TOR browser ??? - Survivalist Forum
Survivalist Forum

Advertise Here

Go Back   Survivalist Forum > >
Articles Classifieds Donations Gallery Groups Links Store Survival Files


Notices

The Tech Zone Discussion on computers, software and games.

Advertise Here
Reply
 
Thread Tools Display Modes
Old 05-22-2020, 02:14 PM
surfcast's Avatar
surfcast surfcast is online now
SI vis pacem,para bellum
 
Join Date: Feb 2009
Location: New York
Posts: 1,642
Thanks: 1,377
Thanked 768 Times in 465 Posts
Default TOR browser ???



Advertise Here

Anyone try this ? I want to know if this can damage my computer, in any way.
And is it really untraceable ?
Quick reply to this message
Old 05-22-2020, 05:10 PM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Location: Deep State
Posts: 4,980
Thanks: 1,975
Thanked 4,552 Times in 2,351 Posts
Default

Quote:
Originally Posted by surfcast View Post
Anyone try this ? I want to know if this can damage my computer, in any way.
And is it really untraceable ?
Its an easy and non PITA install / uninstall. Nothing is untraceable but it does a good job of of obfuscation, some sites will block you as they can see that you are connecting from a Tor exit node but generally a worthwhile tool to have in the privacy toolbox.

An alternative is to have a USB with Tails installed on it https://tails.boum.org/

Also worth a look if you especially want secure group chat is https://www.signal.org/
Quick reply to this message
The Following User Says Thank You to Asag For This Useful Post:
Old 05-22-2020, 06:18 PM
Aerindel's Avatar
Aerindel Aerindel is offline
Abnormality biased.
 
Join Date: Dec 2017
Location: Montananistan.
Posts: 7,657
Thanks: 9,860
Thanked 20,588 Times in 6,055 Posts
Default

Does anyone not??
Quick reply to this message
Sponsored Links
Advertisement
 
Old 05-22-2020, 07:24 PM
maintenanceguy's Avatar
maintenanceguy maintenanceguy is online now
statists' be statin'
 
Join Date: Feb 2014
Location: Deep South...Jersey.
Posts: 3,104
Thanks: 2,165
Thanked 10,911 Times in 2,383 Posts
Default

Easy to install. Easy to Use. Comes configured for very week security - don't know why they do that. It's easy to make the necessary adjustments - info all over the internet on how to do this.

Some things to consider:
It was developed by the Navy and released to the public at a time that the intelligence community and much of congress was saying that civilian use of encryption should be made illegal in the US because it makes it harder for law enforcement to do it's job. Why would the government provide encryption to the people when it didn't want the people to have it?

The Tor network is made up of volunteers who run Tor nodes. Your traffic is passed through these nodes. Who would do this? Knowing that a large part of the traffic passing through your server is child porn, drug deals, and illegal goods, who would take the chance?

You're identity and what you're doing on line are kept secret because you are bounced around these nodes randomly and your data is encrypted again at each step. Each node only knows the last node and the next node. No node knows the whole path and no data can be read because it's encrypted. If you wanted to know the whole path and to see the unencrypted traffic at the start and end point, you would have to own the whole network. It would be pretty easy for the governments of the world to set up 10,000 Tor nodes and share the data.

I believe that the US, Europe, and probably other countries have access to 100% of the Tor traffic and know who every person is on Tor and what they are doing. The reason kiddy porn, gun sales, and drug deals are allowed is that there are things happening on Tor that are higher priority and if they start arresting all of the pedo's, the bad guys will no longer use Tor and the government won't be able to listen in any more.
Quick reply to this message
The Following 3 Users Say Thank You to maintenanceguy For This Useful Post:
Old 05-22-2020, 07:56 PM
Aerindel's Avatar
Aerindel Aerindel is offline
Abnormality biased.
 
Join Date: Dec 2017
Location: Montananistan.
Posts: 7,657
Thanks: 9,860
Thanked 20,588 Times in 6,055 Posts
Default

Quote:
Why would the government provide encryption to the people when it didn't want the people to have it?
This is no mystery. It's the first thing you learn when you look into Tor.

It's because the government wanted to use it, but its only effective if there is a lot of other traffic.

Think of it like trying to walk down an empty street. No matter how complicated of a path you take, you are easy to follow because you are the only one on it. Tor fills up the street with millions of people, making it much harder to track any individual person.
Quick reply to this message
The Following 4 Users Say Thank You to Aerindel For This Useful Post:
Old 05-23-2020, 01:57 AM
ImbriD ImbriD is offline
Hunter
 
Join Date: Jan 2009
Location: South Carolina
Posts: 1,884
Thanks: 608
Thanked 1,902 Times in 934 Posts
Default

You need to look up TOR vulnerabilities. As soon as the alphabet agencies realized it was a security issue they set up exit nodes that could decrypt you're entire message.

