I visited the TOR website just now and while I have no current reason to download and use TOR, I chose to donate. Here is the link - I suggest everybody who cares about anonymity and the internet visit and contribute what you can.
Hey, if you're going to be saying stuff like this online, you might want to consider getting set up with something like TOR if you're not already using it. Stay safe out there, Turkey needs thoughtful young people if it's going to get out of this mess.
Thanks! Tails is actually an official Tor project, and we are working with the developers to ensure that all traffic is safely routed through Tor and no trace is left on the system. I, personally, think Tails is a great distro and have used it a few times while traveling.
yup, I'm sure someone is already making a deepweb reddit as we speak.
everyone interested in finding a place in the deep web for uncensored chat, please download Tor.
remember Tor is not a fix all, you must change browsing habits if you want to use it for anonymity, use lesser known search engines and such with it.
Hopefully there is no way this is going to pass, that's the most retarded thing I have read all day.
I know people who are already calling their MPs over that stuff (I am French).
Nevertheless, this shows that we need people to fund more research toward censorship-resistant networks and privacy enhancing technologies.
Seriously, that's everyone's concerns. This law proposition might sound silly but it sheds light on a really depressing reality: a lot of elected leaders actually think that this privacy and unrestricted communication is a threat.
Of course they do not realize that the way human societies decide to legislate on security and privacy now is going to shape the next fifty years of technological and social development.
Yeah you read me right. Internet is the bronze age of what the world can become. Let's try to skip the middle ages folks.
If you have some bucks to spare, I urge you to not spend it on gold today to reward some beautifully drawn dickbutt and rather make a donation to one of these organizations:
Americans: Electronic Frontier Foundation: https://www.eff.org/
Europeans: La Quadrature du Net: https://www.laquadrature.net/
The Tor Project: https://www.torproject.org/
As it states in the article it is also sponsored by the US Department of State, specifically the US Department of State Bureau of Democracy, Human Rights, and Labor and even Reddit.
Precisely, TOR was originally designed to protect government communications from others. Now it's being used to protect our communications from them, and they're not too happy about it
Luckily, you don't need to sacrifice nearly as much as Stallman used to. Though you'd still need to sacrifice a bit.
Laptop - Libreboot X200 is FSF-certified and comes preinstalled with free software down to its boot firmware.
Browser - Tor Browser, which Stallman himself now uses to avoid web tracking
Smartphone - Neo900 runs a "100% Free Software stack" on its main CPU. The non-free baseband that comes with mobile is isolated:
> We're going to address privacy concerns of non-free modem firmware by ensuring that the modem has access to no more data than absolutely necessary, so it won't be able to spy on anything that's not already available on carrier side. On Neo900 one can be sure that the modem is actually turned off when requested, not just pretending to be. Users will be notified in case of the modem wanting to do something without their consent.
> Unlike some other smartphones do, Neo900 won't share system RAM with the modem and system CPU will always have full control over the microphone signal sent to the modem. You can think of it as a USB dongle connected to the PC, with you in full control over the drivers, with a virtual LED to show any modem activity.
Even if you can't use all of these, every bit helps.
Think about the World Wide Web right now. You have tons of different domains (.com, .org, .net, etc), all of which are understood by the Domain Name System. The Domain Name System is what makes your browser understand the website and it magically appears before you.
Tor works a bit different. It utilizes something called "Onion layering". It' rather self explanatory. When you use Tor, you're linked through things called "non-exit nodes". Nodes are volunteers around the world who help transfer you through the Tor network. Anyone can be a node. When it hops you through the non-exit nodes, your traffic becomes encrypted, and no one can see your raw IP address. When you use the clearnet with Tor (AKA the world wide web), you also use an exit node for the final hop. The non-exit nodes are like the boats across an ocean. The exit node is like finally arriving at the shore. However, exit nodes can peer into your traffic if they get really curious. Most exit nodes are perfectly safe and governed by people just like you and me who want to help people browse in liberty.
However, the .onion domain is it's own little feature. The .onion isn't a part of the Domain Name System. It's only understood by the Tor network, so your normal browser doesn't understand it. Instead of using an exit node, it only requires non-exit nodes. Everyone on the "deepweb" appears as localhost, or the IP is 127.0.0.1. It is encrypted end-to-end.
The Tor Project started as a way to help oppressed citizens in different countries browse the Internet. Since then, it's been used across the globe in numerous ways. See how people use Tor here.
Saving this as my future copypasta whenever this question crops up. Be on the lookout for edits.
Regardless of your take on the article, it reinforces what we should always keep front and center: Privacy is not a crime.
There are quite a few methods of protecting privacy mentioned, like running a VPN, but these only offer individual privacy. The Tor project (mentioned in the article) is a collaborative effort to offer privacy to its users.
If you think privacy is valuable, then consider running a Tor node or offering support to the Tor foundation. In this way, you will help both yourself, and others.
edit: TOR -> Tor (credit: hatter and his faq reading)
Technically the internet, all computers, cameras are all used to facilitate the creation and distribution of child porn but it would be silly start calling for their elimination.
I could tell you the benefits of Tor but it's probably better to get it straight from the project itself.
