Tor, Jondo, and filtering proxies.
-
The problem with Tor and the likes is that an individual will find himself on a watchlist simply by using it, whether he knows it or not. A piece of software with a huge user base might dare implement such a feature, as the resulting volume of secured traffic would present a significant hurdle. This would make interception more expensive, which is what at least one security expert advises. What are the risks to a smaller community, and if(when) a weakness is found in the implementation?
-
A bit off topic:
For me the main problem with TOR is that there are never enough exit nodes and that in many countries there is no legal base for a person who provides an exit node. I know a case where a person who provided an exit node from his private computer got prosecuted because someone from somewhere came over that exit node and used it to hack into foreign computers. The IP In the logs of the hacked computers was of course the exit node IP, guess what happened next …
I my opinion the TOR network is only as secure and private as the mass of exit nodes is. Every government or commercial agency interested in intercepting traffic can swamp the network with new exit nodes. While that alone might not be enough to find out who the surfer is, some profiling of the surfed sites and the left comments might be enough to find out who the user is.
But in the end the main weakness is not in the TOR network but in the physical structure of the Internet. It could be a web - theoretically - but in reality it resembles more of a tree structure - there are only so many routes to the next hub. If I look at my routes I can see that the first 4 hops never change and that the 6th is one of three main nodes in our country in 80 to 90% of all cases. Hard to stay anonymous if someone really wants to find out what I am doing (he would be bored :lol: )
In the end:
Do I want to stay anonymous all of the time or do I want to be anonymous in certain places or for specific reasons?
Is there a real reason to be anonymous?
Do I know why I use TOR or do i use it for the wrong reasons?I would never (ab)use the TOR network for the usual bread and butter traffic, especially not for I posting perfectly legal things in a perfectly legal forum like this. The standard TLS connection is enough security for me in this case, there is really no need for a "onionified" connection.
I have seen people using the TOR browser for facebook. While that might be fully justified in certain societies with strong censorship, I can see no reason for people in "normal" countries to do so (one of them even used the real name and real address in facebook).
-
For me the main problem with TOR is that there are never enough exit nodes and that in many countries there is no legal base for a person who provides an exit node. I know a case where a person who provided an exit node from his private computer got prosecuted because someone from somewhere came over that exit node and used it to hack into foreign computers. The IP In the logs of the hacked computers was of course the exit node IP, guess what happened next …
That's pretty much the same for all illegal activities. Providing a relay node is relatively risk free, but providing an exit node… I'm surprised there are any at all, really.
-
I'm surprised there are any at all, really.
IMO, it's a political deliberation … and no it's not aimed for Western countries in the first place.
As for hacking through Tor, no hacker with half a brain would do it. There are better ways for a pro ...
Besides, wonder how many of the nodes are operated by state agencies.
As for secure connections they are overrated as well. They are mandatory in some cases (e.g. banking) but other than that wonder who of you would put his arm into the fire for a server other than one operated by himself
-
Hello all,
If anyone's looking for a free VPN solution, I would recommend CyberGhostVPN. It's fast and reliable, they don't keep logs either.
Not sure if my post is related to this topic or not, forgive me if it doesn't.
-
Tor is not secure, it is anonymous.
A VPN is not anonymous, it is secure.
-Use Tor for anonymity
-Use a VPN for security
-Use Tor+VPN for security and anonymity. -
Hi all,
i think that is better use tor browser and tails, this is a linux distribution. i don't know your comments.
-
Firstly I wanna say that mostly people use proxy servers only for bypassing filters, Bypassing filter’s isn’t the main reason why proxies were invented. A basic advantage of using them is that they make you more anonymous and being anonymous is some time very useful for protection & security.
Second thing is can you explain why https is not preferable in tor browser? I was thinking that it is safe but if not, then why? -
I believe I corrected rusty-nails on this already, https is preferable with and without Tor. This diagram explains the situation well: https://www.eff.org/pages/tor-and-https
-
Oops. Thanks alot.
-
-