Founded at CERN, hosted in Switzerland, supported by a not-for-profit. The paid tiers support the basic free one, rather than it being a completely; and dubiously; 'free' product.
This reminds me of the time Apple removed their time remaining estimates on the Mac. Next thing they'll be asking for is to hide your battery status cos that totally isn't important.
How about an AI that compares signal strength over time to other carriers and other Android devices and produces a graph that shows which is the worst (spoiler: cumcast).
But no, that'd be too consumer friendly, like how Cumcast helped delete the worldwide net index that showed which ISPs are the best/worst.
Can't be revealing too much now. Consumers might complain, can't be having that.
You’ll be pleasantly surprised by AT&T fiber. We have had it for about 1.5 years after moving to the area. We had Comcast prior to that. Night and day difference.
Edit: Seeing as this has drawn a lot of comments, here's a speedtest being on day 9 of my billing cycle w/ 600GB+ usage - https://www.speedtest.net/result/7808727971.png. Some people don't trust speedtest.net so I checked fast.com (netflix CDN) and got 580Mbps down, 540Mbps up.
I visited the TOR website just now and while I have no current reason to download and use TOR, I chose to donate. Here is the link - I suggest everybody who cares about anonymity and the internet visit and contribute what you can.
Ready for this sub to rage? I've been working out of the Rogers building downtown Toronto (not for Rogers, mind you):
Hey, if you're going to be saying stuff like this online, you might want to consider getting set up with something like TOR if you're not already using it. Stay safe out there, Turkey needs thoughtful young people if it's going to get out of this mess.
Thanks! Tails is actually an official Tor project, and we are working with the developers to ensure that all traffic is safely routed through Tor and no trace is left on the system. I, personally, think Tails is a great distro and have used it a few times while traveling.
Secure. Like REALLY secure. Developed by a security professional. 4k lines of code can be easily read and analyzed. And impressively it's one of the very few protocols that passed formal verification. Probably the only VPN protocol. You can read the whitepaper here
And it's FOSS! (no licensing controversy like with OpenVPN)
It's really a state-of-the-art project.
yup, I'm sure someone is already making a deepweb reddit as we speak.
everyone interested in finding a place in the deep web for uncensored chat, please download Tor.
remember Tor is not a fix all, you must change browsing habits if you want to use it for anonymity, use lesser known search engines and such with it.
As it states in the article it is also sponsored by the US Department of State, specifically the US Department of State Bureau of Democracy, Human Rights, and Labor and even Reddit.
Precisely, TOR was originally designed to protect government communications from others. Now it's being used to protect our communications from them, and they're not too happy about it
Think about the World Wide Web right now. You have tons of different domains (.com, .org, .net, etc), all of which are understood by the Domain Name System. The Domain Name System is what makes your browser understand the website and it magically appears before you.
Tor works a bit different. It utilizes something called "Onion layering". It' rather self explanatory. When you use Tor, you're linked through things called "non-exit nodes". Nodes are volunteers around the world who help transfer you through the Tor network. Anyone can be a node. When it hops you through the non-exit nodes, your traffic becomes encrypted, and no one can see your raw IP address. When you use the clearnet with Tor (AKA the world wide web), you also use an exit node for the final hop. The non-exit nodes are like the boats across an ocean. The exit node is like finally arriving at the shore. However, exit nodes can peer into your traffic if they get really curious. Most exit nodes are perfectly safe and governed by people just like you and me who want to help people browse in liberty.
However, the .onion domain is it's own little feature. The .onion isn't a part of the Domain Name System. It's only understood by the Tor network, so your normal browser doesn't understand it. Instead of using an exit node, it only requires non-exit nodes. Everyone on the "deepweb" appears as localhost, or the IP is 127.0.0.1. It is encrypted end-to-end.
The Tor Project started as a way to help oppressed citizens in different countries browse the Internet. Since then, it's been used across the globe in numerous ways. See how people use Tor here.
Saving this as my future copypasta whenever this question crops up. Be on the lookout for edits.
I've made a post about this, but use TOR to circumvent the censorship and keep yourself safe! https://www.torproject.org/download/download-easy.html.en
If they block the TOR site use this guide to get it via email: https://www.torproject.org/projects/gettor
This is absolutely vital. Keep the information flowing. If you are in Turkey and reading this, download it now. TOR was designed for events like this.
I thought it was relatively common knowledge but: Tor was originally an ONR (Office of Naval Research) project and the NSF is currently a major sponsor as well.