I've made a post about this, but use TOR to circumvent the censorship and keep yourself safe! https://www.torproject.org/download/download-easy.html.en
If they block the TOR site use this guide to get it via email: https://www.torproject.org/projects/gettor
This is absolutely vital. Keep the information flowing. If you are in Turkey and reading this, download it now. TOR was designed for events like this.
I thought it was relatively common knowledge but: Tor was originally an ONR (Office of Naval Research) project and the NSF is currently a major sponsor as well.
If you're worried, you could run a Tor relay and not an exit node. Relays only move encrypted traffic between users, relays, and exit nodes so there's no risk at all: https://www.torproject.org/docs/tor-doc-relay.html.en Tor always needs more relays as they're a key part of ensuring the security and anonymity of the network as well as improving network performance.
Also, no one has ever been sued or prosecuted for running a relay - including an exit relay. And the EFF believes that running relays, including exit nodes, is legal under US law: https://www.torproject.org/eff/tor-legal-faq.html.en So if you do run an exit node, and you do get in trouble - that would be quite interesting as you'd be the first person ever to have that experience - you'd probably be quite famous for it!
Because of the way TOR works, it should be impossible for the government to block some sites on it but not others. You're probably unable to get to Wikileaks because of the DDOS attack.
Governments CAN find ways to block access to the TOR network ittself, but once you're on, you're golden. If you can't access TOR through the normal means, look into connecting through bridges. They are most commonly used for people trying to use TOR in China, but they may be useful for you.
Defaulting clients to run as nodes. It would result in a lot more nodes, making it a lot less feasible to crack.
Edit: this isn't without its own set of problems: there's an entry on the Tor FAQ page about why they don't currently do this.
If you are not already, please use TOR to post to any forums in the future. This service anonymizes and hides your traffic from surveillance. Saudi Arabia is a big user of web monitoring and filtering devices - they could easily pick keywords out of this post that could get you in real trouble.
Edit: please be aware that they are still likely to know you're using TOR, just not what you're saying/doing while you use it.
I've never bought drugs in my life, but I'm pretty sure I understand how you'd have to do it on the darknet.
Step 1 would be to get your hand on some bitcoin or another crypto-currency, this makes the transaction harder to tie to you (make sure you don't send BTC from the same address again if you want to stay really safe)
Step 2 would be to get the Tor browser bundle
Step 3 is to go to /r/onions or /r/darknetmarkets and find out what market is hip with the kids
Step 4 and beyond I can't help you with since I've never actually bought something on one of those sites.
As a moderator of /r/DarkNetMarkets and a user and researcher of the dark web for more than ten years, you do not actually have any idea what you're talking about. You are repeating an entirely fabricated media myth. Those things may be advertised on the dark web, but they're literally all fake scams ("payment up front!") or law enforcement stings (except for CC#s - those are actually there, and maybe an occasional passport). You would do well not to repeat this nonsense - it makes you seem quite ignorant.
There are essentially zero transactions on the dark web for anything that doesn't fit inside a standard USPS shipping box, or a .zip file. Don't buy into the hype, it's ridiculous, and very costly to the activists, reporters, dissidents, and others who rely on anonymity technologies to make the world a better place.
Take this nonsense back to /r/NoSleep
The bill would make it mandatory for telecom providers, ISPs and search engines to monitor, store, retain and not disclose e-mail, Internet and telephone communications at the request of law and security officials. **No warrant necessary.**
Welcome to 1984. Good thing we have options.
An allegation that's already been dismissed as 'ridiculously far-fetched' by the Swedish foreign ministry.
I'm inclined to agree. Sweden's been giving aid to Cambodia for a long time. This is pure confirmation-bias/post-hoc-ergo-propter-hoc. As much as that might clash with the world-view and interests of the Reddit hivemind, Svartholm-Warg is pretty far from being on anyone's most-wanted list. It's not like we're talking about getting Adolf Eichmann out of Argentina here.
Might also be worth mentioning that the Swedish government aid agency in question (SIDA) is a large and ongoing sponsor of Tor development. So if they're pursuing a secret agenda to stop internet piracy, they've chosen a rather odd way of going about it.
I can say a lot about how browsing with Tor is different from browsing without Tor, but I'll try to keep it short; when you are not browsing with Tor, you are allowing your ISP, anyone watching your network, and the websites you visit to learn what you are doing online, which sites you visit, what you searched for on Google, what you bought on Amazon, and so on. The article I wrote for ORGZine a few weeks ago has some more information about this.
Tor helps with a number of things, such as defending against traffic analysis, reducing your digital footprint, preventing your ISP from learning which websites you are visiting, and allowing you to access websites which have been blocked where you are currently located.
The tl;dr for how Tor anonymizes your traffic is that it wraps it in three layers of encryption and sends it through three random servers in the Tor network. The longer explanation, with detailed images, can be found on our overview page.
It's really not difficult.
Go to this link and install it. Follow install instructions an voila. TOR browser is a fairly user friendly alternative to chrome, and since it's only intended purpose is to protect your anonymity it does almost everything for you. Spend a little time searching for a major marketplace and you'll be fine.
I've never actually had the cajones to purchase anything but I've done quite a bit of lurking. I actually found a guy who was advertising his ability to come to my work and steal things.
https://www.torproject.org/projects/torbrowser.html.en - Open away. The connection is routed through Tor, so you'll look like you're in the middle of Europe, or Kansas, or California, or Singapore. Wherever the exit node is.
