had in mind to create a program that could be used by governmental agencies and people of influence when they go oversea for meetings and stuff. They wanted a tool that wouldn't leak what the representative and its boss in the US was trying to tell them...


It was realized that the concept was flawed to start with, even though the connections from TOR to TOR nodes are encrypted its NOT encrypted from the last node ***IP that will appear when you go to while using TOR*** And there's nothing they can do against that if the communication with the last TOR node and the destination host gets encrypted by TOR and the receiving host as an example is a reg TELNET session or HTML or anything that's designed to communicate using plain text then your screwed...

If it was that good wouldn't you think the Navy would of kept it instead???

posted on Jan, 22 2012 @ 08:17 PM
reply to post by LadySkadi

Ah, now I remember why I haven't logged on to this mouth breather website in months. Self appointed mods like you! Speaking of main stream, how about a site that won't close it's access portal with a redirect on the SOPA/PIPA blackout day because they might lose some fractions of pennies from google clicks? That cool avatar smacks of i'm-trying-to-be-bohemian. What could be less enlightened than contributing to a pop up website?!

posted on Jan, 22 2012 @ 08:18 PM
reply to post by _R4t_

Yes, because people who know what they're doing just run TOR. Please.

posted on Jan, 22 2012 @ 08:19 PM
reply to post by Arbitrageur

This man lies not.

(im not joking)

posted on Jan, 22 2012 @ 08:20 PM

Originally posted by Warlock316
Is there secret government info accessible thru Tor?

Yes there is and there was, by simply running TOR as a exit node all you need to do is run a sniffer, preferably ettercap if your like me and you have untamed love toward a bash terminal or Cain and Abel or Wireshark if your the GUI type of person. I will tell you which tool that can be used but not how... your on your own on that one...

Sorry I meant there "WAS" it was still possible up to a little while back, I'm pretty sure the amount of "interesting" people using it dropped dramatically thought.
edit on 22-1-2012 by _R4t_ because: (no reason given)

posted on Jan, 22 2012 @ 08:22 PM
reply to post by hungrydirt

Why are you here supporting the site if the lack of SOPA protesting is not to your liking? Better yet, start a thread on it and take it where it should go, it's not the topic of this thread.

Self appointed mods like you!

Off with you then...

posted on Jan, 22 2012 @ 08:40 PM

Originally posted by hungrydirt
reply to post by _R4t_

Yes, because people who know what they're doing just run TOR. Please.

Primary you sounds like a big brother's little minion trying to cause stir in a perfectly legit and good post if you have nothing intelligent to say please abstain yourself from saying stuff that portrait you the opposite light...

At last you obviously have minimal or low skills pertaining to the subject had you have any you would of provide constructive information instead of stumbling in trying to make it look like TOR's a hidden weapon for the Gods...

Now before you come back with your prefabricated elite burns, before you go any further would you care elaborating on your expertise? Lets start with stuff that anyone interested in security should know its the root of it all...

1> Explain to us whats a buffer overflow.

2> Write me a quick proof of concept code that demonstrate a buffer overflow and how it could be used.

Now beware don't just go google and try to paste something that sound intelligent, I'll take any functions you post in here and browse for them to see if you cheated....

posted on Jan, 22 2012 @ 11:31 PM

edit on 23-1-2012 by darkest4 because: (no reason given)

posted on Jan, 22 2012 @ 11:43 PM
reply to post by _R4t_

My guess is that he will not be rising to the challenge.

posted on Jan, 23 2012 @ 12:10 AM

Originally posted by Rafe_
reply to post by _R4t_

My guess is that he will not be rising to the challenge.

Yes I know they come by dozens on IRC all the time... Talking the same talk never daring to try to take the walk,

I hope It didn't kill the thread I was enjoying the difference in opinions and views on Tor and proxies in general.

posted on Jan, 23 2012 @ 12:32 AM

edit on 23-1-2012 by Jason88 because: Question answered

posted on Jan, 23 2012 @ 12:48 AM
not, sure what all the level stuff is... networks, just don't work like that. I mean, its not a game and your moving thru levels to find the big secret...

TOR is just a "darknet" that trys to hide your real IP, and also has its own "sites" called .onion, thats pretty much it.
because, you need the TOR client, to get to a .onion, and its not indexed, it not searchable. it makes it great for the shady who want to hide things.

thats pretty much it in a nutshell.,.......

posted on Jan, 23 2012 @ 12:53 AM
reply to post by windus

Some say that TOR is not completely safe. What if I browse internet through a proxy site (example within TOR. Can one be able to trace my IP?

posted on Jan, 23 2012 @ 02:04 AM

off-topic post removed to prevent thread-drift


posted on Jan, 23 2012 @ 02:08 AM
Alright guys there seems to be a LOT of confusion regarding TOR proxy pertaining to first what it is and what it does, what are the .onion and the "levels of internet" spoken of. I'm working as we speak but give me about 15-20mins my following post will make a lot of it clear.

posted on Jan, 23 2012 @ 02:46 AM
Whats a Proxy?: A proxy is a "gateway" by which your can go through to access a site. The site you access can only see the address of the incomming connection and not past it. Therefor when you go through a proxy you can access websites annonimously because instead of seeing your IP they see the IP of the proxy.