Ahem. If I may.
https://protonvpn.com/ for all your VPN needs (and to prevent your home IP from being added to their blocked list eventually)
https://www.fakepersongenerator.com/ (select 'Texas' from the state drop-down .. . randomly generate everything else, or narrow it down by gender, city, etc if you like) - click generate . .. . and party on!
FOD the data!
Note that guy on Tik Tok had a far more automated way to do this (love that guy!), before they added Captcha and things to slow him down. This way is more manual BUT you can defeat their CAPTCHA and other Turing test stuff they might throw at the problem.
Tell your friends! Assuming they find some way to resurrect their dumb, privacy-violating website that is .. .
You can have better connection and those forgotten people in caves with 1000ms will still kill you 10-15 sec after you killed them on your screen.https://www.speedtest.net/result/8911857612.png My connection for reference. P2P is horrible and bungie should feel bad for relying on it
To be honest if the low bandwidth streams keep up they are going to have to do this in the UK as well, I'm giving some real thought on cancelling based on the last couple of months.
I'm at 200mb+ down any speed service I test and they keep pushing me onto grainy what look like 480p at best streams and no I pay for the middle package not the basic one.
I don't expect 4k I just expect at least 720p and I'm just not seeing it.
Well, if you wanna do this, VPNGate is a great free VPN from some university in Japan with tons of servers around the world - lots of Asian servers for you to use for unlock too! Here
If you're worried, you could run a Tor relay and not an exit node. Relays only move encrypted traffic between users, relays, and exit nodes so there's no risk at all: https://www.torproject.org/docs/tor-doc-relay.html.en Tor always needs more relays as they're a key part of ensuring the security and anonymity of the network as well as improving network performance.
Also, no one has ever been sued or prosecuted for running a relay - including an exit relay. And the EFF believes that running relays, including exit nodes, is legal under US law: https://www.torproject.org/eff/tor-legal-faq.html.en So if you do run an exit node, and you do get in trouble - that would be quite interesting as you'd be the first person ever to have that experience - you'd probably be quite famous for it!
The US also ranks 8th in fixed broadband connection speeds compared toFinland at 40th.
And considering how much bigger the US is and more spread out it is, I would say the US clearly has better internet.
Throw in the fact that according to this article, that is from 2010, all people only have the right to 1Mbps connections. It does say that they'll have everyone on 100Mbps by 2015.... but it's closing in on 2020 and they're only at 58Mbps. Government is great guys!
Let's you connect to Tor over your VPN without the use of the TBB. You may have to configure your browser to use onions.
I wouldn't use this feature if you have real protection in mind.
Because of the way TOR works, it should be impossible for the government to block some sites on it but not others. You're probably unable to get to Wikileaks because of the DDOS attack.
Governments CAN find ways to block access to the TOR network ittself, but once you're on, you're golden. If you can't access TOR through the normal means, look into connecting through bridges. They are most commonly used for people trying to use TOR in China, but they may be useful for you.
Defaulting clients to run as nodes. It would result in a lot more nodes, making it a lot less feasible to crack.
Edit: this isn't without its own set of problems: there's an entry on the Tor FAQ page about why they don't currently do this.
Ha ha! I wish I had Charter. If you had AT&T U-verse you wouldn't have anything bad to say about Charter. Or Comcast. Hell, my 4G internet from my phone is faster than my AT&T "24 Mbps" on most days.
Edit: Here's my "24 Mbps"
If you are not already, please use TOR to post to any forums in the future. This service anonymizes and hides your traffic from surveillance. Saudi Arabia is a big user of web monitoring and filtering devices - they could easily pick keywords out of this post that could get you in real trouble.
Edit: please be aware that they are still likely to know you're using TOR, just not what you're saying/doing while you use it.
I've never bought drugs in my life, but I'm pretty sure I understand how you'd have to do it on the darknet.
Step 1 would be to get your hand on some bitcoin or another crypto-currency, this makes the transaction harder to tie to you (make sure you don't send BTC from the same address again if you want to stay really safe)
Step 2 would be to get the Tor browser bundle
Step 3 is to go to /r/onions or /r/darknetmarkets and find out what market is hip with the kids
Step 4 and beyond I can't help you with since I've never actually bought something on one of those sites.
As a moderator of /r/DarkNetMarkets and a user and researcher of the dark web for more than ten years, you do not actually have any idea what you're talking about. You are repeating an entirely fabricated media myth. Those things may be advertised on the dark web, but they're literally all fake scams ("payment up front!") or law enforcement stings (except for CC#s - those are actually there, and maybe an occasional passport). You would do well not to repeat this nonsense - it makes you seem quite ignorant.