Just to clarify, TOR allows you to access the "deep web," which is basically everything on the internet that aren't catalogued by search engines. The "deep web" is many times larger than the "surface web," which is everything catalogued by a search engine, such as reddit, Youtube, and the porn sites we all know and love.
Not everything in the deep web is dangerous (hitmen, CP, drug trafficking).
The two layers most people know are the first two. The first layer is things like unlisted Youtube videos, recently added websites, restricted content such as Facebook profiles, etc. The first layer is considered by most Tor users to be still in the surface web.
The second layer is the one you hear about, this contains the things that are banned on the surface web, such as child pornography, drug trafficking, censored speech, etc.
The first and second layers are easily accessible by any Tor user. The deep web is also used to store secret files and the like. These secret files are stored below the second layer. Things like scientific research, alternative networks such as SIPRnet and NSAnet, and private networks like LANs are found here.
AGAIN, the Tor network is not only made up of drug traffickers and child pornography, although it is available there, it is mostly just databases and things that people don't want leaking out on the surface web. It is simply all the sites that are not catalogued by a normal search engine. You are not in on some top secret classified club.
Basically all the information about the levels of the deep web are found here. I would recommend doing a bit of research if you want to go into the deep web; /r/onions and https://www.torproject.org/projects/torbrowser.html.en are great places to start. Even though it is mostly files, be careful. Don't click any link you don't know.
Tor is designed to fight censorship... Unless France bans encryption altogether, France cannot block Tor.
Tor can use bridges that makes its traffic look like Google, Amazon or just about any other type of RUN-OF-THE-MILL encrypted traffic.
Just one more case of politicians failing to understand how the internet works.
Well, you should donate to the TOR project becauase withtout it you would be getting ripped off by your local dealers who are being ripped off by thier suppliers etc and so on.
>It's blocked over here
First, the article states that the US government largely funds TOR, not the Dark Net.
>Tor encrypts Internet traffic so that users and websites can maintain anonymity and beat censorship. The free software is used by millions of people around the world, and it's funded in large part by the U.S. government. source
It's important to realize that the two are NOT the same thing.
For a basic outline, you might want to start here...
Like a lot of things, you'll find that TOR found its origins in DARPA funding and potential for military applications, but then again so did pretty much everything we know today as the internet.
From TORproject's own page:
>A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The article wasn't suggesting anything particularly sinister or accusatory, it just didn't make its point very clear.
> You could run a full node over Tor, but even with one megabyte blocks that would be over 100 megabytes of encrypted Tor traffic every day. The risk of jack-booted thugs breaking down your door and demanding to know what you are doing far outweigh the benefits of running a fully validating node.
Tor has developed a huge number of very successful steganographic techniques to hide Tor traffic in other innocuous traffic. obfsproxy is quite successful and used in production all the time; hiding a few hundred MB of data from censors is quite easy and tens of thousands of Tor users in countries like China use it every day.
edit: And lets just be clear here: Gavin expects it to become impossible to fully participate in the Bitcoin system anonymously. With FinCEN forcing Ripple to make changes to their core protocol to implement AML, this isn't something we should take lightly.
That frontpage banner is trying to convey the essential idea behind Tor as quickly as possible. Before you can actually download and use Tor, you have to browse past an orange warning box that links you to this cautionary list
You are not being accurate when you say:
> No asterisks, no disclaimers, just boom, instant securification.
>The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory
>Onion routing was further developed by DARPA in 1997.
Both agencies are listed on Tor's "sponsors" page... https://www.torproject.org/about/sponsors.html.en
I'm pretty sure with DARPA involved the feds have a pretty good idea of how to mitigate Tor if/when they want to.
Calling it the "deep web" isn't really accurate. What they really mean is the dark web, which usually means TOR. You can download the browser and access web domains that are usually a mixture of letters and numbers ending with .onion. So you can check out /r/onions to find some websites to visit. There's no search engine on TOR, you need to know the exact URL to get to some places. This is actually kind of interesting because that means there could be some really fucked up stuff out there, but you'll never ever know about it unless somebody gives you the exact URL.
Just 1 data point from a tor exit node that did online advertising click fraud - No-one's door. A letter's sent mentioning suspicious activity and a security concern. Reply with the response from the Tor Legal and Abuse FAQs.
> Has anyone ever been sued for running Tor?
> Further, we believe that running a Tor node, including a Tor exit node that allows people to anonymously send and receive traffic, is lawful under U.S. law.
>If I receive a request from law enforcement or anyone else for my Tor relay's logs, what should I do?
>Educate them about Tor. In most instances, properly configured Tor relays will have no useful data for inquiring parties, and you should feel free to educate them on this point. To the extent you do maintain logs, however, you should not disclose them to any third party without first consulting a lawyer. In the U.S., such a disclosure may violate the Electronic Communications Privacy Act, and relay operators outside of the U.S. may be subject to similar data protection laws.... EFF is currently working on informational materials to help you respond to the most likely types of legal requests or notices, so watch this space.
And specific responses the EFF provided can be found here:
Please don't run torrents over Tor, the network wasn't designed for that sort of load. Besides, UDP packets don't run over Tor anyway.
Get a paid torrent-friendly VPN that doesn't log.
Sorgligt att det ens är uppe för diskussion i Sverige.