TOR is only as secure as your as your entry and exit nodes.
Quick reply to this message
The Following 2 Users Say Thank You to ImbriD For This Useful Post:
Old 05-23-2020, 05:37 AM
surfcast's Avatar
surfcast surfcast is online now
SI vis pacem,para bellum
 
Join Date: Feb 2009
Location: New York
Posts: 1,642
Thanks: 1,377
Thanked 768 Times in 465 Posts
Default

Now I am totally confused ! Sounds like it is untraceable, except from the people you fear the most !
Quick reply to this message
Old 05-23-2020, 05:42 AM
Aerindel's Avatar
Aerindel Aerindel is offline
Abnormality biased.
 
Join Date: Dec 2017
Location: Montananistan.
Posts: 7,657
Thanks: 9,860
Thanked 20,588 Times in 6,055 Posts
Default

Nothing is truly untraceable if the people you fear the most take a personal interest in you.
Quick reply to this message
The Following 2 Users Say Thank You to Aerindel For This Useful Post:
Old 05-23-2020, 06:26 AM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Location: Deep State
Posts: 4,980
Thanks: 1,975
Thanked 4,552 Times in 2,351 Posts
Default

Quote:
Originally Posted by maintenanceguy View Post
Easy to install. Easy to Use. Comes configured for very week security - don't know why they do that. It's easy to make the necessary adjustments - info all over the internet on how to do this.

Some things to consider:
It was developed by the Navy and released to the public at a time that the intelligence community and much of congress was saying that civilian use of encryption should be made illegal in the US because it makes it harder for law enforcement to do it's job. Why would the government provide encryption to the people when it didn't want the people to have it?

The Tor network is made up of volunteers who run Tor nodes. Your traffic is passed through these nodes. Who would do this? Knowing that a large part of the traffic passing through your server is child porn, drug deals, and illegal goods, who would take the chance?

You're identity and what you're doing on line are kept secret because you are bounced around these nodes randomly and your data is encrypted again at each step. Each node only knows the last node and the next node. No node knows the whole path and no data can be read because it's encrypted. If you wanted to know the whole path and to see the unencrypted traffic at the start and end point, you would have to own the whole network. It would be pretty easy for the governments of the world to set up 10,000 Tor nodes and share the data.

I believe that the US, Europe, and probably other countries have access to 100% of the Tor traffic and know who every person is on Tor and what they are doing. The reason kiddy porn, gun sales, and drug deals are allowed is that there are things happening on Tor that are higher priority and if they start arresting all of the pedo's, the bad guys will no longer use Tor and the government won't be able to listen in any more.
The UK police has went after pedos using Tor most likely with the assistance of GCHQ and of course communication providers, there has been a few convictions as well.
https://www.theguardian.com/uk-news/...x-abuse-crimes

I believe the bad guys know Tor although not absolutely secure is with a modicum of tradecraft and good digital hygiene not 100% accessible all of the time to the intelligence agencies.
Quick reply to this message
Old 05-23-2020, 06:30 AM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Location: Deep State
Posts: 4,980
Thanks: 1,975
Thanked 4,552 Times in 2,351 Posts
Default

Quote:
Originally Posted by ImbriD View Post
You need to look up TOR vulnerabilities. As soon as the alphabet agencies realized it was a security issue they set up exit nodes that could decrypt you're entire message.

TOR is only as secure as your as your entry and exit nodes.
The agencies never had a lot of trouble with decryption of traffic it was the sources of the traffic that they had to put all the leg work into.
Quick reply to this message
Old 05-23-2020, 06:41 AM
TraderBob's Avatar
TraderBob TraderBob is offline
Para Bellum
 
Join Date: Dec 2008
Location: Arkansas
Posts: 3,807
Thanks: 4,242
Thanked 8,057 Times in 2,525 Posts
Default

Brave browser has regular mode, private window, and private window with Tor and blocks ads.
Some companies and sites block Tor access as it has become common to use tor to attack them.
Quick reply to this message
Old 05-23-2020, 06:53 AM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Location: Deep State
Posts: 4,980
Thanks: 1,975
Thanked 4,552 Times in 2,351 Posts
Default

Quote:
Originally Posted by TraderBob View Post
Brave browser has regular mode, private window, and private window with Tor and blocks ads.
Some companies and sites block Tor access as it has become common to use tor to attack them.
Its a pretty terrible route of attack due to the inherent latency within the service. Tor services also erode monetization of site traffic which may be a more persuasive argument for blocking and nudging users onto other browsers
Quick reply to this message
Old 05-23-2020, 07:21 AM
TraderBob's Avatar
TraderBob TraderBob is offline
Para Bellum
 
Join Date: Dec 2008
Location: Arkansas
Posts: 3,807
Thanks: 4,242
Thanked 8,057 Times in 2,525 Posts
Default

