[ 3 / biz / cgl / ck / diy / fa / g / ic / jp / lit / sci / tg / vr / vt ] [ index / top / reports / report a bug ] [ 4plebs / archived.moe / rbt ]

Due to resource constraints, /g/ and /tg/ will no longer be archived or available. Other archivers continue to archive these boards.Become a Patron!

/g/ - Technology

View post   

[ Toggle deleted replies ]
File: 69 KB, 595x377, tor_project_logo_hq.png [View same] [iqdb] [saucenao] [google] [report]
37975933 No.37975933 [Reply] [Original] [archived.moe] [rbt]

Is Tor really not trustable anymore?

>> No.37975946

Nice dubs brah

>> No.37976010

T-Thanks, now check my 1
Seriously, pls respond

>> No.37976117

Basically, if someone really wants to get to you (and has enough computing power) they can.

>> No.37976146

So I should be fine if I don't do any stupid shit, right?

>> No.37976152

Tor is fine. What you access through tor is what you shouldn't trust.

>> No.37976171

given that the GHCQ leaks confirm that 'we will never be able to deanonymize all tor users all the time' and 'with careful manual analysis we can deanonymise a small number'

i'd say tor is pretty trustworthy
look at their exploit against TBB. they had one in some peripheral module that got dropped due to depracation. you really think they'd be using shit exploits like that if they had to? you think they'd snap at the heels of endpoint security if they could actually attack tor? lol no

>> No.37976179

In the leaked Snowden documents, NSA details that they have a hard time with users who are correctly using Tor. All of the privacy breaches so far have been side channel attacks, not faults in Tor itself. Mostly its been users who enable javascript and plugins while on Tor, for example.

>> No.37976247

So I just have to use noscript and keep the plugins disabled?
I always do that even when I'm browsing normally.
Alright, thanks.

>> No.37976271

All those cool websites with hot chicks on them are gone. There is nothing wrong with a young female body on the beach.

>> No.37976301

You also need to realize that with Tor if you are using it to browse the clear web then the exit node you're using can see everything you're doing, even though they don't (initially) know where or who you are.

>> No.37976328

Tor is totally safe, trust me

>> No.37976344

just use https

>> No.37976363

Yes, plugins disabled and noscript strict enabled. You should be fine. As long as you are using the unmodified Tor bundle, its mostly good.

That is why you use https everywhere (not the extension, mind you). Yes, privacy comes with a cost.

>> No.37976380

you have to be certain that you're actually using Https and someone isn't just trying to trick you

>> No.37976392

tor no it traceable.

>> No.37976402

I have my doubts.

Tor changed their guard rotation to be a 1 year interval to fight the "bad gaurd node" attack assumes that there aren't already many bad guards. This is a very stupid idea. If you get a bad guard you get that guard for a year, plenty long for them to do the statistics required to de-anonymize hidden services using that guard.

Tor for internet, A-Okay, 100% green light go but hidden services... use i2p or freenet.

>> No.37976405

Tor browser bundle comes with it standard, but just because a page uses HTTPS doesn't mean everything on that page uses it.
Not to mention that most sites don't use HTTPS in the first place.

Tor isn't for privacy it's for anonymity. The two are not mutually exclusive, even though you'd want both at the same time ideally.

>> No.37976421

attach WHICH assumes*

>> No.37976424

come on, they took two years of inspection and 2 days of raid to close down silk road... FBI and CIA cannot have any power there.
Its not like they control TOR or anything.

>> No.37976425
File: 448 KB, 455x395, 1374351043728.png [View same] [iqdb] [saucenao] [google] [report]


>> No.37976440

Why would you use Tor now that it's so much in the spotlight? A far better choice would be freenet or i2p

>> No.37976453

It's not like they can simply add more relays that they can control and do a sybil.... oh wait.

>> No.37976477

It is if you don't act like a retard with Javascript and Flash enabled. Also, you should use an Ad Blocker.

>> No.37976481

Not really used either i2p or freenet. What are the benefits over tor for hidden services?

>> No.37976539

i2p is pretty much totally built for anonymous p2p, i.e. bittorrent and kad, which tor shuns.
i2p's community is the best I've seen.
freenet has lots of Colored Parrots, probably 90% of it is that. Freenet is pretty much JUST Carrot Peas. so...if that's your thing...

>> No.37976564

Thanks, I'll have a look into i2p

>> No.37976680

Tor is only as secure as you are. If you go around everywhere and loudly campaign to all your family and friends that you are running a childporn drug-trade bitcoin hidden service and making tons of money, I should expect no amount of security on Tor's part is going to save you from being assfucked by the FBI

>> No.37976729

>freenet has lots of Colored Parrots, probably 90% of it is that. Freenet is pretty much JUST Carrot Peas. so...if that's your thing...
And how would you know this?