Trodde att man i Sverige har lite mer kunskap om hur internet fungerar, Att blockera IP adresser är ju fullständigt meningslöst med alla VPN/Proxy tjänster. Men det kanske blir ett uppsving för Tor i Sverige.
The simplified explanation is that you can think of Tor like using three VPNs in a row. The goal is to hide your IP address, giving you complete anonymity online. Tor routes Internet traffic through three relays: an entry node, a middle node, and an exit. Each relay has it's own layer of encryption and the exit node is the one that contacts the web server, fetches the webpage, and gives it back to you yet doesn't know your actual IP address.
This page explains things pretty well: https://www.torproject.org/about/overview.html.en If you still don't understand I can try to further clarify terms for you.
What can we do to help? Donate to the Tor project monthly.
The fbi in conjunction with universities is trying to ddos and hack the network. Every one dollar spent on Tor takes ten dollars in computing power by the fbi and state sanctuned hackers. With this approach the fbi can't handle the computatiinal power to hack tor.
Tor is not (presently) financed by the US military. It has previously been funded by DARPA and the US Naval Research Lab. It has also received funding in part by foreign governments and institutions. The core Tor development team also includes individuals who are not US citizens or residing in the US.
"Deep web" is the wrong term for Onion sites.
To get started viewing ONION sites, download Vidalia:
Then start browsing this subreddit:
If you want to see "the deep web" just start looking at ancient static webpages from 1998 that Google has long stopped indexing.
If you want more onion sites, download freenet and search it for "onion" and "tor" and you'll find lots of stuff.
Pick a market(Evolution is popular):
Copy url into TOR
Congratulations, you now have acces to a darknet market.
You'll probably need to make an accout and some sites are referral only. If you want to buy something you also need Bitcoins:
Andrea Shepard aka puellavulnerata is one of the core Tor developers, writes for Status 451, and is loudly and publicly opposed to social justice infecting technical areas.
You run code she wrote.
>Who Uses Tor?
>People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
>Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.
>Activists & Whistleblowers
>Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.
>Journalists and the Media
>Journalists and the media use Tor to protect their research and sources online.
>Military and Law Enforcement
>Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.
Their .onion address ( jntlesnev5o7zysa.onion ) is still accessible via Tor or a Tor gateway like tor2web.
Offical Twitter announcement of the .onion address.
If you think the admins will tattle on you then you should use Tor to create a new account.
I would say it's an overkill for a subreddit leaks though but you never know.
Tor in no way advocates child pornography.
It was created by the US Navy and still gets a lot of funding from them. Tons of journalists use it. It's used in China to bypass the great firewall.
I personally use Tor extremely often because I like to keep my different online identities separate.
Saying Tor advocates child pornography is like saying Tesla advocates running people over.
I didn't get that sense from it. I thought it did a great job of pointing out why we want privacy and even finished up with Snowden's point that it works, and that we need to move forward with it and make it ubiquitous. The section on Silk Road and criminal uses of anonymity was only about 10 minutes of the 59 minute show, broken up by a talk on bitcoin. The notion put forth by one that anonymity creates crime was rebutted by Applebaum who pointed out that criminal behavior pervades all aspects of and technologies used by human society, not just the Internet.
If anything, I think the show is probably going to inspire more people to check out Tor than it's going to cause people to stop using it. (https://www.torproject.org/ by the way).
Please don't make shit up. Onion domains do not resemble DNS in any meaningful way. They aren't centralized and they don't map a meaningful name to an IP.
The server creates a public/private key pair. The .onion address is derived from this public key. This information is then advertised on the network. A client can then create a temporary key and pick a rendezvous node through which to pass data, encrypt these settings with the server's public key, and send them through one of several nodes to the server, which can then decrypt the settings with its private key. Then the server and client can talk through the chosen rendezvous point, which cannot eavesdrop because the communications are encrypted with the temporary key. Here is an excellent explanation of this process.
While they can't replace the routing infrastructure, .onion domains do a decent job of taking DNS's place. Their main disadvantage is that they aren't meaningful or memorable addresses.
Most people who have gotten caught doing bad stuff on Tor were caught because of things they did outside of Tor. I imagine if Tor was insecure we would hear about a lot more activists being imprisoned or killed for dissent.
For example, One guy used IRC with Tor. The one time he logged into IRC with the same username from his home network, it allowed his identity to be compromised.
Tor Project has a pretty good list to help: https://www.torproject.org/download/download.html.en#Warning
Well for one, it embeds css to cloudflare.com,
Line 8 on any 404 not found error page. (for example http://absolem6indyslug.onion/ejripksd)
So any user who stumbles across a page that is not found, gets compromised.
There are a few other issues i'm looking into, but the error page that loads a clear-net address is something that is very dangerous. We won't see a service like Agora doing such a thing.
Still looking into some stuff.
Because those volunteers believe in both charity and free speech. It's crazy, but there are some good people in this world.
Tor routes traffic through a chain of several boxes, not just one. It also uses Asymmetric encryption to prevent any one box from knowing too much. The first box in the chain doesn't know what the data is or what its final destination is. The last box in the chain has no idea where the traffic is coming from.
More info on the Tor project website. I don't work for them; I am just a privacy advocate who gets upset when the Tor project receives incorrect slander.
