chevron_left chevron_right
Login Register invert_colors photo_library


Upgrade your account to hide advertisements.

Thread Rating:
  • 0 Vote(s) - 0 Average


filter_list Anyone know any bulletproof vpns
Author
Message
RE: Anyone know any bulletproof vpns #11
(08-10-2017, 12:22 AM)Sav3ge Wrote:
(08-09-2017, 11:33 PM)Sikom Wrote:
(08-09-2017, 08:12 PM)Sav3ge Wrote: So I've been using tor to help me be somewhat untraceable, but know as I'm seeing people using Tor being tracked down more and more I'm deciding to invest in a bulletproof vpn.
I don't want one that's really expensive I just need one that will keep me safe. Thanks for any help. Smile

Could you please give examples of people using Tor being tracked down? If you are referring to the recent market takedowns that is not a fault of tor, but rather a fault of their own. Which a bulletproof vpn would not make better.

Yes I am referring to the market take-downs. I just want a bulletproof vpn for my own personal use.

Reason for market takedown:
- Alphabay: During investigations, authorities found Pimp_Alex_91@hotmail.com in the header of emails sent to users of AlphaBay who had forgotten their passwords. They were able to eventually trace that address to their man, Alexandre Cazes.
- Hansa: Can't remember hanza it was a fault of his own. Can find it later
(This post was last modified: 08-11-2017, 11:35 PM by Sikom.)

Reply

RE: Anyone know any bulletproof vpns #12
(08-10-2017, 12:22 AM)Sav3ge Wrote:
(08-09-2017, 11:33 PM)Sikom Wrote:
(08-09-2017, 08:12 PM)Sav3ge Wrote: So I've been using tor to help me be somewhat untraceable, but know as I'm seeing people using Tor being tracked down more and more I'm deciding to invest in a bulletproof vpn.
I don't want one that's really expensive I just need one that will keep me safe. Thanks for any help. Smile

Could you please give examples of people using Tor being tracked down? If you are referring to the recent market takedowns that is not a fault of tor, but rather a fault of their own. Which a bulletproof vpn would not make better.

Yes I am referring to the market take-downs. I just want a bulletproof vpn for my own personal use.

The recent market takedowns happened because the administrators messed up their OPSEC, it had nothing to do with Tor at all (as far as I'm aware, at least).

It is possible to reveal the identity of a Tor user if you are in control of the exit nodes, though, but that takes a lot of time and resources, so unless you're the owner of the largest darknet market, no one will even bother putting that much effort into hunting you down.
(This post was last modified: 08-11-2017, 10:12 PM by Nightmare.)

Reply

RE: Anyone know any bulletproof vpns #13
(08-11-2017, 10:11 PM)Nightmare Wrote:
(08-10-2017, 12:22 AM)Sav3ge Wrote:
(08-09-2017, 11:33 PM)Sikom Wrote: Could you please give examples of people using Tor being tracked down? If you are referring to the recent market takedowns that is not a fault of tor, but rather a fault of their own. Which a bulletproof vpn would not make better.

Yes I am referring to the market take-downs. I just want a bulletproof vpn for my own personal use.

The recent market takedowns happened because the administrators messed up their OPSEC, it had nothing to do with Tor at all (as far as I'm aware, at least).

It is possible to reveal the identity of a Tor user if you are in control of the exit nodes, though, but that takes a lot of time and resources, so unless you're the owner of the largest darknet market, no one will even bother putting that much effort into hunting you down.
I have also heard that it was the OPSEC and nothing to do with tor. As mentioned previously

The exit node wouldn't allow you to reveal the identity of the user would it?

Reply

RE: Anyone know any bulletproof vpns #14
(08-11-2017, 10:42 PM)Sikom Wrote:
(08-11-2017, 10:11 PM)Nightmare Wrote:
(08-10-2017, 12:22 AM)Sav3ge Wrote: Yes I am referring to the market take-downs. I just want a bulletproof vpn for my own personal use.

The recent market takedowns happened because the administrators messed up their OPSEC, it had nothing to do with Tor at all (as far as I'm aware, at least).

It is possible to reveal the identity of a Tor user if you are in control of the exit nodes, though, but that takes a lot of time and resources, so unless you're the owner of the largest darknet market, no one will even bother putting that much effort into hunting you down.
I have also heard that it was the OPSEC and nothing to do with tor. As mentioned previously

The exit node wouldn't allow you to reveal the identity of the user would it?

I think so, yes. Or well, not your actual real life identity, but I believe you can find out the real IP address of the user.
I suggest you read this article if you would like to learn more about how it's done.

Reply

RE: Anyone know any bulletproof vpns #15
(08-11-2017, 10:56 PM)Nightmare Wrote:
(08-11-2017, 10:42 PM)Sikom Wrote:
(08-11-2017, 10:11 PM)Nightmare Wrote: The recent market takedowns happened because the administrators messed up their OPSEC, it had nothing to do with Tor at all (as far as I'm aware, at least).

It is possible to reveal the identity of a Tor user if you are in control of the exit nodes, though, but that takes a lot of time and resources, so unless you're the owner of the largest darknet market, no one will even bother putting that much effort into hunting you down.
I have also heard that it was the OPSEC and nothing to do with tor. As mentioned previously

The exit node wouldn't allow you to reveal the identity of the user would it?

I think so, yes. Or well, not your actual real life identity, but I believe you can find out the real IP address of the user.
I suggest you read this article if you would like to learn more about how it's done.