There are essentially zero transactions on the dark web for anything that doesn't fit inside a standard USPS shipping box, or a .zip file. Don't buy into the hype, it's ridiculous, and very costly to the activists, reporters, dissidents, and others who rely on anonymity technologies to make the world a better place.
Take this nonsense back to /r/NoSleep
The bill would make it mandatory for telecom providers, ISPs and search engines to monitor, store, retain and not disclose e-mail, Internet and telephone communications at the request of law and security officials. **No warrant necessary.**
Welcome to 1984. Good thing we have options.
Trump supporter here. This is something I do disagree with POTUS on. The only thing I can suggest is to get squared away with a good VPN service. This is the best I've found thus far.
Looks like they've been deleting some of their older blogposts. That's unfortunate. I especially liked the colon cancer one.
An allegation that's already been dismissed as 'ridiculously far-fetched' by the Swedish foreign ministry.
I'm inclined to agree. Sweden's been giving aid to Cambodia for a long time. This is pure confirmation-bias/post-hoc-ergo-propter-hoc. As much as that might clash with the world-view and interests of the Reddit hivemind, Svartholm-Warg is pretty far from being on anyone's most-wanted list. It's not like we're talking about getting Adolf Eichmann out of Argentina here.
Might also be worth mentioning that the Swedish government aid agency in question (SIDA) is a large and ongoing sponsor of Tor development. So if they're pursuing a secret agenda to stop internet piracy, they've chosen a rather odd way of going about it.
Uhm no, I live in Sweden and I can watch without a problem. Even if it would become blocked here there's a wonderful thing called Mediahint which let's you access anything on the web anywhere :D (Pandora for example)
I can say a lot about how browsing with Tor is different from browsing without Tor, but I'll try to keep it short; when you are not browsing with Tor, you are allowing your ISP, anyone watching your network, and the websites you visit to learn what you are doing online, which sites you visit, what you searched for on Google, what you bought on Amazon, and so on. The article I wrote for ORGZine a few weeks ago has some more information about this.
Tor helps with a number of things, such as defending against traffic analysis, reducing your digital footprint, preventing your ISP from learning which websites you are visiting, and allowing you to access websites which have been blocked where you are currently located.
The tl;dr for how Tor anonymizes your traffic is that it wraps it in three layers of encryption and sends it through three random servers in the Tor network. The longer explanation, with detailed images, can be found on our overview page.
Only if you blindly believe Iranian state propaganda. Trump could declare free 100TB internet for everyone, infrastructure doesn't get created as easily as that.
In reality the US has, on average, the 8th best internet speeds worldwide. Iran has some of the worst in the world with 122 countries ahead of them. Source
It's really not difficult.
Go to this link and install it. Follow install instructions an voila. TOR browser is a fairly user friendly alternative to chrome, and since it's only intended purpose is to protect your anonymity it does almost everything for you. Spend a little time searching for a major marketplace and you'll be fine.
I've never actually had the cajones to purchase anything but I've done quite a bit of lurking. I actually found a guy who was advertising his ability to come to my work and steal things.
https://www.torproject.org/projects/torbrowser.html.en - Open away. The connection is routed through Tor, so you'll look like you're in the middle of Europe, or Kansas, or California, or Singapore. Wherever the exit node is.
If you go to a website it just doesn't load since its flagged right? Or does it record it then email your parents, all of the above?
I'd say let's try a proxy, ~~Ill see if I can find a list of ones that won't be sketchy.~~ DONE
Since proxys are free and I don't see you having a budget for a VPN lets get you set up
Just instead of nord vpn info put in the IP address of one of the site above, not the cleanest solution but the cheapest!
> First place Bucharest, Romania is home to super-low ping, a lightning fast download speed and a thriving gaming culture. From Bucharest Gaming Week (which includes the CS:GO Southeast Europe Championship and the FIFA National Tournament) to their numerous local game studios, Bucharest is a great place to be a gamer whether you’re online or out and about.
Or you could just install Media Hint on Chrome or Firefox and watch Sherlock on BBC iPlayer when they upload it to their streaming service without being affected by geoblocking - as I learnt of yesterday and have been happily enjoying along with Hulu and PBS's service from here in New Zealand.
Tor is designed to fight censorship... Unless France bans encryption altogether, France cannot block Tor.
Tor can use bridges that makes its traffic look like Google, Amazon or just about any other type of RUN-OF-THE-MILL encrypted traffic.
Just one more case of politicians failing to understand how the internet works.
Well, you should donate to the TOR project becauase withtout it you would be getting ripped off by your local dealers who are being ripped off by thier suppliers etc and so on.