First of all, I suggest using the Tor Browser Bundle and not configuring software yourself. The TBB has been set up and tweasked by the Tor developers and should be free from leaks. By default the TBB also has location tracking disabled.
Location tracking works by the browser using wifi and other signals to find your location (at least in Firefox. Here is a link to Mozilla's FAQ on geolocation). This entirely defeats the purpose of Tor, whch is to hide your identity and location. Do not enable tracking if you want to stay anonymous.
I recommend the following light reading: Want Tor to really work? The ellipses ( . . . ) indicate the reasons for the behaviors, which can be read in full at https://www.torproject.org/download/download-easy.html.en#warning
>You need to change some of your habits, as some things won't work exactly as you are used to.
> a. Use the Tor Browser . . .
> b. Don't enable or install browser plugins . . .
> c. Use HTTPS versions of websites . . .
> d. Don't open documents downloaded through Tor while online . . .
> e. Use bridges and/or find company . . .
> Be smart and learn more. Understand what Tor does and does not offer . . .
Guess what Tor is so good for... Such projects proved their worth for the democracy movements in countries like Egypt, Lybia, Jemen... and now the US authorities are probably afraid of it.
SURPRISE. A very future-oriented action by the US agencies.
Uh, isn't the whole point of owning a majority of exit nodes the fact that exit nodes transmit unencrypted traffic to the end user like in the diagram on their about page?
Counterparty is like colored coins on steroids. You can
All this in a trustless P2P environment running on open source software.
Counterwallet is a Bitcoin wallet that enables Bitcoin storage, and tracking of user-defined Counterparty assets side by side. It's like what you would get if you put an open source client-side stock market on Blockchain.info, and users could trade with each other directly there, and it couldn't be shut down. Goes well with Tor browser.
> 1. Inform your potential ISP(s)
2. Get a separate IP for the node. Do not route your own traffic via this IP
3. Get recognizable Reverse DNS for this IP
4. Set up a Tor Exit Notice
5. Get ARIN registration (if possible)
6. Consider a Reduced Exit Policy
7. Rate limit and optionally QoS your node
8. Consider creating an LLC to run your node
I imagine within the day of the UK's Chinese style great internet wall, There will be ways around instructions to use proxy website posted all over FB, Or to really help people there can be how to download tor, (that's where silk road used to be) you can get all the porn you can imagine and more, but now that you have learned Tor when silk road went down literally hundreds of market places popped up in its place. Well kid look at this you came for the porn and you stay for the drugs. Well done MP's. Big round of applause.
Googling it is fine. Using it is fine. Using it for illegal things is not fine. There are plenty of legit reasons for using it though.
It's pretty easy, just download the TOR browser and you're set.
The problem can be caused by a number of factors.
 cookies and cache used to store "milf preference". This can be solved by clearing you browser, using another browser, using private mode.
[1B] flash used to store "milf preference". Most people over look this option. Flash has it's own version of cookies. A "not-so-sexy" combination of being closed source, and having the ability to store persistent information is why I believe Flash is the most dangerous thing since ActiveX. Go into your flash settings, clear out your milf files.
 user account used on site to store "milf preferences". This can be solved by creating a new tubegalore profile. Consider not being signed in as using a guest account... creating an account may solve issue.
 site uses ip addresses to track "milf preference" at your location. This is rarely the sole way a site tracks preferences, as it would not serve your mom well if she was using the same IP address, but had a "midget preference". However a lot of sites, like YouTube, use a combination of all three. The solution to your "milf preference" issue if ip-based would be to change your ip, sign in thru a vpn, proxy or thru a tor browser. All of which, it should be noted, in fact change the ip address accessing tubegalore.
As a side note, I find the best experience on the Internet is thru the tor browser. While it has the down fall of maybe showing you Milfs that are not in fact in your area, it has the strength of allowing you close your browser, open it back up and being un-hindered by previous milf-related searches.
For further reading on how web sites track you, your mom, miley cyrus' preferences, here is a good link
It's all about snooping, or rather protecting yourself from other people snooping on you. The Electronic Frontier Foundation put together an interactive diagram that shows you who can see what with and without HTTPS and Tor. You can find it here.
This can be a very important tool if you need to keep people from snooping, even if you're not a criminal. A few examples of this are law enforcement officers, journalists, government workers, whistleblowers and etc that want to protect their informants, sources and sensitive data from falling into the wrong hands. A more detailed article on who uses Tor and why can be found here.
Part of the government funds part of Tor, it isn't like they are the one developing it.
The subpoena is from the inspector general of cook county illinois, the government is a big place.
regardless they seem to know how it works since they're saying he could have masked another IP address
This is really disgusting ! The torrents are not only used to share crappy movies but also to share large linux distros. Did any of the Airtel broadband customers approach them with this complaint? If nothing solves the problem then for everything else we have TOR :)
If you must know, here's a basic self-written summary: SR stands of "[The] Silk Road." It's an deep web onion site (only accessible via use of the Tor bundle because it's an .onion address). The site is used for only one thing: Illicit trading. Drug paraphernalia, weapons (edit: maybe not weapons), illicit drugs / chemicals, edibles, etc. are its specialty. The site uses a currency called Bitcoins (official site, Wikipedia). I won't link directly to the site, but it's relatively easy to find the new link through a few google searched of SR / Deep web-related items. The products ordered on the site re usually shipped to one's house via USPS.
