Recent comments in /f/Tor
cumlord wrote
Reply to comment by Saint_Cuthbert in Is Tor Trustworthy and Safe? by Saint_Cuthbert
Pretty much. tor is comparatively centralized and a lot more high profile than i2p. Fingerprinting is the thing that scares me the most, there's lots of identifiable metrics. Also instructive to look at how people have gotten deanon in the past but it doesn't anticipate the future or current capabilities. I'd think they'd spend the most energy targeting or trying to compromise high value targets/individuals like marketplaces/admins for the intel they could attain over a long period and we would be none the wiser. even if they don't have a big picture view of everything right now there's lots of tools that can be used to focus in on something of interest. I guess a good defense is to not be of interest.
Saint_Cuthbert OP wrote
Reply to comment by cumlord in Is Tor Trustworthy and Safe? by Saint_Cuthbert
There are only some odd-thousand tor nodes out there. For a powerful adversary to run many of them doesn't seem too unbelievable (50 cent army). They may not be able to hire someone to watch each and every node al the time, but they could possibly automate the process with artificial intelligence.
The Whonix documentation discusses how Tor users can be fingerprinted by their typing speed, among other things. And remember that it wasn't public knowledge that emails and phone calls could be tracked on a large scale until somewhat recently. In The Art of War is says to make your enemy think that you're weak when you're strong and strong when you're weak.
cumlord wrote
Reply to Is Tor Trustworthy and Safe? by Saint_Cuthbert
I've always assumed that it's monitored to some degree. Not like all tor users can be monitored clearly at all times, but from the aspect that running tor doesn't make you nsa proof. nothing does, but it does a good job at making you blend in, so when i want to look like everyone else and not do something identifiable, tor doesn't seem so bad. i think that's probably it's best use case, when what you chose to do with it would be like a needle in a haystack identifying you, but it can't correct for user error.
good to see new people interested in this kind of stuff even if they show you they just logged into their bank account with tor. they got the right spirit i guess.
NotQball wrote
Reply to Is Tor Trustworthy and Safe? by Saint_Cuthbert
The Official router does block through TOR traffic. It is an OK decision since it is an entry level router. I rarely test that version. The truth is that you do not want a lot of traffic over 30% (varies depending on conditions) through slower networks: satellite, ygg, flokinet some cell, modems, some VPNs. It does help with security but at a cost. Don't be stupid... in theory some entry guard may be able to block you unless you use your own servers. Again: If your threat model dictates it don't hesitate!
Saint_Cuthbert OP wrote
Reply to comment by NotQball in Is Tor Trustworthy and Safe? by Saint_Cuthbert
In your third statement, are your referring to the fact that I2p is now blocking Tor traffic?
NotQball wrote
Reply to Is Tor Trustworthy and Safe? by Saint_Cuthbert
I did NOT monitor TOR the same way as i2p. There are some obvious "concessions"/sell-outs. I do NOT want to open THAT can of worms. What is obvious:
- Bad crappers: some entry guards and some exit nodes. These guys sell your data even from browsing ebay and Amazon. That desperate.
- In MY OPINION Tor Browser is mediocre...
- If you run YOUR OWN Tor servers and i2p routers (plural), despite of what you heard, SOME i2p traffic through Tor will help you out with TOR. You NEED 2 KNOW what you are doing on both networks and have some monitoring tools. This is for people in dire situations with enough knowledge of both networks. It is more of a problem for i2p than TOR. Don't make me sorry that I brought it up!
HimeArikawa wrote
Reply to Hidden Answers died by ngmm
There is a new version back online
noptic wrote (edited )
Reply to Widespread Attacks Push Tor to Proof-of-Work by z3d
It was inspired by the amazing mining algorithm that was developed for Monero.
Monero is true digital cash, anonymous and untraceable by default. Get your hands on some today @ http://lm.i2p
Official wallet available @ http://get-monero.i2p/
horriblealtercation179 wrote
Reply to Widespread Attacks Push Tor to Proof-of-Work by z3d
finally, let's see if it improves speed somehow. hopefully there will be benchmarks
9995Deluxe wrote
Reply to DuckDuckGo v3 onion by vistingghost
If you are using the Tor Browser Bundle and have set DuckDuckGoOnion as your default search engine, it still uses the v2 URL. It looks like they will switch this to the v3 onion once the v2 onion goes offline.
