Tor (anonymity network)

page: 9
49
<< 6  7  8    10  11 >>

log in

join

posted on Jan, 24 2012 @ 11:09 AM
link   

Originally posted by PapagiorgioCZ
reply to post by Cito
 



Originally posted by Cito
China tries to block tor but can't
Thanks to bridge relays. I run 3 bridge relays for folks in china/iran/libya and others
There's a lot of us that provide unreported bridges to countries so they get uncensored Internet
And offer encryption to countries that our "government" think are our enemies.
edit on 1/23/2012 by Cito because: (no reason given)


How do you do that? I mean, it's not the same thing as to check option "help censored users reach the Tor network"? You have to do it manually by copy-paste IP from this site: bridges.torproject.org... ?? In the first case it is somehow reported-censored or what?
I like that idea of helping censored Chinese, Iranian, (soon American
) people so much... It just has to be done. Everyone should do it for them. Anyone disagrees?


Not to be a fear monger but I just FYI I believe to carefully consider your choice and if you wish to go ahead I would strongly suggest you to NOT keep any material such as anarchist cookbook or anything you don't want big brother to find out.

Keep in mind you have limited control over who use you as an exit node however if someone and there will be thousands attack a government site or does something illegal its your IP that will be displaying as the attacker's address. Police will not need much more then that afterward to have a warrant to bust in your house and seize your computer. If they find anything in there even though its not related to the "attack" or anything not legal even though its not related to the reason they arrested you in first place you'll still be toasted...

And even if they can't get the warrant with that attack all they need to do is contact your ISP and have daily log of your activities sent to them and soon as they seen something they can use they'll jump on it... And with the amount of people and the usual reason why proxy are used... It shouldn't take that long at all...

Just FYI my friend, if you intend to do so perhaps you might want to keep you sensitive material on a well hidden Mini SD card... you can hide those anywhere...
edit on 24-1-2012 by _R4t_ because: (no reason given)




posted on Jan, 24 2012 @ 11:24 AM
link   
reply to post by _R4t_
 


Got it... "No CP oh we appologize sir but wait a minute, what about this cracked game? Come with us..."

My question was not about exit node. That is really bad idea I know. But helping censored users to reach Tor network is something else than exit node isn't it? It has something to do with China's great firewall. Something with first node not the last one.
edit on 24/1/2012 by PapagiorgioCZ because: (no reason given)



posted on Jan, 24 2012 @ 12:57 PM
link   

Originally posted by PapagiorgioCZ
reply to post by _R4t_
 


Got it... "No CP oh we appologize sir but wait a minute, what about this cracked game? Come with us..."

My question was not about exit node. That is really bad idea I know. But helping censored users to reach Tor network is something else than exit node isn't it? It has something to do with China's great firewall. Something with first node not the last one.
edit on 24/1/2012 by PapagiorgioCZ because: (no reason given)


Yep no I just wanted to put it out incase you might be interested, although I'm all for helping foreign folks getting a better access to the internet I love the way you can see the news from their end when you exit node is located in other countries... No CNN or FOX biased infos... There's a lot to be seen there you wouldn't see on our news...



posted on Jan, 24 2012 @ 02:03 PM
link   
I read several pages in and noticed that no one has stated the obvious answer to searching for anything.

1. Buy new laptop
2. go to starbucks (open wireless internet) or to cyber cafe! ******************
3. set up new e-mails (not connected to you)
4. Surf where ever you want!
5. use tor or whatever
6. go home and use home internet for normal use


This way they only track back to where ever you were, with no connection to you.

In my opinion the DARK internet is garbage internet. IE: Child porn, death videos, and made up bull by a bunch of whack jobs! It's also for private use. IE: think HIT MEN, DRUG dealers, private security, Illegal activities. Why would you want to be a part of that world???? If you do have access to that info, I really don't want to know you, or meet you EVER! Also, anyone with that type of access to those "private" networks, are not going to tell you about it, or invite you into it. Unless you are part of that network!