Just read the article. And this is one of the things it said.
When traffic emerges from an exit node, its origin is well concealed but the data itself is outside the protective umbrella of Tor’s encryption

Which means, that you can't identify the user unless you have access to all the 3 nodes that the user is connecting through. But the exit node can read all the information the website received. Which means that if a user sends something that is not encrypted to the website, that data would be leaked. So I think the thing to keep in mind, is if you are actually going to stay on tor and use it. Make sure you don't have any information that is connected to your real identity.

Reply

RE: Anyone know any bulletproof vpns #16
(08-11-2017, 11:04 PM)Sikom Wrote:
(08-11-2017, 10:56 PM)Nightmare Wrote:
(08-11-2017, 10:42 PM)Sikom Wrote: I have also heard that it was the OPSEC and nothing to do with tor. As mentioned previously

The exit node wouldn't allow you to reveal the identity of the user would it?

I think so, yes. Or well, not your actual real life identity, but I believe you can find out the real IP address of the user.
I suggest you read this article if you would like to learn more about how it's done.

Just read the article. And this is one of the things it said.
When traffic emerges from an exit node, its origin is well concealed but the data itself is outside the protective umbrella of Tor’s encryption

Which means, that you can't identify the user unless you have access to all the 3 nodes that the user is connecting through. But the exit node can read all the information the website received. Which means that if a user sends something that is not encrypted to the website, that data would be leaked. So I think the thing to keep in mind, is if you are actually going to stay on tor and use it. Make sure you don't have any information that is connected to your real identity.

You're probably right about that. To be honest I haven't really dug that deep into it, I've just heard people talk about it here and there.
But as you mentioned earlier, the reason Alexandre Cazes was caught was because of an OPSEC slipup, so I guess that is the main thing you have to be cautious about while using Tor.
(This post was last modified: 08-11-2017, 11:15 PM by Nightmare.)

Reply

RE: Anyone know any bulletproof vpns #17
(08-11-2017, 11:15 PM)Nightmare Wrote:
(08-11-2017, 11:04 PM)Sikom Wrote:
(08-11-2017, 10:56 PM)Nightmare Wrote: I think so, yes. Or well, not your actual real life identity, but I believe you can find out the real IP address of the user.
I suggest you read this article if you would like to learn more about how it's done.

Just read the article. And this is one of the things it said.
When traffic emerges from an exit node, its origin is well concealed but the data itself is outside the protective umbrella of Tor’s encryption

Which means, that you can't identify the user unless you have access to all the 3 nodes that the user is connecting through. But the exit node can read all the information the website received. Which means that if a user sends something that is not encrypted to the website, that data would be leaked. So I think the thing to keep in mind, is if you are actually going to stay on tor and use it. Make sure you don't have any information that is connected to your real identity.

You're probably right about that. To be honest I haven't really dug that deep into it, I've just heard people talk about it here and there.
But as you mentioned earlier, the reason Alexandre Cazes was caught was because of an OPSEC slipup, so I guess that is the main thing you have to be cautious about while using Tor.

Found this, it might be an interesting read. https://steemit.com/darkweb/@nutela/hans...h-analysis

Summary of the capture:
the TOR technology was not breached according to the Dutch Police
copies of login passwords were made and tried with their respective usernames on other darknet markets
buyers addresses were copied if they had lazily checked the “encrypt” checkbox and not used PGP
PGP keys were switched and funds were thus redirected from the sellers to the public prosecutor
This ranks as one of the most successful coordinated takedowns against cybercrime in recent years

Executive Director Rob Wainwright of Europol.

Reply

RE: Anyone know any bulletproof vpns #18
(08-12-2017, 12:05 AM)Sikom Wrote:
(08-11-2017, 11:15 PM)Nightmare Wrote:
(08-11-2017, 11:04 PM)Sikom Wrote: Just read the article. And this is one of the things it said.
When traffic emerges from an exit node, its origin is well concealed but the data itself is outside the protective umbrella of Tor’s encryption

Which means, that you can't identify the user unless you have access to all the 3 nodes that the user is connecting through. But the exit node can read all the information the website received. Which means that if a user sends something that is not encrypted to the website, that data would be leaked. So I think the thing to keep in mind, is if you are actually going to stay on tor and use it. Make sure you don't have any information that is connected to your real identity.

You're probably right about that. To be honest I haven't really dug that deep into it, I've just heard people talk about it here and there.
But as you mentioned earlier, the reason Alexandre Cazes was caught was because of an OPSEC slipup, so I guess that is the main thing you have to be cautious about while using Tor.

Found this, it might be an interesting read. https://steemit.com/darkweb/@nutela/hans...h-analysis

Summary of the capture:
the TOR technology was not breached according to the Dutch Police
copies of login passwords were made and tried with their respective usernames on other darknet markets
buyers addresses were copied if they had lazily checked the “encrypt” checkbox and not used PGP
PGP keys were switched and funds were thus redirected from the sellers to the public prosecutor
This ranks as one of the most successful coordinated takedowns against cybercrime in recent years

Executive Director Rob Wainwright of Europol.

Thanks, but I knew that already actually. That's not about how they managed to take control over the site itself, though, but how they caught some of the users.
As far as I'm aware they haven't mentioned anything about how they were able to take full control of Hansa Market in the first place.

Reply

RE: Anyone know any bulletproof vpns #19
Tor is actually very safe if used correctly. But privateinternetaccess is a good VPN if you need one. Really the only thing a VPN is useful for (anonymity wise) is preventing your ISP from knowing that you're using Tor.

Reply






Users browsing this thread: 1 Guest(s)