As for my personal opinion / thoughts on the site, I'd say that one should only use it if they are truly desperate. Let's face it: Mailing illegal drugs across the US in the mail is pretty risky, and not something I would feel safe doing. I hope this helps.
The easiest way to make sure you're set up correctly is to download The TOR Browser Bundle This gives you a seperate Firefox install. You open up TOR and set it off and it will open up Firefox. Whilst you are using that copy of Firefox, download this from EFF. It forces Firefox to connect to HTTPS links.
As for HTTPS, it stands for Hypertext Transfer Protocol Secure. Essentially it gives you an extra layer of protection. You'll notice when you buy things online or log-in to your internet banking that you have a little lock on your browser. That's HTTPS.
>How can I share files anonymously through Tor?
>File sharing (peer-to-peer/P2P) is widely unwanted in the Tor network, and exit nodes are configured to block file sharing traffic by default. Tor is not really designed for it, and file sharing through Tor slows down everyone's browsing. Also, Bittorrent over Tor is not anonymous!
Like usual, I'll renew my offer to PM me for technical advice. If you want to blog anonymously, I can help you set that up and will refuse to get any personal information from you.
Please consider using Tor if you don't have a VPN. It comes pre-packaged with a version of firefox that offers better privacy guarantees. If you use a VPN on a shared computer, be sure to always use a privacy mode to not leave any traces locally. It is a pain as it forces you to type passwords and forget bookmarks but it is the price of security.
About "coming out" as an atheist, the FAQ on /r/atheism has a bit more detailed advice it sums it up as "The best place to come out to your parents is at a home you own, over a dinner that you paid for yourself"
> anyone familiar with doxing will know how it works
My advice to prevent doxing is to imagine a fake identity and to "inadvertently" leak fake information about it. Pretend you are still a student, or pretend you have kids, pretend you are from another country (that you know), etc... Do not post pictures you have taken yourself. Not at all. Unless you are familiar with the meta-data embedded (which can contain GPS information!)
TOR, the gate way to the dark web is partially funded and created by.... The United States Navy funded also by other government entities within the US.
> how do people find out how to get there.
I'd also head over to /r/deepweb if you have questions. Just a notice: The people over there are...curt. Helpful, but curt.
Running a non-exit relay is risk-free, so long as you keep your software updated. It's just a good way to help the Tor network out for people who don't have the guts to run an exit node. If you have some bandwidth to spare and a machine that is on 24/7, I can highly recommend running a relay.
Exit nodes are not owned by the Tor project, any more than non-exit nodes are. They are set up and owned by regular people who want to help the Tor network out.
Whether running a Tor exit node is "dangerous" depends on where your node is located. I imagine running an exit from Iran or China may be quite dangerous. From Western countries, it's not really dangerous but you have to be prepared to deal with complaints from your bandwidth provider. Here are some useful resources:
Surprised nobody's suggested that yet. It's far more obfuscating than a proxy (if you're using a proxy). And I sincerely hope Google keeps their DNS up somewhere that SOPA doesn't extend to.
Tor itself is safe to use, you can download it here: https://www.torproject.org/download/download-easy.html.en
As for any lists, impossible to say for sure, you are probably already on the list for thinking you are on a list.
That's because the reCAPTCHA service knows your computer (+ browser?) from previous visits and trusts you are a human. Try accessing these same websites by using the Tor browser for instance and you'll be challenged with some task (tagging the images in which you can see numbers, spotting the store fronts among a set of pictures, selecting all of the pictures containing a river or a lake, etc.).
Avec du DPI^^les ^^boîtes ^^noires
Mais la fondation Tor a sorti obfsproxy qui rajoute une couche à l'oignon.
En gros c'est difficile et sera un jeux du chat et de la souris.
Le but étant de décourager un maximum l'utilisation.
Mais jamais il ne vont le faire, Le Monde le précise, ce sont juste des propositions qui remontent de simples policiers sur le terrain et certaines sont impossible techniquement.
Par contre cela montre bien le degré de contrôle qu'ils veulent atteindre.
Unless one of your housemates installs a router or server with packet-sniffing capabilities they can no more see your traffic than you see theirs. Wireless incurs slightly more risk but if it is a ~~WEP~~ WPA2 secured connection it's still significantly more difficult to get cleartext traffic from.
That being said, if you don't want them to have any chance of them discovering your lithuanian yak herder role play fetish, you can either set up a separate internet connection or get a VPN and connect to that.
A cable provider may or may not charge you for an entirely separate internet connection, depending on if it's on the same billing account and policies of that company. You'll have to call them to find out.
A Virtual Private Network is an encrypted tunnel between your computer or LAN and another computer or LAN. In this case it would package all of your traffic so no one in the middle could discern what it was. For short periods or politically-sensitive topics TOR works well, though it's very slow. You can buy VPN access or go through a free portal online - though there's no guarantee they aren't sniffing your traffic, of course.
It sounds like you're not qualified to judge software. And no, you didn't get a virus downloading tor from https://www.torproject.org/. Maybe you did or thought you did when going to some random .onion sites because you didn't read about nor understand what you were playing with.
