Twelve Years of Service
Posts: 174
Threads: 25
Points: 71NSP
RE: Using TOR and Browsing The Deep Web 10-27-2012, 03:09 AM
#11
Thanks for this! I have not used tor much, but yes I will check this out:p
Twelve Years of Service
Posts: 2,604
Threads: 207
Points: 336.18NSP
RE: Using TOR and Browsing The Deep Web 10-27-2012, 12:20 PM
#12
Tor is so slow i feal like im surfing in a virtual machine inside a virtual machine.
•
Twelve Years of Service
Posts: 1,244
Threads: 7
Points: 48NSP
RE: Using TOR and Browsing The Deep Web 10-27-2012, 09:53 PM
#13
Then get a new circut/properly configure tor to make your browsing faster but less anonymous.
•
Twelve Years of Service
Posts: 15
Threads: 0
Points: 0NSP
RE: Using TOR and Browsing The Deep Web 12-21-2012, 02:35 PM
#14
great tutorial....i will use it thnx
•
Twelve Years of Service
Posts: 1,135
Threads: 78
Points: 12NSP
RE: Using TOR and Browsing The Deep Web 12-22-2012, 01:42 AM
#15
Hmmm, I may check this out. Could you tell me more about the computers I would be communicating with on this network.
•
Twelve Years of Service
Posts: 1,244
Threads: 7
Points: 48NSP
RE: Using TOR and Browsing The Deep Web 12-23-2012, 08:58 AM
#17
Tor does not "encrypt and decrypt between each node". As the name of onion routing implies, the outgoing packets are encrypted in layers. The entry node can only decrypt the first layer, which tells the entry node where to send the remaining layers, and so on.
Let me boil down how tor works.
Let the arrows = data flow
You ---> Entry node(sometimes thru bridge) ---> relay node( you can specify how many of these get used ) ---> Exit node
So, only the entry node gets your IP, and only the exit node gets your data. The only way a client could be traced would be if they use entry and exit nodes controlled by the same person, and the nodes are set up to correlate data flow. The odds of this occurring, assuming the client hasn't done something imbecilic like only using a whitelist of nodes, which is what all those "speed up tor" things do, is ever shrinking.
Now, this is not to say this attack would basically break tor. Even if you were to consistently use the same entry and exit nodes, and they both had been made to track you, so long as you are either using an encrypted protocol(HTTPS, mostly) or using a hidden service, all they can do is prove you were using Tor, and cannot further determine what you were doing.
To clear up other misconceptions:
- Most tor nodes keep logs, and will provide them when asked by law enforcement so as to avoid arrest for obstruction of law. Because of the way tor works, these logs pose no serious threat.
- It is not anonymous. It is private. There is a huge difference.
As for your English-elitist barbs, there are other languages in the world than English, not everyone is obliged to speak your language fluently.
•
Twelve Years of Service
Posts: 8
Threads: 1
Points: 0NSP
RE: Using TOR and Browsing The Deep Web 03-08-2013, 04:46 PM
#18
It is really hard to find not abandon websites on Tor, but when you do, you find the goldmine. I remember, after multiple emails to some people i met on DW, i got access to a "dark forum" on DW. There was all kind of shit, from hacking(not kid stuff) to rape/CP videos, government documents, how to tutorials about everything(even exploiting governments system and getting multiple citizenship, becoming ghost) and lots of shit. Too bad that, it's address is changed, and i cant get in now. Good old times...
•
Eleven Years of Service
Posts: 12
Threads: 0
Points: 0NSP
RE: Using TOR and Browsing The Deep Web 05-16-2013, 03:14 AM
#20
Very nice list of links you have there.
Thank you
•