Rambler wrote (edited )
Reply to comment by sitefights in Raddle v3 onion by sitefights
Why are they hard on RAMBLE?
Something to do with me having insensitive humor and me possessing the radical belief in free speech, even speech promoting ideas that I disagree with.
We have a lot more in common than we have in our differences, the main difference is that I don't believe speech needs strict regulation and I don't jump to conclusions about someone's deeply rooted political and personal beliefs based on insignificant online interactions.
With that said, they've got a decent site. Like said over there: they do their thing and we do ours. Nothing to bicker over. A lot of the members here would get banned there, and a lot of the members there would scoff at some of the content here and not return after experiencing an unsavory exchange.
No big deal.
sitefights OP wrote
Reply to comment by Rambler in Raddle v3 onion by sitefights
If I find a user of what I made, I'll be glad and kind to the user. Why are they hard on RAMBLE? Btw I'm having fun with fights between them and RAMBLE a bit. Just a bit.
Rambler wrote (edited )
Reply to Raddle v3 onion by sitefights
They'll delete that post and ban you as soon as Zig or Emma comes online since it mentions this site, by the way.
Good to see them upgrade to V3, though.
The software that powers this site was made for that site, by the way. In case you didn't know.
BlackWinnerYoshi wrote
Reply to comment by AWiggerInTime in DuckDuckGo v3 onion by vistingghost
The v2 onion still works, but might cease to after 2021-10-15, when v2 stops working after an update.
AWiggerInTime wrote (edited )
Reply to DuckDuckGo v3 onion by vistingghost
Finally. They had that v2 onion for years and couldn't be bothered to flip that one switch to make it v3.
Does it even work? I stopped using the v2 onion after it died for like a year or something.
Shadov wrote
Reply to A IRC chat room on Tor by piamie
k
DeusExMachina wrote
Reply to [RAMBLE]'s onion site is back up. by Rambler
Nice ! Thanks for this website !
BlackWinnerYoshi wrote
Reply to TIP: Reddit will give you an 'invalid password' message sometimes if logging in through Tor. Disable JS and try again, it'll work. by Rambler
Well, reddit over VPN probably works better, unlike 4chan, which doesn't work over Tor, VPN, proxies, or whatever. But still, if you can, delete your reddit account. And uhh, don't be like me, who had to make a second reddit account just because I screwed up my phone, somehow, and I had to factory reset it, therefore losing my two-factor authentication codes. And if you're an EU citizen, make sure you don't use the normal deactivation process. Make sure to back up 2FA!
burnerben OP wrote
Reply to comment by !deleted846 in Im getting a 504 on NotEvil by burnerben
its a real shame, notEvil is a fantastic search engine
AWiggerInTime wrote
Reply to Im getting a 504 on NotEvil by burnerben
seethe further newfag
boobs wrote
Reply to .onion SSL Certs available. by Rambler
this seems like the opposite of what is needed. instead of making an actually secure and decentralized human readable name system they are falling back to the x509 ca cabal money printer.
smartypants wrote
Reply to .onion SSL Certs available. by Rambler
awesome pluto photo
https://rambleeeqrhty6s5jgefdfdtc6tfgg4jj6svr4jpgk4wjtg3qshwbaad.onion.sh/f/pics
currently uses a default shared "*.onion.sh" wildcard SSL cert this hour
I assume this new news info is in regard to plain vanilla real onion sites for tor, not clearweb https via onion.sh, though i assume onion.sh will soon perform a better cryptographic identity test of sorts.
nobody wrote
Reply to What are some good .onion sites to visit? Most wikis and guides are dated and full of broken links. by Rambler
You may also like the anonymous pastebin
ManMan wrote
Reply to Is Tor Trustworthy and Safe? by Saint_Cuthbert
I bet the feds funded tor just enough to keep it going so it does not get too good and to greatly slow anything better such as I2P.