What is Tor???: Tor is a random chain of proxy, multiple peoples in the world use TOR and act
as a proxy themselve while serving themselve at helping the privacy of the whole TOR network.
The more "nodes" or people acting as proxies the harder you are to find...

Tor does something called "proxy chaining" which is plugging multiple proxies one behind the other in order to be even safer than you would in the event that your only using one proxy and it gets compromised or data leak.

TOR in itself is "NOT!" a "darknet" what it is, is through the use of pseudo domains ".onion"

The "*.onion" is simply the same principle as a regular proxy but for websites lets say.. You use this so you can host whatever you want on the internet anonymously without having to register a domain or having your site IP disclosed which could lead autorities or people back to you...

It works this way...

When you try to go to a .onion which wouldn't work in a browser normally however when your using TOR it detects your trying to access a .onion and "translate and direct" you to the server hosting the data without revealing you the "true" ip of the site and without revealing the site your IP...

This is all happening on the internet... TOR in itself is NOT a VNP or Undernet or Darknet whatever it was called in earlier posts... It is a simple relaying service for people that which
to host stuff on the same internet we're using right now and not get it traced back to them...

The .onion sites exist on the internet somewhere... they might be filtered out by your ISP but if you had the proper address and they wouldn't happen to be filtered/censored you could access them without the .onion as well...

Now speaking of "Internet Levels" or "Darknet" as mentioned in other posts what is meant by this is the level of access you have... The "core" of the internet is internet connected with huge networks that breaks into smaller networks down to your ISP... Each level down a portion of the "whole" is removed... addresses you either shouldn't have access are filtered out... whether its because they are sensitive security wise or unwanted content like child porn and known sites the average people wouldn't want access too in first place.

Each level up you go above your ISP you have a better "view" of the whole giving you access to wider places and usually less controlled. The higher you go the more access to sensitive stuff.

Its not intentional to create a "uncharted territory" where the ubber geeks meet to take over the worls... Its simply each level down filter out stuff that you shouldn't have access for security reasons the less information there is about the "core" of the internet the safer it is... and also to filter out kiddy porn and other crap you really don't want to see...

However for a ambitious hacker going up this chain toward the "core" is simple... whoever gain controls of this... controls the internet in a certain way...

Now a pyramid structure isn't really a good way to define the internet infrastructure but I'm tired and I don't feel like thinking so...

posted on Jan, 23 2012 @ 04:24 AM
reply to post by _R4t_

Wait... so there's no level 6 that can only be accessed with a quantum computer? N'awww.... I just finished setting mine up too

And can someone PLEASE translate that gibberish that UKRandom posted? I hate not knowing... it's killing me!


posted on Jan, 23 2012 @ 05:30 AM
reply to post by UkRandom

All I can say is it looks like a string of encrypted text. I have no idea what encryption method you used, but I would say it looks pretty hard to decode. Mind sharing what method you used?

posted on Jan, 23 2012 @ 06:12 AM
Well it doesnt work from behind the great fricking firewall here in China..... Sent and recieved 0.kbs of data.

posted on Jan, 23 2012 @ 08:31 AM
I had run an exit node before I learned something more about it. Than I was like "o noes!"
I'd like to help it grow and become faster but no more this way. I can just hope it was not long enough for some bad guys to misuse it to upload something stinky or hack whatever.
I think it's ok to relay traffic inside Tor. I'm just still not sure about bridge relays

That's what they say about it:

What are bridge relays? Some Internet Service Providers (ISPs) attempt to prevent users from accessing the Tor network by blocking connections to known Tor relays. Bridge relays (or bridges for short) are relays that help these censored users access the Tor network. Unlike other Tor relays, bridges are not listed in the same public directories as normal relays. Since there is no complete public list of them, even if your ISP is filtering connections to all the known Tor relays, they probably won't be able to block all the bridges. How do I find a bridge relay? There are two main ways to learn about a bridge address: Get some friends to run private bridges for you Use some of the public bridges To use private bridges, ask your friends to run Vidalia and Tor in an uncensored area of the Internet, and then click on Help censored users in Vidalia's Relay settings page. Then they should privately send you the Bridge address line at the bottom of their Relay page. Unlike running an exit relay, running a bridge relay just passes data to and from the Tor network, so it shouldn't expose the operator to any abuse complaints. You can find public bridge addresses by visiting The answers you get from that page will change every few days, so check back periodically if you need more bridge addresses. Another way to find public bridge addresses is to send mail to with the line get bridges by itself in the body of the mail. However, so we can make it harder for an attacker to learn lots of bridge addresses, you must send this request from a Gmail account. Configuring more than one bridge address will make your Tor connection more stable, in case some of the bridges become unreachable.

Most people I know use it to safely post on sites about ganja - you know - ilegal in some countries but not a sin...

I think Tor is good tool for open minded gentle people to use internet without fear. Anonymity is state of mind. You don't have to do evil deeds because you can.
I would like to know some other tools. What about programs changing your IP in few second interval? Is it good enough? And what about p2p sharing? I remember some torrent program had a browser too...

new topics

top topics

<< 4  5  6    8  9  10 >>

log in