Hello those interested in Intenet stealth...
I've been doing the "Tor" thing for a while now and I like it! Any comments or experiences?
Response to defacto7 (Original post)
guyton This message was self-deleted by its author.
defacto7
(13,651 posts)and a pretty big straw man you have there.
L0oniX
(31,493 posts)defacto7
(13,651 posts)It's not that there something to hide, it's that privacy is slipping away and we need to take it back. There is no place in a civil society for special levels of authority to have a dossier on it's citizens. The word Stazi comes to mind. It's all about freedom and having the choice of privacy where the people choose and the we have no secret rulers.
Kudos to grandma.
sir pball
(4,946 posts)Traffic analysis has been an identified attack against Tor since its very earliest days; a researcher in Delhi has over the last six years worked out a reliable, low-resource method for identifying users.
http://thestack.com/chakravarty-tor-traffic-analysis-141114
defacto7
(13,651 posts)It seems to be full of facts that no one but those who publish this site know anything about. The prop war is on. There was a breach recently that was published as the deanonymization of 400 illegal sites. The facts showed it was 23 and several of those had nothing to do with the sting, the FBI just wanted the computer of a law abiding TOR node owner. There is quite a concern about even the 23 (or less) that were uncovered but it is becoming clear by FBI statements that the only way they were able to enter those nodes was that those nodes were not following TOR procedures for security, so basically it was likely the fault of the node owner. It's being researched but the article you posted just sits alone among a lot of false propaganda going around. If I find that public non-profit information leads to the conclusion that your article is factual, I'll take it all back. But this definitely does not convince.
defacto7
(13,651 posts)see post #7
defacto7
(13,651 posts)As usual twisting the facts are the name of the game these days...
https://blog.torproject.org/blog/quick-summary-recent-traffic-correlation-using-netflows
sigh...
GOLGO 13
(1,681 posts)Easy to use? I'm no "power-user", so if it requires me to deal with "command line" gymnastics, then it's just not for me.
w0nderer
(1,937 posts)tor / vidalia
plus read the manual of tor..very important(javascript for instance can mess you up) so a properly set up brower
i prefer a vpn as well
then i use shell accounts (not graphicals) so
ssh via tor over a vpn
sure...you COULD track it ...eventually
the second thing is red herrings
like all security red herrings are crucial
encrypt your important files
i'll beat you up till you hand them over
encrypt important + other files
how will i know?
paranoia....it's a way of life not a disease