Bitcoin Forum
December 12, 2017, 05:41:03 AM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 2 [3]  All
  Print  
Author Topic: How anonymous is TOR really?  (Read 8207 times)
gollum
Sr. Member
****
Offline Offline

Activity: 434


In Hashrate We Trust!


View Profile
June 11, 2013, 11:37:01 PM
 #41

If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
Sadly, such complexity only shrugs off non techies as they like most stuff easy to use, very quick and easy to learn and conveniant.

What our noob friends need is a black-box solution: a cheap small wifi-router with upgradeable software where you have three modes:
-VPN mode
-TOR mode
-Default mode (just as all other routers)

As I said before I dont trust TOR fully (some endpoints of TOR is run by criminals, and some are run by NSA), but it is somehow better than revealing ones real IP.
1513057263
Hero Member
*
Offline Offline

Posts: 1513057263

View Profile Personal Message (Offline)

Ignore
1513057263
Reply with quote  #2

1513057263
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1513057263
Hero Member
*
Offline Offline

Posts: 1513057263

View Profile Personal Message (Offline)

Ignore
1513057263
Reply with quote  #2

1513057263
Report to moderator
bitbybit2
Jr. Member
*
Offline Offline

Activity: 56


A scam? My instructor told me to stay away from the crowd.


View Profile
June 12, 2013, 05:18:45 AM
 #42

Let's just say that if Tor is not anonymous then nobody would bother to buy illegal stuff in silk road.
Once they visit the deep web/invisible web/dark net/onionland without using the Tor bundle they should expect Law Enforcers to bang at their door at any given moment. TOR is anonymous but purchasing a vpn software using your credit card will definitely tie your name to the VPN software. So don't be stupid do not purchase a vpn software using your money. Use free VPN software or better yet use only those that accept bitcoins.
AliceWonder
Full Member
***
Offline Offline

Activity: 168



View Profile
June 12, 2013, 07:05:31 AM
 #43

You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.

But your session ID won't.

QuarkCoin - what I believe bitcoin was intended to be. On reddit: http://www.reddit.com/r/QuarkCoin/
gollum
Sr. Member
****
Offline Offline

Activity: 434


In Hashrate We Trust!


View Profile
June 12, 2013, 11:23:11 AM
 #44

Is this solution too paranoid?

1. You connect to internet via VPN on the router
2. You run one VM (virtual machine) with linux & TOR for each web-page. So you have one VM for Bitcointalk, one VM for google and so on...
3. You delete your VMs every night and use a fresh VM for every new session so you can be 100% sure you dont have any trojans, cookies and other parasites.
bitpop
Legendary
*
Offline Offline

Activity: 2184


https://keybase.io/bitpop


View Profile WWW
June 12, 2013, 11:43:30 AM
 #45

Your tor server should have its own vm.

Reputation  |  PGP  |  DigitalOcean  |  TorGuard  |  Ethereum Classic
Bitcoin: 3DSh6AnmvBpDJFUz2mnLirMLmTMcFs9nDm
Bitmessage: BM-2cXN9j8NFT2n1FxDVQ6HQq4D4MZuuaBFyb
ebildude123
Full Member
***
Offline Offline

Activity: 226


View Profile
June 12, 2013, 07:05:13 PM
 #46

Pretty anonymous I would say, I recommend you don't host a tor node on your personal computer though  Roll Eyes
moni3z
Hero Member
*****
Offline Offline

Activity: 887



View Profile
June 12, 2013, 09:54:16 PM
 #47

They (feds) have only ever caught people using Tor who talked to much in IRC/forums. So if you aren't telling the feds where you live and everything about yourself while you engage in freedom fighting activities then you are basically as anonymous as it gets.

Although unlikely, it could be possible for an ISP to scan looking for Tor connections. China does this, but they don't dispatch black helicopters they just shut the connection down. So if you are worried about this obviously you would want to tunnel Tor through a VPN, or use Obfsproxy to hide the Tor connection from your ISP.

It could also be possible they trap you in some sort of page full of browser exploits and then learn what your real IP is, though unlikely if java plugins are all removed and you aren't randomly going to suspicious pages people have emailed or linked you in IRC. If you are worried run it in a vm, or even better use virtual routing in openbsd to lock down the Tor daemon to local IP, chroot it, and set up your firewall to deny all outbound connections that aren't through Tor and these exploits are foiled.

Feds found out who China's l337 haxors were because they were dumb enough to log into facebook while hacking the gibson and the NSA got their cookies and found their real names. So, if these idiots are the super dangerous government hackers you are worried about sounds like they have no idea what they are doing and no chance at all tracing their own hand on a piece of paper let alone some sort of hollywood-esque backtrack through Tor hops to find you.

Lionel
Sr. Member
****
Offline Offline

Activity: 397


View Profile
August 15, 2017, 06:42:24 PM
 #48

They (feds) have only ever caught people using Tor who talked to much in IRC/forums. So if you aren't telling the feds where you live and everything about yourself while you engage in freedom fighting activities then you are basically as anonymous as it gets.

Although unlikely, it could be possible for an ISP to scan looking for Tor connections. China does this, but they don't dispatch black helicopters they just shut the connection down. So if you are worried about this obviously you would want to tunnel Tor through a VPN, or use Obfsproxy to hide the Tor connection from your ISP.

It could also be possible they trap you in some sort of page full of browser exploits and then learn what your real IP is, though unlikely if java plugins are all removed and you aren't randomly going to suspicious pages people have emailed or linked you in IRC. If you are worried run it in a vm, or even better use virtual routing in openbsd to lock down the Tor daemon to local IP, chroot it, and set up your firewall to deny all outbound connections that aren't through Tor and these exploits are foiled.

Feds found out who China's l337 haxors were because they were dumb enough to log into facebook while hacking the gibson and the NSA got their cookies and found their real names. So, if these idiots are the super dangerous government hackers you are worried about sounds like they have no idea what they are doing and no chance at all tracing their own hand on a piece of paper let alone some sort of hollywood-esque backtrack through Tor hops to find you.



Did they login to FB from TOR or did they use a separate non-TOR browser for that ?
Pages: « 1 2 [3]  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!