The TOR browser is required to access the deepweb
All kind of illicit substance can be bought on the deepweb on a website called Silkroad http://en.wikipedia.org/wiki/Silk_Road_%28marketplace%29
Also check out my post here for more info:
List of things you can find on the deepweb:
- Tor Chan
- child pornography
All deepweb links end with .onion instead of the traditional .com .uk .de .es .nl and all other variations.
Here's an idea folks, use the Tor browser to visit Coontown. Link
This way your IP address will always be hidden, it's easy to set up as it runs on Firefox Portable. (Just unzip and double click to run, no installation in the classic sense.)
No more bans from the SJW's and niggers on Reddit.
>On those two days my router shows my bandwith was equivelant to what I normally upload in a month on each day (8gb a day a total of 16gb).
Lol... Lawyer up asap.
I'm not sure how close tribler's routing system is to Tor's but it might be worth reaching out to the EFF as well.
>While EFF cannot promise legal representation for all Tor relay operators, it will assist relay operators in assessing the situation and will try to locate qualified legal counsel when necessary. Inquiries to EFF for the purpose of securing legal representation or referrals should be directed to our intake coordinator by sending an email to [email protected] . Such inquiries will be kept confidential subject to the limits of the attorney/client privilege. Note that although EFF cannot practice law outside of the United States, it will still try to assist non-U.S. relay operators in finding local representation.
Use Tor. It's not hard to set up at all. The easiest way is using the Tor Browser Bundle. https://www.torproject.org/projects/torbrowser.html.en
More info on Tor: https://www.torproject.org/about/overview.html.en#stayinganonymous
That said, anyone running an exit node need to be aware that the cops are not going to just go "Oh, ok, my bad", they're going to abuse their authority as they usually do. In the end, you might get out of it more or less unscathed, but not without a massive hassle, I would wager.
To date nobody has been prosecuted in the US, but with the way the cops are running rampant over people's rights, they will.
That said, I'm not discouraging people from running nodes, there is a principle at stake too. Just know it's not 100% guaranteed safe.
The Tor Project give some suggestions: https://www.torproject.org/eff/tor-legal-faq.html.en
They also have some general advice for running an exit node in the US: https://blog.torproject.org/running-exit-node
Keep us updated on your situation.
Ok. So this is classified as cyberbullying and can be a serious crime. So when making your account and while in the process of raiding make sure you use some protection, such as tor or a proxy. Better safe than sorry.
You made that whole thing up. It must suck to look in the mirror and realize that people like yourself are the problem.
You do realize that any time a politician tries to start an initiative to ban Tor, they're quickly shut up because Tor is one of the most powerful tools in use by the government right?
TOR is an anonymity layer, it tries to hide your online activity from surveillance states (NSA), the easiest and often the best way to take advantage of it is with TOR Browser.
choose a market
receive dog-nose-proof vacuum-sealed packages
No, they can't. That's the entire point of onion routing. (TOR = The Onion Router)
What ncef didn't mention is that the data isn't just being bounced around between people, it's also being encrypted in such a way that the people in the middle don't know the source, destination, or content of the message. For example, person 2 sends it to person 3, person 3 sends it to person 4. But person 4 doesn't know who person 3 got it from, and person 2 doesn't know who person 3 is going to send it to. This means that no one in the chain has a complete understanding of the full path, making the original sender anonymous.
A better explanation is here: https://www.torproject.org/about/overview.html.en#thesolution
The darknet has two sides, and people seem to mainly talk about one. The illegal markets (/r/DarkNetMarkets) have made headlines, and child porn is a real problem there; these both make the news a lot so everyone is very aware of this side. I believe both of these are very real problems that need addressing, and I'm sure there's more of this side that I just don't know about. But I want to talk about what less people seem to talk about - how people like journalists use Tor, or how people in oppressed countries like China can access information their government would rather block, or how people like Chelsea Manning use it to protect themselves, or how military personal have used it to protect themselves on the battlefield, hell it can be how you can talk to someone without the NSA knowing you sent it...I think these are hugely important things. Much like how when you give people people pseudonymity on the the regular internet by letting people hide behind usernames some will do bad things, it's just a reflection of the people using it. The internet isn't bad because people do bad things on it, and neither is the darknet. It's a tool, used for both bad and good. The difference here is if used correctly, it can offer arguably absolute anonymity. You can access the darknet using Tor, a special web browser configured to hide your IP address. Here's a page on their website about who uses it and why. This is also a really interesting talk on how darknet users have been caught out if that sounds interesting to you.
Your ISP sees all, if they choose to look. Tor hides what you are doing through Tor. If you want to hide your Tor usage you need to tunnel it through something else such as a VPN. But here's the question: why do you care if your ISP sees that you are using Tor?
^^P.S. ^^It's ^^Tor, ^^not ^^TOR.
Edit: Based on the few posts/comments in your brief reddit history, it is clear that the number one thing you need to do to learn how to use Tor safely is the read the documentation. No really, read it. This should take you a few hours at minimum (and that's not including Googling the parts you don't understand). If it didn't, then you need to go back and do it more thoroughly.
'tor' isn't a 'site' though... it's an alternative networking infrastructure. Only takes one node to get into it. Blocking https://www.torproject.org/ isn't going to stop anyone from accessing the .onion network. The only way to 'block' the tor network, is to physically bring down node machines, which exist in people's basements, on the cloud, what have you.