>> No.37976731

Be aware i2p has its problems too

i2p's DHT is unregulated unlike tor's
user enumeration is much easier

DHT sybil and sybil in general is impossible to mitigate. user enumeration should be harder but I can't really think of a sane way to do it with i2p's current topology. user enumeration doesn't really do anything that bad, it could be that a nation state enumerates all i2p routers and blacklists them, then i2p won't work in that country. I have yet to be able to enumerate all of i2p's nodes with my 5 high cap routers but given enough resources, it may be within the realm of feasibility. if that is the case, i2p also has no notion of bridges with the current network design, so you'd be screwed, not able to bootstrap or communicate with i2p. bootstrap is another point that needs work too. a p2p bootstrap would be neato but that hasn't been implemented yet.

>> No.37976756

it is 80% people shouting "I WANT CP" and 20% libertarian rants

>> No.37976776

By going there?
All you need to do is look.
Saying detroit is full of crime doesn't mean you went there and shot a nigga

>> No.37976799

Viewing CP is illegal and you can get charged with act years after you did it.
The only people who would ever "go to look" are pedophiles who are trying to hide the fact they like CP. Fucking kill yourself please.

Fucking kill yourself pedophile.

>> No.37976816

Oh, THIS guy again.

>> No.37976818

Will government do anything about the procurement of goods that aren't drugs? A lot of those sellers list some good deals, like the half-off amazon guy.

Anon please calm down.

>> No.37976830

I am not a pedophile, Frost is shit and so is Freenet.

>> No.37976853

Saying freenet is full of cp doesn't mean you went there and downloaded CP

This is kinda what I meant when I said
>Saying detroit is full of crime doesn't mean you went there and shot a nigga

>> No.37976872

>Is Tor really not trustable anymore?

Not if you know nothing about network security.Also an exit node can always be sniffed and you can expect law enforcement to have a ton of exit nodes on the tor network

Aside from that there are issues with linguistics analyses

>> No.37976919

OP needs to read the Tor Stinks document


>> No.37976920

Despite the FH 0day , TorBrowser has amazing defaults and is probably the safest browser you'll use, besides w3m and those types of course.

>> No.37976927
File: 713 KB, 768x519, 1337495912616.png [View same] [iqdb] [saucenao] [google] [report]

i2p is pretty much the most based-tier darknet in existence.

compare i2p's 40,000 nodes to tor's 4,000 nodes

i2p is more anonymous by sheer numbers

>> No.37976932

sure it is amazing, I am just pointing out the flaws since it seemed like that was what op was after

>> No.37976943

Tor isn't broken yet.

That's why the NSA, FBI and such are going with tricks like exploiting Firefox bugs or honeypots with Javascript to catch users.

>> No.37976959


I've heard people running exit nodes sniff data and capture passwords and shit. I don't know if that's just a myth or if it's actually true.

As with all of these services, be careful.

>> No.37976966

If you use Tor inside Tor nobody can trace you back.

>> No.37976971

> We will never be able to de-anonymize all Tor users all the time' but 'with manual analysis we can de-anonymize a very small fraction of Tor users

You will NEVER win if you are targeted by a nation state especially the USA military spy complex.

Just don't be a terrorist and the NSA won't go after you.

>> No.37976978

Generally the idea is; use torbrowser, turn off JS.

>> No.37976991

i2p's more around 30k realistically, 40k is an optimistic guess.

>> No.37976992

I'd give it a year, there's a flurry of activity on a variety of github's involving i2p projects

>complete i2p router rewrite in c

>python bindings

>a bunch of hidden-service hardened services in development

>> No.37977001

like a dream within a dream?

>> No.37977007

>hardened service
The only hardened service is my dick

>> No.37977026

i mean like irc servers and configs for a variety of services that makes them more anonymous/i2p ready

>> No.37977031


>> No.37977040

i2pcpp does participation now (probably), doesn't do IBGW OBP or client traffic yet. still segfaults occasionally.

grab the code and fix shit plz kthnx

http_proxy=localhost:4444 git clone http://git.repo.i2p/r/i2pcpp.git

>> No.37977051

But if you go too deep the page will never load again.

>> No.37977053

What constitutes being a terrorist?

>> No.37977074


Is that some kind of Inception joke or is that an actual thing


I hope that remains true, because I reckon now terrorists are going to beef up their encryption and security skills. These are the people who invented algebra and the numbers 0-9, so I have no doubt they could coordinate an attack over the internet and deliver a payload well before the NSA even knows what's going on.