Just got banned myself. Use a vpn. They only ban your vpn and not your actual account. I recommend windscribe. https://windscribe.com/
I went on the discord looks like others are also flooding the discord. Was telling people to just use a vpn because it bypasses the ban. Kissanime support asked for my ip. I reply "I'm not dumb" then instantly banned.
I was on a gigabit connection so not long at all. A good rule of thumb is to go to www.speedtest.net, do the test, see how fast your internet is. That second number, the upload speed, divided by 8 is about what your upload should be in MB per second. So if you are getting a 10mbps upload speed you'll probably get like 1.25 MB/s so say 100 gigs is what your syncing. Math, math, math, and we've got about 22 hours on a relatively slow connection, 2 1/2 on a 100Mbps, and like 15-20 minutes on gig......... sorry used to work for an ISP.... =P
Yea, I got one of these and ended up fixing it for good.
My son gave his friend our WAP password for his phone and then the little punk friend decided to go on a downloading spree. How does one give out give out the WAP password and still remain safe?
Let me tell you.
I set up a PFsense router. with an openVPN connection to the Netherlands.
All my machines have a static IP address. Anything requesting a DHCP address gets sent through the VPN and comes out the Netherlands. I'll never see another Rightscorp notice again.
If you set one of these up, make sure to have the DHCP clients use openDNS or Google and NOT your DNS server on the router or provider. Also create a rule blocking all traffic from the DHCP clients to the WAN, to ensure the WAN traffic gets blocked in case the VPN goes down.
> We have received multiple subpoenas and court orders requesting subscriber information. Our response was identical to what we send in case of a DMCA related request. We were never ordered to log users (although there were requests), but since we’re in Canada which has no mandatory data retention directives that apply to VPNs, we wouldn’t need to comply.
Link to rankings + some fun rivalry matchups
I'm disappointed that UCLA/Stanford aren't the 2 fastest ones since we're the birthplace of the internet
Yes - you're looking for PFSense. There are other options too, but I'm a big fan of that one. I use something similar as my current router, a Core i3 PC with a pair of dual-port server NICs, running PFSense. It has no problem handling NAT, firewalling, Squid proxy, blocking lists of known bad actors, etc.
You see, other VPNs will market themselves as SUPER CHEAP PER MONTH.....as long as you buy it for 3 years in advance making the "super cheap" part a bit deceptive.
We decided to one-up everybody and make the absolute cheapest plan that ANY VPN offers at just 1 cent per month. Just pay $1000 in advance and you'll get it for almost 8000 years! GREAT DEAL!
It's obviously a joke but it IS purchasable and some people have bought it. But if you wanna return to the normal plan then you can just click this link and it will remove the "promo": https://windscribe.com/upgrade?promo=nodeal
To easily switch back-and-forth I just use the extension "Media Hint". It's free, installed in seconds, and works flawlessly. Also gives access to other US-only sites.
Shhhhh, don't tell anyone.
Link: https://mediahint.com/ (Firefox and Chrome only)
I don't get it... I mean it's not like anyone would use more dial up modems to increase the blocksize.
Why should anyone restrict their network based on a technology that's almost 2 decades out-of-date at this point?
Heck, [The global average internet speed was 5.6Mb/s] less than 4 years ago. Now it's 10x that
I'd be against a gigantic increase, but I think there's pretty clearly room to compromise on the blocksize without "adding more modems."
> You could run a full node over Tor, but even with one megabyte blocks that would be over 100 megabytes of encrypted Tor traffic every day. The risk of jack-booted thugs breaking down your door and demanding to know what you are doing far outweigh the benefits of running a fully validating node.
Tor has developed a huge number of very successful steganographic techniques to hide Tor traffic in other innocuous traffic. obfsproxy is quite successful and used in production all the time; hiding a few hundred MB of data from censors is quite easy and tens of thousands of Tor users in countries like China use it every day.
edit: And lets just be clear here: Gavin expects it to become impossible to fully participate in the Bitcoin system anonymously. With FinCEN forcing Ripple to make changes to their core protocol to implement AML, this isn't something we should take lightly.
That frontpage banner is trying to convey the essential idea behind Tor as quickly as possible. Before you can actually download and use Tor, you have to browse past an orange warning box that links you to this cautionary list
You are not being accurate when you say:
> No asterisks, no disclaimers, just boom, instant securification.
>The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory
>Onion routing was further developed by DARPA in 1997.
Both agencies are listed on Tor's "sponsors" page... https://www.torproject.org/about/sponsors.html.en
I'm pretty sure with DARPA involved the feds have a pretty good idea of how to mitigate Tor if/when they want to.