You should ask your question again on the Tor relays list, but in short:
A raspberrypi is not powerful enough to run a fast relay. The USB NIC and CPU will limit you to a couple mbps of throughput no matter what.
Residential connections are best for running bridge relays which require less bandwidth, and carry no potential or actual repercussions for the operator.
Legal issues are very rare, and only affect exit relays. You shouldn't run an exit relay from a home connection anyway, so this won't affect you.
And let me just add that Tor is a legitimate, wonderful non-profit charity project that's used by all kinds of people all over the world for important uses, and is developed and promoted by some of the most respected and skilled programmers, cryptographers, security specialists and freedom advocates in the world, and has received funding from such "seedy" organizations as reddit; the National Science Foundation; the US Department of State Bureau of Democracy, Human Rights, and Labor; the Ford Foundation; Google; the National Christian Foundation; Human Rights Watch; and the Electronic Frontier Foundation.
It isn't some gimmicky creepypasta thing, it's a real tool for freedom that can (and has) effect some wonderful change in the world.
One of the biggest uses that comes to mind is people abroad living in countries where freedom of speech is heavily limited and/or the internet is censored. Examples include China and Iran. There are people whose anonymity is literally the difference between life and death.
For other uses the tor project has a fairly long list of legitimate use cases on their website. Overall however privacy is a fundemental right that is necessary because people are inheriently judgemental. Let's say you've had a history of depression, some people will treat you differently. Because of that it is probably not something that you would necessarily want to share with everyone you meet.
Il n'existe pas de "bon VPN". Ils sont tous mauvais par définition et il n'y en a que des "moins mauvais que les autres", le moins mauvais de tous étant ton propre serveur VPN avec OpenVPN.
Aussi, il est stipulé dans cette loi que tous ceux qui utilisent ce type de méthode (VPN/Tor/applications de chiffrement "suspectes") seront automatiquement surveillés :)
The Tor Project site is probably the best place to start.
Basically, you have Relays and Exits. Relays move traffic around within Tor, Exits allow it out onto the rest of the internet. Guards are trusted relays which act as a "first hop" into Tor. Bridges are a bit like Guards in that they also act as a first hop, but Bridges are not publicly listed so if an adversary is blocking known Tor nodes, it's possible that you can still use a Bridge to access Tor.
There is a shortage of Tor nodes generally, but a real shortage of Bridges in particular.
HTTPS connection will stop them from being able to see into or modify your traffic. They'll still know what web sites you visit, when, and how much data you send. HTTPS Everywhere helps you make secure connections more often, but not every site offers it. Whether it protects all the data sent between you and the server or just login/password/credit card information again depends on how the server is configured. And it doesn't protect any non-web internet traffic.
If you want to hide what sites you're visiting too, use Tor.
Not just the hashes, check the digital signature.
Edit: I downloaded the fake .exe which claims to be 3.6.6. The real tor site doesn't even have that one available to download anymore. Also all links on the fake site go to the real site. And the fake site's download option doesn't give you options like osx/linux/source
'strings -a' on it
Obfuscated with Dotfuscator Professional Evaluation. Illegal to use on software for general release.
You're misunderstanding. Connections to .onion services never go out of the tor network. Unless you're connecting to a compromised service (which I doubt seeing as we're talking about private connections here) everything is encrypted and even if you connect through a compromised node, the traffic they sniff will be jibberish.
If I was in your situation, I would use Tor to dig around in the shadier parts of the internet and research who has a track record of performing this type of procedure discreetly and safely. The cost of having a professional do it in a sterile and controlled manner will be far less than the medical bills and value of the time you'd lose if you attempted to DIY and screwed up.
Doing it yourself exposes you to everything from an unsexy, mangled scar to nasty infections to dangerous blood loss. If you feel that you absolutely must DIY, please at least arrange for it to happen at a time when someone with up-to-date medical training will be the first to get to you after the injury. The one caveat there is that if part of a digit is detached by an extremely clean cut and the disconnected part can be found, modern hospitals can sometimes reattach it.
Anyways, I can't help but wonder if you've considered moonlighting in a profession that frequently loses digits, such as factory or sawmill operator, in case you want both the opportunity for things to go wrong and a socially acceptable excuse if people inquire what happened....
Edit: I just checked your post history, because I'm nosey that way, and noticed that you mentioned being 16. Unless you're located in a country where that makes you a legal adult, you should seriously wait until you're of age to do a mod this permanent. If you succeed, you'll have many decades to live without the digit, so in the scheme of things a couple years makes no difference.
It is perfectly legal to access the darknet. It's used to this day by many journalists and government agencies for ensuring anonymity.
In fact, believe it or not, the government WANTS you to use the darknet. The more traffic, the easier it is for government agencies to mask their own operations.
Getting on is surprisingly pretty damned easy.
Step 1: Download Tor. It looks like a simple web browser. But it's way more complicated than that. It beams your IP through thousands of host computers, which makes it virtually impossible to track your location:
Step 2: All of THESE websites can only be accessed by using Tor. Your anonymity is nearly guaranteed while on these sites. There's obviously still some inherent risk to buying anything online no matter what.
But browsing is mostly safe. The only damage a connection could do is to your innocence.
EDIT: Apparently there is a legit difference between the dark net and deep web. Huh. darknet is probably the correct term for what this thread is referencing