>> No.37977079

i want it to reach stable so badly so i can run in my my raspberry pi

>tfw don't know cpp


>tfw you can tell most of the devs are /g/entoomen

>> No.37977082
File: 101 KB, 513x355, mikuru.jpg [View same] [iqdb] [saucenao] [google] [report]

that's classified~

>> No.37977089

If you tor too deep you won't even find the page you requested, an endless sea of 404

>> No.37977109

Go away Christopher Nolan.

>> No.37977125

> Is that some kind of Inception joke or is that an actual thing
It's a joke. Running Tor inside Tor is possible in a twisted way but retarded.

>> No.37977157

Does i2p have a silk road?

>> No.37977177

does torbundle come with no-script enabled?

>> No.37977182
File: 90 KB, 695x398, building.jpg [View same] [iqdb] [saucenao] [google] [report]

I don't really know enough C++ to be worth a damn either, but at least I can make sure that it works with GCC and not just Clang

>> No.37977185
File: 1016 KB, 415x235, Lara Croft Suicide.gif [View same] [iqdb] [saucenao] [google] [report]

wit the new laws since 2001, simply thinking about using violence to voice political opinions makes you a terrorist.

>> No.37977205

probably, if not you should make one.

>> No.37977208



>> No.37977214


also browser fingerprint

>> No.37977223

it has "The Marketplace" which is in closed beta
I want it to open soon.

>> No.37977229

why not?

what a joke
so going to pretty much any website breaks anonymity?

>> No.37977260

Most websites require JS to even work.

And since everyone has JS enabled, disabling it makes you less anonymous.

>> No.37977279

its possible to use the exit node as a man in the middle attack because there is the pint where it gets decrypted and send to the server

>> No.37977292

it does have a few markets but they are russian
also see >>37977223

>> No.37977336

I am wondering how they deliver drugs? Do I have to meet someone somewhere?

>> No.37977358

yeah but can't JS send your entire identity like browser info, IP, etc.?

>> No.37977360

Don't know

>> No.37977370

They have a bunch of super discrete shipping methods. It all depends on how anal your customs is when it comes to actually getting the products or not.

>> No.37977381


>> No.37977390

NoScript blocks most of the dangerous JS.
Can't block exploits, tho.

>> No.37977399

Plugins are disabled and everyone should have the same Torbrowser fingerprint unless they mess with it.

Disabling javascript will make you stand out more amongst Tor users but at the same time protect you from possible javascript exploits.

They want the Torbrowser to be useful to non tech savvy people and having every website broken with the default settings would just scare people away.

>> No.37977402

meant for >>37977336

>> No.37977438
File: 10 KB, 250x250, 1383805625965.jpg [View same] [iqdb] [saucenao] [google] [report]

Tor is safe, sure. But there's nothing on it now, except for the new SilkRoad.

>> No.37977452

why would anyone ever use it? it's obviously entrapment.

>> No.37977463

>nothing on tor


>> No.37977486

Nothing that would interest /g/, I mean

>> No.37977488

> The new silkroad
Enjoy your HONEYPOT.

>> No.37977505

I'm not saying you're wrong, but is it completely impossible that the new silkroad is legitimate?

>> No.37977527

Even if it isn't, if silk road can identify you, you're doing it wrong.

>> No.37977544

What are you talking about? There's heaps of kewl shit on tor.

Do you work for the NSA?

>inb4 inb4 dur dur hur hur katz n jacks katz n jacks CHILD PORN ARTIST dur hur hur hur dur, dur dur hur hur hur hur! d-d-d-dur, hur.

>inb4 inb4 dur dur hur hur katz n jacks katz n jacks PARANOID TINFOIL HAT dur hur hur hur dur, dur dur hur hur hur hur! d-d-d-dur, hur.

>> No.37977574

so yeah what do you even use tor for /g/?

>> No.37977602

Buying contract killers and jerking off to little children? What else?

>> No.37977637

having more than 1 firearm OR more than a week's worth of food OR countless other silly shit

>> No.37977651

In a proxychains for 2448_|-|4><0Rz5 stuff.

>> No.37977652

yes I do work for the NSA
there is literally nothing good on tor

>> No.37977677

tor was never trustable

man in the midle attacks!

even if you never connect to the web they can still close "dat gap"(cd,dvd,usb...)

>> No.37977691


>> No.37977713

nothing. too scared

>> No.37977781

Pretty much news aggregators and such, for the sole reason that I don't like being tracked online. Basically if I have a website I can use on tor, I use it there because fuck you google analytics.

>> No.37977784 [DELETED] 

working for the NSF? how did snowmen slip through the net? hasn't he been talking to journalists and such?

>> No.37977996

There's still Cherry Potatoes.

>> No.37977997

is the eepsite down right now btw?

oniichan was pretty /g/-tier, but I can't seem to access it as of the last week.