People act like their just going to STUMBLE upon hidden alien info, or coverups, or REAL INFO??? Not gonna happen. Secret meetings happen in private between 2 people in REAL LIFE, not the net!

Think about it.



posted on Jan, 24 2012 @ 04:06 PM
link   

Originally posted by theclutch
I read several pages in and noticed that no one has stated the obvious answer to searching for anything.

1. Buy new laptop
2. go to starbucks (open wireless internet) or to cyber cafe! ******************
3. set up new e-mails (not connected to you)
4. Surf where ever you want!
5. use tor or whatever
6. go home and use home internet for normal use


This way they only track back to where ever you were, with no connection to you.

In my opinion the DARK internet is garbage internet. IE: Child porn, death videos, and made up bull by a bunch of whack jobs! It's also for private use. IE: think HIT MEN, DRUG dealers, private security, Illegal activities. Why would you want to be a part of that world???? If you do have access to that info, I really don't want to know you, or meet you EVER! Also, anyone with that type of access to those "private" networks, are not going to tell you about it, or invite you into it. Unless you are part of that network!

People act like their just going to STUMBLE upon hidden alien info, or coverups, or REAL INFO??? Not gonna happen. Secret meetings happen in private between 2 people in REAL LIFE, not the net!

Think about it.


Well I can tell you that you can find stuff if you know where to look you wouldn't believe are on the internet when you dig deep enough... But this is as far as I'll elaborate.



posted on Jan, 26 2012 @ 02:17 AM
link   

Originally posted by _R4t_

Keep in mind you have limited control over who use you as an exit node however if someone and there will be thousands attack a government site or does something illegal its your IP that will be displaying as the attacker's address. Police will not need much more then that afterward to have a warrant to bust in your house and seize your computer. If they find anything in there even though its not related to the "attack" or anything not legal even though its not related to the reason they arrested you in first place you'll still be toasted...

Really? I thought my IP address can become an EXIT node(for someone) only if I had volunteered to be part of RELAY point.

Is it not?



posted on Jan, 26 2012 @ 03:19 AM
link   
 


off-topic post removed to prevent thread-drift


 



posted on Jan, 26 2012 @ 03:49 AM
link   

Originally posted by flyingdonkey
Really? I thought my IP address can become an EXIT node(for someone) only if I had volunteered to be part of RELAY point.

Is it not?
I'm not sure what you mean by "volunteer", but you can adjust the settings, so you have complete control over whether you choose to configure one of these three ways:

1. Standard
2. Relay
3. Exit node

But once you choose option 3, you don't have much control over who does what with your exit node. It's kind of risky. The TOR developers are kind of ambivalent about whether option 2 is more or less risky than #1. but there's no question #3 is the riskiest.



posted on Jan, 26 2012 @ 03:59 AM
link   

Originally posted by Arbitrageur

Originally posted by flyingdonkey
Really? I thought my IP address can become an EXIT node(for someone) only if I had volunteered to be part of RELAY point.

Is it not?
I'm not sure what you mean by "volunteer", but you can adjust the settings, so you have complete control over whether you choose to configure one of these three ways:

1. Standard
2. Relay
3. Exit node

But once you choose option 3, you don't have much control over who does what with your exit node. It's kind of risky. The TOR developers are kind of ambivalent about whether option 2 is more or less risky than #1. but there's no question #3 is the riskiest.

ok, so if i download "browser bundle" and start using TOR, what is my default mode? Is it Standard?



posted on Jan, 26 2012 @ 07:50 AM
link   
Nhhaa

Its not workin..
Mine says
"authentication error"
Vidalia was unable to ath to the tor software (Controlsocket is not connected)....

What do i do wrong..



posted on Jan, 26 2012 @ 07:58 AM
link   
reply to post by Miccey
 


It depends on your OS. The simplest thing to do is plug there error message into your favorite search engine, surely you will find the answer to your problem. Make sure you have current version to start with.



posted on Jan, 26 2012 @ 08:00 AM
link   
Yes to the current version
I do VISTA..