Calling it the "deep web" isn't really accurate. What they really mean is the dark web, which usually means TOR. You can download the browser and access web domains that are usually a mixture of letters and numbers ending with .onion. So you can check out /r/onions to find some websites to visit. There's no search engine on TOR, you need to know the exact URL to get to some places. This is actually kind of interesting because that means there could be some really fucked up stuff out there, but you'll never ever know about it unless somebody gives you the exact URL.
I stream most of my stuff through Youtube TV.
I use Nord VPN to change my IP to be from the USA and then I can access YTTV.
I then use my laptop to Chromecast to the TV.
It's ALWAYS HD and no lag, and they have basically every game.
You get 6 accounts with a membership, so you can drive the cost right down each.
Edit: Further info on YTTV
I have to Chromecast to my TV instead of HDMI/Airplay to Apple TV because YT somehow knows it's not on the original device and only plays at 480p. (I even have this issue on a second monitor attached to my laptop). The Chromecast connects directly to the internet and streams straight to the device, not through the laptop and then to the TV like Airplay does. This is how I get 1080p.
The VPN is only installed on my laptop, so technically the chromecast is streaming YTTV through my open UK IP address. Apparently once you've signed in on a laptop with a US IP, it's happy to Chromecast to wherever. Who knows if they'll check the Chromecast IP in the future.
YTTV only works through a laptop/desktop. If you use a mobile/tablet it will authenticate your location through the device GPS, NOT your IP address. This is annoying if you only have a phone/tablet and/or are out and about. I have no idea how to spoof this, if anyone knows how to display different GPS data on your phone, please let me know.
You can have up to 6 accounts use one YTTV account, it's like $40 a month, so can be just over $8 a month.
Compared to what we pay in the UK for Sky Sports, it's way cheaper, and there's a lot of the 3PM games. The VPN cost is a thing too, but I'd happily pay that just to be more private/secure anyway, before we even talk about kicking a bag of wind around a field.
There's a couple of things you could do. If you had two separate internet connections, you could use load balancing to get a faster connection by combining the two. Connectify Dispatch works great for that.
If you want a faster connection to your local network, you could use LACP teaming to bond the two connections together to make a 2Gbps virtual interface. You will need a switch that supports LACP though, and it's tough to take full advantage of this unless you have multiple client machines download files from your computer. Another benefit of this is if one port happens to fail, it will continue to run off the other port. Really only helpful for servers though that need 100% uptime.
Of you could turn the computer into a simple Pfsense router.
Or you could just bridge the connections in Windows making them act similar to a switch. Gives you the possibility to plug other ethernet devices into it, for example if you want to use your laptop simultaneously at your desk, you could plug it into the other ethernet port if your don't have a switch nearby.
> the device they use needs further explanation
Probably an MitM proxy like this one. It's very simple to do: you just need to install a custom SSL cert on the phone, which allows any gateway with the corresponding SSL key to decrypt all the traffic. The same tech is used by many corporate firewalls to also inspect HTTPS traffic, and decent prosumer firewalls like pfSense can do it, too.
There are other people in the thread going on about SSL certificate pinning (which can prevent the above MitM interception), but Google don't appear to be using hard pinning: I've seen plenty of people use Google services from Android and Chrome on corporate networks that have such SSL-intercepting firewalls without issue. I just MitM'ed a couple of Google apps on my iPhone without any problems.
> It is a scare piece.
It's certainly at least a bit stupid. The phone is recording your location via GPS, which is obviously unaffected by turning of WiFi and pulling the SIM.
Just 1 data point from a tor exit node that did online advertising click fraud - No-one's door. A letter's sent mentioning suspicious activity and a security concern. Reply with the response from the Tor Legal and Abuse FAQs.
> Has anyone ever been sued for running Tor?
> Further, we believe that running a Tor node, including a Tor exit node that allows people to anonymously send and receive traffic, is lawful under U.S. law.
>If I receive a request from law enforcement or anyone else for my Tor relay's logs, what should I do?
>Educate them about Tor. In most instances, properly configured Tor relays will have no useful data for inquiring parties, and you should feel free to educate them on this point. To the extent you do maintain logs, however, you should not disclose them to any third party without first consulting a lawyer. In the U.S., such a disclosure may violate the Electronic Communications Privacy Act, and relay operators outside of the U.S. may be subject to similar data protection laws.... EFF is currently working on informational materials to help you respond to the most likely types of legal requests or notices, so watch this space.
And specific responses the EFF provided can be found here:
Please don't run torrents over Tor, the network wasn't designed for that sort of load. Besides, UDP packets don't run over Tor anyway.
Get a paid torrent-friendly VPN that doesn't log.
