Bitcoin Forum
May 09, 2024, 06:06:34 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Any Tor network users here?  (Read 1547 times)
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
March 16, 2015, 07:37:57 AM
 #21

Watch out for those "trusted" VPN honeypots.

1715234794
Hero Member
*
Offline Offline

Posts: 1715234794

View Profile Personal Message (Offline)

Ignore
1715234794
Reply with quote  #2

1715234794
Report to moderator
1715234794
Hero Member
*
Offline Offline

Posts: 1715234794

View Profile Personal Message (Offline)

Ignore
1715234794
Reply with quote  #2

1715234794
Report to moderator
1715234794
Hero Member
*
Offline Offline

Posts: 1715234794

View Profile Personal Message (Offline)

Ignore
1715234794
Reply with quote  #2

1715234794
Report to moderator
Transactions must be included in a block to be properly completed. When you send a transaction, it is broadcast to miners. Miners can then optionally include it in their next blocks. Miners will be more inclined to include your transaction if it has a higher transaction fee.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715234794
Hero Member
*
Offline Offline

Posts: 1715234794

View Profile Personal Message (Offline)

Ignore
1715234794
Reply with quote  #2

1715234794
Report to moderator
Fernandez
Legendary
*
Offline Offline

Activity: 1008
Merit: 1000



View Profile
March 16, 2015, 08:04:29 AM
 #22

Watch out for those "trusted" VPN honeypots.

Best not to mix Tor and VPN. Tor on its own is good enough, especially if there are lots of other users around you.






██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████





...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






sionsandman
Hero Member
*****
Offline Offline

Activity: 520
Merit: 500


View Profile
March 17, 2015, 12:57:27 AM
 #23



May be overkill but I need to use a vpn because I want to control the end IP.




Best not to mix Tor and VPN. Tor on its own is good enough, especially if there are lots of other users around you.

But with TOR you have no control over the exit IP.

xmasdobo
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
March 17, 2015, 01:03:09 AM
 #24

I just posted this but anyway: can you tell me an example of someone that got compromised using tor + javascript off/flash off/stupid shit off and didn't do stupid mistakes like revealing your real name like the silk road dude? as far as i know it never happened but im not sure.
Buffer Overflow
Legendary
*
Offline Offline

Activity: 1652
Merit: 1015



View Profile
March 17, 2015, 09:01:04 AM
 #25

But with TOR you have no control over the exit IP.

You can manually choose which exit node you wish to use in your circuit. You will need to manually edit your torrc conf file.
Code:
ExitNodes server1, server2, server3
StrictExitNodes 1

mark coins
Hero Member
*****
Offline Offline

Activity: 910
Merit: 1000



View Profile
March 19, 2015, 02:03:29 AM
 #26

I would not recommend doing this at work. It would be hard to justify and you might have people accuse you of doing things you aren't doing.
|Bitcoin|
Sr. Member
****
Offline Offline

Activity: 320
Merit: 250


View Profile
March 19, 2015, 04:06:00 AM
 #27

You can use and instal a web browser right? Just download the tor browser, install it, then use it. It'd really not that difficult. Just watch a youtube video or something to get the gist of it.

It work for the first time. Wheb I tried to connect again it took a long time to connect.
rockBTC
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
March 19, 2015, 10:41:03 PM
 #28

i use tor, its pretty easy to use if your main browser is firefox
rockBTC
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
March 19, 2015, 10:42:37 PM
 #29

I just posted this but anyway: can you tell me an example of someone that got compromised using tor + javascript off/flash off/stupid shit off and didn't do stupid mistakes like revealing your real name like the silk road dude? as far as i know it never happened but im not sure.
it is virtually impossible to track somebody with these conditions unless you post your name and where you live
Erdogan
Legendary
*
Offline Offline

Activity: 1512
Merit: 1005



View Profile
March 20, 2015, 02:36:51 AM
 #30

I just posted this but anyway: can you tell me an example of someone that got compromised using tor + javascript off/flash off/stupid shit off and didn't do stupid mistakes like revealing your real name like the silk road dude? as far as i know it never happened but im not sure.
it is virtually impossible to track somebody with these conditions unless you post your name and where you live

I use tor, and it is quite evident that google have no problems identifying me. I suppose they use browser fingerprinting and of course cookies. And flash has its own cookie system, other extensions too, I suppose. So in addition to using tor, you should turn off lots of stuff in the browser, which is already done in the tor-browser.

If you want more untracability, you could use a separate machine or virtual machine, and make sure you don't ever use your real identity on that machine. Maybe shred everything after use, and start every session on a clean machine.

When you write something on a message board or whatever, it is easy to let slip through information that can reveal your identity.

As you understand, it is quite difficult, in practice, to avoid being tracked.

extrabyte
Legendary
*
Offline Offline

Activity: 840
Merit: 1000



View Profile
March 20, 2015, 03:52:59 AM
 #31

The cool thing about Tor's encryption model is that only node 3 (the 'exit node') is ever able to read your traffic (but they don't know who it's from). The other nodes in the middle only ever see encrypted packets they can't fully decrypt, so they can be completely untrusted.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!