>> No.37978016

Why not just block google analytics and browse the web with more than 56k speed?

>> No.37978066

it looks up here

>> No.37978185

>complete i2p router rewrite in c

I would actually use it if it wasn't for Java. Who's working on this rewrite?

>> No.37978301

From glancing on github I can only see 3 separate dudes working on it, but there could be a bunch of anonymous contributers via git.repo.i2p

>> No.37978397

Mind linking the github? I want to keep an eye on the progress.

>> No.37978423

it was never trustable you dense dumbfucks.

>> No.37978447


>> No.37978533
File: 42 KB, 479x720, fedoratiptoyousir.jpg [View same] [iqdb] [saucenao] [google] [report]

Thank you.

nice sage bro

>> No.37978591

actually >>37978447 is a unofficial fork of the c++ port

>> No.37978618

yeah, he was just here talking about writing a gcc compatible fork

that's it...

>> No.37978638

Answer? Get more legit relays. If you care about Tor, run your own.

>> No.37978664
File: 61 KB, 407x521, LaughingChinky.jpg [View same] [iqdb] [saucenao] [google] [report]

> implying you can block server-side applications

>> No.37978735

>trust tor
Tor is among the last places in the world to spend your trust. What is wrong with you?

Or are you trying to ask if it's surveillanced like about 5 other retards per day here?

>> No.37978762

Dumbshits need to listen up

>If you do not know what an entry node and an exit node is, you are not safe on tor
>IF you do not know why the entry and exit nodes are the most important to secure, you are not safe on tor
>IF you do not know why not scraping your images with something like exif, and keeping anonymous identities seperate is a good idea, you are not safe using tor

ALl of this info is available on their fucking FAQ page. IF you do not read it you are dumb

>> No.37978807

trust this person.

>> No.37978851

>scraping your images with something like exif
What does this even mean. The rest sort of makes sense but it's not exactly rocket science. Anyone could write that. But who would claim that exif is a tool?

A fluke?

>> No.37978875

>implying you can't block google's servers

>> No.37979076

You can block google locally until you are blue in the face, but every server you connect to that uses google services relays your IP and fingerprinting info straight back to google, which compiles and maintains a profile of you based on which websites you visit, when you visit them, and what you do on them.

Maybe you're into being watched, profiled, and marketed, but personally I'm not into that, which is why I use TOR.

>> No.37979079

trust is for lamers

>> No.37979333


Here are three good ones, according to the DOJ's internal memos:

> Belief in Conspiracies -- Obama's Information Czar, Cass Sunstein, has identified those who hold conspiracy theories as targets for online "cognitive infiltration."
> Own Precious Metals -- Despite the fact that the Federal Reserve paper note (a.k.a. the dollar) is only sustained by faith, you could now be a suspected terrorist if you would like to preserve your wealth with something that holds real value like precious metals.

> Owning guns and ammo. Let's face it: you disagree with the American government colluding with international banks to rob you blind AND you've armed yourself? This also why returning veterans have also been labeled potential terrorists -- they have guns, know how to use them, and may be angry about the lies that sent them to war.

Basically, being a patriot who exercises his or her constitutional freedoms makes you a terrorist according to the Nigger Eric Holder and his criminal chimp boss in the White House.

>> No.37979382


Daily reminder if you voted for Obama, you wanted this future.

>> No.37979475

Q. What's yiddish for "fuck you"?
A. "Trust me."

>> No.37979483

is tha internet lost 4eva?

>> No.37980943
File: 28 KB, 492x550, 945598_643051165722770_412159331_n.jpg [View same] [iqdb] [saucenao] [google] [report]

it is

>> No.37981177

Hola amigo!

>> No.37981581

>read the faq
>thinks this makes him knowledgable
man in the middle attacks you gigantic faggot

tor was not and will never be secure

>> No.37981845


>> No.37981968

growing your own food
valuing freedom
defending the constitution
questioning government

I wish i were kidding, these are all suspicious activities that law enforcement are warned to look out for in official handbooks.

>> No.37982014

I went to detroit and shot a nigga

>> No.37982085



Fuck I love UPS. They deliver dildos, ammunition and drugs, and they are always smiling and high as fuck on endorphins when they jump out of the truck and run up to your doorstep.

>> No.37982168
File: 263 KB, 1112x851, txps_terror_pamphlet_front.jpg [View same] [iqdb] [saucenao] [google] [report]


>> No.37982209
File: 296 KB, 1109x840, txps_terror_pamphlet_back.jpg [View same] [iqdb] [saucenao] [google] [report]


Name (leave empty)
Comment (leave empty)
Password [?]Password used for file deletion.