Quote:
Originally Posted by Asag View Post
Its a pretty terrible route of attack due to the inherent latency within the service. Tor services also erode monetization of site traffic which may be a more persuasive argument for blocking and nudging users onto other browsers
Latency really doesn't matter when there are enough attackers. I'm not talking 1 or two script kiddies. One of the servers at our datacenter (not ours) had the highest sustained attack rate ever seen by them, many of them coming from tor exit nodes, and .edu's. It was a concentrated effort
Tor is blocked on all of our business servers as a matter of course, with the exit node lists updated nightly.
Quick reply to this message
The Following User Says Thank You to TraderBob For This Useful Post:
Old 05-23-2020, 07:39 AM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Location: Deep State
Posts: 4,980
Thanks: 1,975
Thanked 4,552 Times in 2,351 Posts
Default

Quote:
Originally Posted by TraderBob View Post
Latency really doesn't matter when there are enough attackers. I'm not talking 1 or two script kiddies. One of the servers at our datacenter (not ours) had the highest sustained attack rate ever seen by them, many of them coming from tor exit nodes, and .edu's. It was a concentrated effort
Tor is blocked on all of our business servers as a matter of course, with the exit node lists updated nightly.
I was under the impression that the Tor exit nodes were not overly significant in DOS attacks due to latency and the availability of cheap geographically distributed stressor services.
I have seen Tor nodes listed for a consumer portal but not the same organizations business portal the response I got was that Tor would not allow Equifax Interconnect to function to the best of its ability for the online consumer shop!
Quick reply to this message
Old 05-23-2020, 11:05 AM
TraderBob's Avatar
TraderBob TraderBob is offline
Para Bellum
 
Join Date: Dec 2008
Location: Arkansas
Posts: 3,807
Thanks: 4,242
Thanked 8,057 Times in 2,525 Posts
Default

Quote:
Originally Posted by Asag View Post
I was under the impression that the Tor exit nodes were not overly significant in DOS attacks due to latency and the availability of cheap geographically distributed stressor services.
I have seen Tor nodes listed for a consumer portal but not the same organizations business portal the response I got was that Tor would not allow Equifax Interconnect to function to the best of its ability for the online consumer shop!
That's why we block them on business servers.

In the general scheme of things, tor isn't a major factor..unless they want it to be

What a concentrated Tor attack on a private server does is 30000 exitnodes tying up all connections on a server, a basic ddos attack. It may not last a long time, because you can immediately block all nodes in one shot, if you can get into it.

You can get an exit node list here : https://check.torproject.org/torbulkexitlist?ip=1.1.1.1
Quick reply to this message
Old 05-23-2020, 06:16 PM
surfcast's Avatar
surfcast surfcast is online now
SI vis pacem,para bellum
 
Join Date: Feb 2009
Location: New York
Posts: 1,642
Thanks: 1,377
Thanked 768 Times in 465 Posts
Default

Quote:
Originally Posted by Asag View Post
Its an easy and non PITA install / uninstall. Nothing is untraceable but it does a good job of of obfuscation, some sites will block you as they can see that you are connecting from a Tor exit node but generally a worthwhile tool to have in the privacy toolbox.

An alternative is to have a USB with Tails installed on it https://tails.boum.org/

Also worth a look if you especially want secure group chat is https://www.signal.org/
Was trying to download tails could not do it so far
Quick reply to this message
Old Today, 02:41 PM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Location: Deep State
Posts: 4,980
Thanks: 1,975
Thanked 4,552 Times in 2,351 Posts
Default

Quote:
Originally Posted by surfcast View Post
Was trying to download tails could not do it so far
What issue were you experiencing?
Quick reply to this message
Old Today, 05:09 PM
maintenanceguy's Avatar
maintenanceguy maintenanceguy is online now
statists' be statin'
 
Join Date: Feb 2014
Location: Deep South...Jersey.
Posts: 3,104
Thanks: 2,165
Thanked 10,911 Times in 2,383 Posts
Default

Quote:
Originally Posted by maintenanceguy View Post
...Why would the government provide encryption to the people when it didn't want the people to have it?...
Quote:
Originally Posted by Aerindel View Post
This is no mystery. It's the first thing you learn when you look into Tor.

It's because the government wanted to use it, but its only effective if there is a lot of other traffic.

Think of it like trying to walk down an empty street. No matter how complicated of a path you take, you are easy to follow because you are the only one on it. Tor fills up the street with millions of people, making it much harder to track any individual person.
Would be pretty easy for the government to flood the Tor network with whatever nonsense traffic it wanted to to fill the voids. They don't need us to generate traffic.
Quick reply to this message
Reply

Bookmarks



Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Survivalist Forum forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:
Gender
Insurance
Please select your insurance company (Optional)

Log-in

Human Verification

In order to verify that you are a human and not a spam bot, please enter the answer into the following box below based on the instructions contained in the graphic.



Thread Tools
Display Modes

Posting Rules
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 05:20 PM.


Powered by vBulletin®
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
Search Engine Optimisation provided by DragonByte SEO (Lite) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright © Kevin Felts 2006 - 2015,
Green theme by http://www.themesbydesign.net