Soo....



posted on Jan, 26 2012 @ 08:07 AM
link   

Originally posted by flyingdonkey
ok, so if i download "browser bundle" and start using TOR, what is my default mode? Is it Standard?
Yes.

But you should probably go through all the settings to see what they say. They've made some bad goofs in the past on the default settings. For example, in a previous version, they had noscript default configured to "allow scripts globally". This defeats the whole purpose of noscript and it made the browser bundle vulnerable, (capable of not making you anonymous). After learning about that I now feel compelled to check every setting they have set by default. This can be a little tricky if you're new to Tor.
edit on 26-1-2012 by Arbitrageur because: clarification



posted on Jan, 26 2012 @ 08:17 AM
link   
reply to post by Miccey
 


You can plug in your error code + vista + tor into your favorite search engine, there are fixes for it. I would also suggest you might look into bootable usb or sd card stand alone programs like tails. Windows has to many built in security flaws



posted on Jan, 27 2012 @ 05:39 AM
link   
reply to post by theclutch
 


You're not a part of that world unless you make yourself part of it. As mentioned before, there is more to the deep web than the obvious illegal/shady material you mentioned.

Also, if I may:


Originally posted by theclutch
..People act like their just going to STUMBLE upon hidden alien info, or coverups, or REAL INFO??? Not gonna happen...


How do you think people discover "hidden information"?

The answer is through research. If you dig deep enough, you will eventually come across information that definitely enlightens you on the subject matter. You could go through loads of completely useless material, and suddenly find something that expands your knowledge immensely. I believe that could be considered stumbling upon.



posted on Jan, 28 2012 @ 02:06 PM
link   
i would have thought Linux would be the best OS to use for this ?



posted on Jan, 29 2012 @ 11:56 AM
link   
I´m speechless.


I´m all for hidden information gathering, so i got interested about "the deep web",
and now i´m pretty much shocked, which isn´t an easy feat to accomplish.¨
There is some SERIOUSLY sick s**t in there!

I didn´t think i could become any more cynical, but i was wrong.
Entering that place i lost the last shred of hope i had for humanity.
We do not deserve to be saved.



Nuke the whole planet to hell, see if i care.



posted on Jan, 29 2012 @ 12:09 PM
link   
Lol, used tor, went to glp and they say: this IP is banned


Serious question: There is very good use for TOR and the .onion web.
Anyway since i do not want to be near Sites displaying all sorts of really twisted porn and gore - is there some kind of filter that could filter those sites out ?

That would be useful.



posted on Jan, 29 2012 @ 04:09 PM
link   
reply to post by DanaKatherineScully
 

You're right, although inexperience can cause problems. Security on Linux is a lot better, you would have to install a malicious program knowingly- not that it's impossible. It's a lot harder than on Windows, though. For the experienced Linux user it's leaps and bounds safer, since you have total control of your system and it's easy to set up a custom USB install for secure portability. For those that have no idea how to do that, there are many pre-compiled live Linux distros that offer full encryption and complete tor usage.

Privatix, which comes as either a Debian (KDE)/Gnome or XFCE environment; Difference being xfce is a lot more lightweight.

Tails - The Amnesiac Incognito Live System. I haven't tried it, but it is a Debian distro which does the same things as Privatix.

Pollipix



Polippix is based on Kubuntu and was made by the IT-Political Association of Denmark as a protest against the anti-terror laws being passed in Denmark. It uses Tor for anonymous Internet surfing, MAC address changer, GnuPG for encryption and driftnet for traffic sniffing.

There's more "anonymous live distros", you can do a Google search and decide for yourself what would be best for you.

People that use Windows: make sure you read all of the Tor documentation, and if you're still unsure then encrypt your entire hard drive. It's not hard, I'm pretty sure TrueCrypt can do the job on Windows. Once again Google is your friend and the best way to learn is to just go for it.
edit on 29-1-2012 by Dreamer99 because: spelling



posted on Jan, 30 2012 @ 05:55 AM
link   
reply to post by ototheb85
 


wasnt off topic!!!





new topics
top topics
 
49
<< 6  7  8    10  11 >>

log in

join