Buy nordvpn now you son of a bitch https://nordvpn.com/id/youtube/?coupon=internethistorian&utm_medium=affiliate&utm_term&utm_content&utm_campaign=off292&utm_source=aff8358
The purpose is to give people who are locked behind firewalls blocking the net in their home country access to an unblocked internet. This here, covers the academic reasons why
Download it, try it, enjoy it.
If you have BSD / Unix experience, awesome, it'll give you even more control over it. If you don't, no worries, the router has a web interface, and it's REALLY straightforward and has a lot more features and power than a bog-standard router (hell, you can run an OpenVPN server on it, plus IPSEC, plus monitoring and traffic logging, plus QoS - this is the kind of thing you'd pay Cisco / Juniper a couple of grand for).
Romania, Thailand, France have better Internet speed than the USA according to the Speedtest Global Index. Laughing in Danish that is also higher than the USA.
Maybe you can "sideload" it? Just downloading the apk from elsewhere, to avoid geographic banning (not from Proton, for sure)?
First pick an opensource firewall
Here i will help... Buy one of these
Then lock out Microsoft
Start by adding these address to your Firewall.
Or just use linux... But you know Fuck Microsoft and their bullshit.. Just starve them of the data and use the shit out of their products for free.. Make them regret giving it away for free. It is the best solution..
Edit most of you know that host file edits dont make a difference as they are hard coded into DNS.aspi and cannot be bypassed through the host file.. External firewall and route them to 0.0.0.0
Sorgligt att det ens är uppe för diskussion i Sverige.
Trodde att man i Sverige har lite mer kunskap om hur internet fungerar, Att blockera IP adresser är ju fullständigt meningslöst med alla VPN/Proxy tjänster. Men det kanske blir ett uppsving för Tor i Sverige.
The simplified explanation is that you can think of Tor like using three VPNs in a row. The goal is to hide your IP address, giving you complete anonymity online. Tor routes Internet traffic through three relays: an entry node, a middle node, and an exit. Each relay has it's own layer of encryption and the exit node is the one that contacts the web server, fetches the webpage, and gives it back to you yet doesn't know your actual IP address.
This page explains things pretty well: https://www.torproject.org/about/overview.html.en If you still don't understand I can try to further clarify terms for you.
Windscribe is a good Canadian owned one. It has a free service that has a generous amount of data for the free one. You can tweet and get about 15GB per month or you can watch /r/efreebies for when they offer codes you can redeem to up it to 45 or even 50GB per month.
Of you can buy a "lifetime" (10 year) subscription like I did for unlimited badnwidth. The only things they log are that you connected to the VPN at all and how much bandwidth you used (to keep track of the free service) but they don't track what you're doing with that bandwidth.
What can we do to help? Donate to the Tor project monthly.
The fbi in conjunction with universities is trying to ddos and hack the network. Every one dollar spent on Tor takes ten dollars in computing power by the fbi and state sanctuned hackers. With this approach the fbi can't handle the computatiinal power to hack tor.
Tor is not (presently) financed by the US military. It has previously been funded by DARPA and the US Naval Research Lab. It has also received funding in part by foreign governments and institutions. The core Tor development team also includes individuals who are not US citizens or residing in the US.
They recently started making it inject pop-up ads into the sites it's used on, and integrated a "shopping helper" toolbar that you have to dodge when installing.
Mediahint does the same job, is free, and doesn't have any of those negative behaviors.
In general, look here: Lifehacker region block guide
You don't need to install any kind of client for this, Windows can connect to SSTP-based VPNs natively.
VPNGate is a pretty good place to find them if you don't have a paid one, just filter by "MS-SSTP", pick a Korean/Japanese one and copy the IP address.
Then on Windows 10 just go to Settings -> Network -> VPN then click on "Add a VPN connection" and paste the IP, after that you can simply turn it ON/OFF from the notifications panel.
On previous versions of Windows the VPN stuff lives on the Control Panel instead, under network devices iirc.
There’s no way in hell I’d use Messenger. I trust FB to do the most anti-consumer thing possible in all situations and I’m not giving them more data.
Same for WhatsApp. It has a good security reputation, but no way you can make me believe FB won’t try to subvert it.
Telegram isn’t bad, but I wish private chats were the default (like they are in iOS).
Signal is good. I endorse it.
Here’s a nice write up of secure messaging apps: https://nordvpn.com/blog/most-secure-messaging-app/
Now, tell me which of those that are mostly green we could get all our friends and family to switch to? Messages wins for me because it’s a decent default and has a better security stance than most of the harder-to-adopt alternatives.
