What's new
Runion

This is a sample guest message. Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

which insurance do you think might be tor?

espe0n

Light Weight
Депозит
$0
i was looking at some articles, and i ended up watching a video of mental outlaw talking about TOR nodes, and i'm wondering how secure you think tor can be and if you think tor can become insecure (or more insecure) over time?
 
Every tor circuit have 3 nodes

We have no idea how much of them are malicious ( read controlled by some spec service ). We just know that around 70% of all Tor Nodes are hosted in 3 different countries ( Germany, Usa and Netherlands )

And we can assume that there is not insignificant part being malicious.

yes, every circuit have 3 nodes, and their encrypted between themselves.
But if you have 2 malicious in same circuit your entire node is compromised

And what are chance of encountering 2 malicious nodes ? Lets assume is 5% ( altough I am pretty sure is more ). In that case one of every 20 times you connect to Tor your entire cricuit is visible.

all the conversation of using tor with or without vpn i dont think is even worth having. Cause it boils down to the simple question, and that is "who you trust more, your isp or your vpn ?"

Answer is obvious


To cut the long story short
Tor can be usefull tool for anonimity, but in itself can not be trusted.

Like some shady socks5 service, or some ( or any ) antidetect browser... You can not rely on it to protext your anonimity. No way

Yes, if used properly, with decent opsec measures it can help you improve your anonimity
 
espe0n сказал(а):
i was looking at some articles, and i ended up watching a video of mental outlaw talking about TOR nodes, and i'm wondering how secure you think tor can be and if you think tor can become insecure (or more insecure) over time?
Нажмите, чтобы раскрыть...
This one, is an interesting article with some recommendations in the end https://www.malwarebytes.com/blog/n...ed-by-law-enforcement-is-it-still-safe-to-use
You also should always remember that Tor was designed by the U.S. Dept. of the Navy.
 
TOR has a good design and an excellent community behind it but it is not a magic button that will solve all your OpSec issues. I would be more concerned on your place not about TOR-network but about other different ways for you to leave a fingerprint - starting from your own OS. I do not know why nobody talk more about Qubes OS but it can really help you with Whonix to build something that will be very hard to investigate. Do not forget that in a moment when I write these words - people already started to use not only netflow but complex AI-systems the were built to investigate netflow - to fuck him, her, me and you.

Take a look at:
https://arxiv.org/pdf/2304.09510

GitHub - maybenot-io/maybenot: a framework for traffic analysis defenses

a framework for traffic analysis defenses. Contribute to maybenot-io/maybenot development by creating an account on GitHub.
github.com

Also, do not forget that your forum account here is your fingerprint. Your nickname is your fingerprint. All your jabbers, tox-ids are your fingerprints. The way you communicate is your fingerprint. Your personality is your fingerprint. Take every big cybercriminal case during last decade and it was not about compromising Tor-node but about the most retarded OpSec fails and about people talking crazy shit here and there and on each other. Discipline, moderation and stong principles (at least of what NOT to do) will help your OpSec more than conspiracy videos about whom all tor-nodes belong too.
 
bratva сказал(а):
Also, do not forget that your forum account here is your fingerprint. Your nickname is your fingerprint. All your jabbers, tox-ids are your fingerprints. The way you communicate is your fingerprint. Your personality is your fingerprint. Take every big cybercriminal case during last decade and it was not about compromising Tor-node but about the most retarded OpSec fails and about people talking crazy shit here and there and on each other. Discipline, moderation and stong principles (at least of what NOT to do) will help your OpSec more than conspiracy videos about whom all tor-nodes belong too.
Нажмите, чтобы раскрыть...

Stylometry - Wikipedia

en.wikipedia.org
 
espe0n сказал(а):
i was looking at some articles, and i ended up watching a video of mental outlaw talking about TOR nodes, and i'm wondering how secure you think tor can be and if you think tor can become insecure (or more insecure) over time?

Нажмите, чтобы раскрыть...

Tor was/is funded by the US government and isn't secure​

While the US government is one of the entities that helps fund the Tor Project, they don't do that to make Tor insecure. The US government has used Tor themselves in the past, it is not only helpful to civilians, but it is a valuable tool for government agents when they need anonymity. For instance, when they are in a hostile country and need to contact home. Tor relays are also not ran by the Tor Project, they are run by completely separate entities such as individuals who voluntarily set up relays on their home internet and non-profit organizations.

Tor isn't encrypted​

This myth is usually spread by VPN companies trying to convince you to use a VPN with Tor. Tor is encrypted, in fact it uses 3 layers of encryption. When you connect to an onion site, the encryption is even more effective because the traffic stays encrypted using Tor all the way to its destination. However, most sites use HTTPS anyway, so this isn't even an issue. The point is, Tor is encrypted using strong and reliable algorithms that are properly implemented.

source http://jqibjqqagao3peozxfs53tr6aecoyvctumfsc2xqniu4xgcrksal2iqd.onion/myths.html
 
bratva сказал(а):
TOR has a good design and an excellent community behind it but it is not a magic button that will solve all your OpSec issues. I would be more concerned on your place not about TOR-network but about other different ways for you to leave a fingerprint - starting from your own OS. I do not know why nobody talk more about Qubes OS but it can really help you with Whonix to build something that will be very hard to investigate. Do not forget that in a moment when I write these words - people already started to use not only netflow but complex AI-systems that were built to investigate netflow - to fuck him, her, me and you.

Take a look at:
https://arxiv.org/pdf/2304.09510

GitHub - maybenot-io/maybenot: a framework for traffic analysis defenses

a framework for traffic analysis defenses. Contribute to maybenot-io/maybenot development by creating an account on GitHub.
github.com

Also, do not forget that your forum account here is your fingerprint. Your nickname is your fingerprint. All your jabbers, tox-ids are your fingerprints. The way you communicate is your fingerprint. Your personality is your fingerprint. Take every big cybercriminal case during last decade and it was not about compromising Tor-node but about the most retarded OpSec fails and about people talking crazy shit here and there and on each other. Discipline, moderation and stong principles (at least of what NOT to do) will help your OpSec more than conspiracy videos about whom all tor-nodes belong too.
Нажмите, чтобы раскрыть...
Nur ein Narr würde seine Sicherheit von etwas abhängig machen.
 
your opsec shouldnt rely on one thing, using tor can be pretty helpful as a extension of your opsec.
make sure to tunnel your traffic through different protocols and different vpns also dont use your host as working space.
vpn router and virtual machines in combination with the remote desktop protocol should also be the bare minimum to use.
make sure to use a secure os atleast as host and disable telemetry while using windows (massgrave.dev ltsc .iso ) as vm, privacy.sexy and other privacy scripts can help u with that.
also opsec isnt just your setup, its the way you think, the way you move and the way you talk. you leave prints everywhere on the internet a mistake from years ago can cost you everything years later!
 

The Tor Project | Privacy & Freedom Online

Defend yourself against tracking and surveillance. Circumvent censorship.
www.torproject.org
www.torproject.org





The mission of The U.S. Department of State is to protect and promote U.S. security
 
Top