Someone posted a link a while back on r/efreebies for a VPN service that was $90/year, or $45/year if you used a virtual coupon for new members. I'll see if I can't find it for those interested as it has both a desktop VPN application as well as a browser extension to add redundancy.
Edit: Here's the link to the post, and here's the link to the website.
It’s essential for you buddy!
/r/privacytoolsIO recommends exactly one free VPN:
Install and enjoy all sites online.
Of course follow the law, since you won’t be invincible - just free.
Be well friend!
I was just writing an email to them.
Just read the blog post on your website https://nordvpn.com/blog/nordvpn-false-allegations/ from Daniel. It is quite informative and clears things on the ongoing issue. Good job on it!
But I have one unrelated question to your company/management. You say that you are based in Panama but your finance processing (payment from users) are done by a company based in New York, US. Now we all know that when we do financial processing inside the US, all records have to be kept including who paid whom for what purpose and from what method.
Does this not make your users' privacy and identity vulnerable from the US government?
A concerned internet citizen.
Designed by Trevor Perrin, who also designed the end-to-end encrypted Axolotl algorithm for Signal (that's now also used by WhatsApp, Riot, and others).
Fun fact: WhatsApp and WireGuard are already using Noise and Noise has a Rust implementation, too. Sounds like they've made Mozilla's job pretty easy!
>Who Uses Tor?
>People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
>Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.
>Activists & Whistleblowers
>Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.
>Journalists and the Media
>Journalists and the media use Tor to protect their research and sources online.
>Military and Law Enforcement
>Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.
Pretty sure Nord is decent, but you do know that the reason it scores high on all the 'review' sites is because they pay affiliates like crazy, right? Up to 100% revenue share. Check https://nordvpn.com/affiliate/
I stopped trusting VPN review sites long ago
>You was from Denmark right
yep... it was kinda hard getting the pfsense box... first i had to go to https://store.pfsense.org/ and then i had to click BUY! can you imagine that?
you could also go to https://www.pfsense.org/partners/locator.html and find a local reseller. :)
As an alternative, you can do this on an amd64 or x86 platform with PfSense which is a very popular FreeBSD based firewall appliance.
PfSense has available a number of packages built from open source projects to install additional functionality, for instance antivirus and caching proxy.
Since it's based on a PC platform, you can build a router with as much or as little processor, RAM and disk as you wish. This allows you to run what is considered by many a commercial grade firewall on a device which consumes no more power than the TP-LINK router.
Another advantage of being PC based is that you can run it as a virtual machine.
Engineers in a lab, I'm sure. Regular consumers might have the bandwidth for it, but there are many factors influencing actual data rates, including backhaul, usage, device capabilities, etc. This is probably about as fast as it gets right now: (B66+B46+B46+B46+B4) https://www.speedtest.net/my-result/a/4988720048
>Purism is an american company, where gag orders exist. They don't exist in Switzerland. So unless ProtonMail itself is the bad actor, they can notify the public about data requests. Furthermore they can challenge them in court, which is public.
I'm putting this quote from u/rafficer here for visibility. Feels like this sub gets a lot of concern trolling.
Hi! Note that some services are not VPN-friendly and they can block known VPN IP addresses. Please try switching to a different server or try another protocol to see if you can access the site in that manner.
Feel free to contact us and tell us with which exact servers are you encountering this, and on which websites, so we can try to reproduce the issue and flag it to our team.
If you think the admins will tattle on you then you should use Tor to create a new account.
I would say it's an overkill for a subreddit leaks though but you never know.
It’s a term that is a spin on the “five eyes” countries, see here:
An alliance between 5 countries: Australia, Canada, New Zealand, the United Kingdom and the United States; to openly share intelligence between each other.
The fourteen eye’s thing is more of a statement from a bunch of VPN providers that also adds: Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain, and Sweden. To the group sharing intelligence. Although I can’t find any specific third party references to the whole “fourteen eyes” claim beyond a bunch of articles and blogs from VPN providers right now.
Here is a long to the Proton VPN provider that talks about it (fourteen eyes):
Tor in no way advocates child pornography.
It was created by the US Navy and still gets a lot of funding from them. Tons of journalists use it. It's used in China to bypass the great firewall.
I personally use Tor extremely often because I like to keep my different online identities separate.
Saying Tor advocates child pornography is like saying Tesla advocates running people over.
I didn't get that sense from it. I thought it did a great job of pointing out why we want privacy and even finished up with Snowden's point that it works, and that we need to move forward with it and make it ubiquitous. The section on Silk Road and criminal uses of anonymity was only about 10 minutes of the 59 minute show, broken up by a talk on bitcoin. The notion put forth by one that anonymity creates crime was rebutted by Applebaum who pointed out that criminal behavior pervades all aspects of and technologies used by human society, not just the Internet.
If anything, I think the show is probably going to inspire more people to check out Tor than it's going to cause people to stop using it. (https://www.torproject.org/ by the way).
No, hola is pretty shitty too. They recently started making it inject pop-up ads into the sites it's used on, and integrated a "shopping helper" toolbar that you have to dodge when installing.
Mediahint does the same thing, is free, and doesn't have any of those negative behaviors.
I'm running pfSense. It's very flexible, and a good learning experience for me. I've got it configured to block ads at the router level via the firewall and DNS based blocking, so the vast majority of ads (including phone ads!) are gone without having to install anything on connected devices.
the desktop parts is a firewall/router running pfsense for load balancing between multiple (slower) internet connections
the laptop parts is for gaming almost classic titles like the very first Command & Conquer, Red Alert, Quake 3, Abe's Odyseee/Exodus... for these older games that you'd spend hours and hours, it made sense to have a lower power rig to save on electricity.
> when you talk about pfSense you're really talking about the UI atop freeBSD.
Many people have this opinion, all of them are wrong. There are actually a lot of patches to FreeBSD base and some of the packages, in addition to the GUI. The "GUI" is also the configuration layer (the same PHP runs both).
In answer to OP: yes, there has been a fair amount of attention on the PHP GUI in the last year. You can see where people have reported bugs, we've fixed them, and made new releases.
Please don't make shit up. Onion domains do not resemble DNS in any meaningful way. They aren't centralized and they don't map a meaningful name to an IP.
The server creates a public/private key pair. The .onion address is derived from this public key. This information is then advertised on the network. A client can then create a temporary key and pick a rendezvous node through which to pass data, encrypt these settings with the server's public key, and send them through one of several nodes to the server, which can then decrypt the settings with its private key. Then the server and client can talk through the chosen rendezvous point, which cannot eavesdrop because the communications are encrypted with the temporary key. Here is an excellent explanation of this process.
While they can't replace the routing infrastructure, .onion domains do a decent job of taking DNS's place. Their main disadvantage is that they aren't meaningful or memorable addresses.
Most people who have gotten caught doing bad stuff on Tor were caught because of things they did outside of Tor. I imagine if Tor was insecure we would hear about a lot more activists being imprisoned or killed for dissent.
For example, One guy used IRC with Tor. The one time he logged into IRC with the same username from his home network, it allowed his identity to be compromised.
Tor Project has a pretty good list to help: https://www.torproject.org/download/download.html.en#Warning
Because those volunteers believe in both charity and free speech. It's crazy, but there are some good people in this world.
Tor routes traffic through a chain of several boxes, not just one. It also uses Asymmetric encryption to prevent any one box from knowing too much. The first box in the chain doesn't know what the data is or what its final destination is. The last box in the chain has no idea where the traffic is coming from.
More info on the Tor project website. I don't work for them; I am just a privacy advocate who gets upset when the Tor project receives incorrect slander.
They said in their blog post that they are going to get someone to do that soon.
>We understand that these facts alone may not be enough to clear our name. Therefore, we are hiring one of the largest professional service firms in the world to run an independent audit and verify our ‘no logs’ claim. The audit is expected to be completed within 2 months and will independently verify that the accusations are false.
First of all, I suggest using the Tor Browser Bundle and not configuring software yourself. The TBB has been set up and tweasked by the Tor developers and should be free from leaks. By default the TBB also has location tracking disabled.
Location tracking works by the browser using wifi and other signals to find your location (at least in Firefox. Here is a link to Mozilla's FAQ on geolocation). This entirely defeats the purpose of Tor, whch is to hide your identity and location. Do not enable tracking if you want to stay anonymous.
I recommend the following light reading: Want Tor to really work? The ellipses ( . . . ) indicate the reasons for the behaviors, which can be read in full at https://www.torproject.org/download/download-easy.html.en#warning
>You need to change some of your habits, as some things won't work exactly as you are used to.
> a. Use the Tor Browser . . .
> b. Don't enable or install browser plugins . . .
> c. Use HTTPS versions of websites . . .
> d. Don't open documents downloaded through Tor while online . . .
> e. Use bridges and/or find company . . .
> Be smart and learn more. Understand what Tor does and does not offer . . .
Guess what Tor is so good for... Such projects proved their worth for the democracy movements in countries like Egypt, Lybia, Jemen... and now the US authorities are probably afraid of it.
SURPRISE. A very future-oriented action by the US agencies.