User Controls
Lanny, what the fuck is this?
-
2017-02-19 at 12:54 AM UTC
-
2017-02-19 at 1:25 AM UTC
Originally posted by Captain Falcon Already addressed this. If you want to compile it yourself from the released sources then that's good. Nobody knows whats up with the binaries you download off their site. A lot of people recommend Tor as the ezpz anonymity and trust me, I would bet my houses on the fact that 99.999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999% of Tor's users don't compile from the source, they just download their executables and run it, and this leaves you with literally no idea of what's up.
I'd rather trust in VPN providers having their own self interest, which lines up with my self interest, and use software that has a lower chance of security risks for my day to day browsing.
Post last edited by Captain Falcon at 2017-02-19T01:06:03.195908+00:00
NIGGER I BUILD MY ENTIRE DISTRO FROM SOURCE AAAAAAAAHHHHHHHGGGGGGGGG RRRRREEEEEEEEEEE!!!!
-
2017-02-19 at 9:44 AM UTC
-
2017-02-19 at 10:42 AM UTC
-
2017-02-19 at 2:37 PM UTC
-
2017-02-19 at 3:57 PM UTC
-
2017-02-19 at 5:39 PM UTC
-
2017-02-19 at 8:14 PM UTC
Originally posted by BeigeWarlock …with blankets full of small poxs…
Which the government of the day had deliberately infected with the disease, hoping that would dispatch them a lot quicker, so that they could take over their land all the faster. Kids, women, the elderly... just wasted them all, like so much worthless garbage.
-
2017-02-19 at 8:27 PM UTC^ Small pox blankets are a myth. The germ theory of disease didn't even exist back then!
-
2017-02-19 at 8:36 PM UTC
-
2017-02-20 at 2:57 AM UTC
Originally posted by Captain Falcon Tor is a well thought out, sound idea but at this point it's safe to assume that the best security it offers is noise; you aren't doing anything too important, so nobody is willing to put in the now-low (but slightly higher than if you weren't using anything) threshold of work necessary to fuck you up. However due to the nature of Tor, if someone *is* interested in you in particular then it's easy to target you with a correlation attack.
VPNs, even if you assume they keep logs, offer you better protection with regards to "noise", and also aren't nearly as susceptible to the correlation attacks that can target Tor users.
I'm not really sure what you mean by noise, assuming you're talking about active users, it's large enough that it warrants something more sophisticated than just working backwards.
Connecting to a VPN might appear more benign, but you then put all your faith in a corporate entity. Where the Tor protocol cannot deauthenticate you unless every node is compromised a VPN provider is more than capable of doing so and may even be legally blocked from informing you they are monitoring you.
Also since it's often mentioned, maybe there is a secret NSA attack that can deauth all Tor traffic, people say the same about IPSec. There is zero evidence of either so it's not worth talking about.
Originally posted by Captain Falcon Not at all. Here's a simple example:
http://www.forbes.com/sites/runasandvik/2013/12/18/harvard-student-receives-f-for-tor-failure-while-sending-anonymous-bomb-threat/#7005930369f0
This was 100% a correlation attack and of course he would probably be fine if he wasn't a retard and used a bridge or something, or if he hadn't immediately confessed but I'm just giving a simple example.
This is a pretty poor example for the reasons you stated. I'll give you that Tor doesn't prevent people from seeing that you are connected to it, but even so there was no direct evidence it only led them to the right person. He also shat where he ate, had he sent a bomb threat anywhere else nothing would have come of it.
Really the only reason I read about people being busted these days is javascript drivebys. And that can be avoided with a seperate Tor router.This is why you pick a VPN service based outside of the jurisdiction of the country in which you are based, and who do not keep logs. And anyone who says VPN providers lie abou keeping logs is full of shit, because there is no reason to; they specifically do not for liability reasons, and AFAIK there are no laws in place practically anywhere that necessitate log keeping.
The problem is this inherently means you have to trust somebody else. That's a securiy hole no matter how you look at it and no matter who runs the VPN service.
-
2017-02-20 at 9:55 AM UTC
Originally posted by -SpectraL No security is perfect. The best you can do is be ruthless in response. The bleeding hearts and soft spines, like zok, will tell you to just sit back and relax, and allow yourself to be hacked, just enjoy yourself and the intrusion attempts, but the admin who does best is the one who is heartless, cruel, decisive and therefore quite effective. Just tellin' it like it is, is all.
does zok even post here ? in my culture, its not nice to speak, ill or otherwise, of people that are no longer with us. -
2017-02-20 at 10:02 AM UTC
-
2017-02-20 at 10:02 AM UTC
Originally posted by -SpectraL the admin who does best is the one who is heartless, cruel, decisive and therefore quite effective. Just tellin' it like it is, is all.
This is exactly how i ran the things i was responsible for running on Zoklet. Weren't all that keen on this doctrine when it was someone else than you employing it eh? -
2017-02-20 at 10:04 AM UTC
-
2017-02-20 at 2:17 PM UTC
-
2017-02-20 at 3:29 PM UTC
-
2017-02-20 at 9:27 PM UTC
Originally posted by TreyGowdy I'm not really sure what you mean by noise, assuming you're talking about active users, it's large enough that it warrants something more sophisticated than just working backwards.
Yes, as I said, "noise"; the fact that you're just one faggot buying RCs with Tor out of 2 million is your best protection. And as I said, there are already ways to fuck you, regardless of Tor, and using Tor itself is a great way to draw attention to yourself.Connecting to a VPN might appear more benign, but you then put all your faith in a corporate entity. Where the Tor protocol cannot deauthenticate you unless every node is compromised a VPN provider is more than capable of doing so and may even be legally blocked from informing you they are monitoring you.
As opposed to putting your faith into a list of John and Jane Smith type names, right? As I said, I would rather bank on the self interest of my VPN provider than on the ideological fortitude of some faceless organisation that claims to be promoting privacy.Also since it's often mentioned, maybe there is a secret NSA attack that can deauth all Tor traffic, people say the same about IPSec. There is zero evidence of either so it's not worth talking about.[/quite]
I don't think that it's a specific matter of deauthing all Tor traffic. With the amount of data that the NSA collect each day, I think it's undeniable that there is tremendous potential for them to nail you in ways you don't know if you're on their radar. I'm sure they have some powerful metanalysis tools that could see, for example, that you logged on to Tor (flagging you), and then work backwards from that, seeing your facebook and you emails, what you type into the google keyboard on your android phone, to establish that you use drugs and then begin to target you. That's the thing about the dragnet; they see more than you consider.This is a pretty poor example for the reasons you stated. I'll give you that Tor doesn't prevent people from seeing that you are connected to it, but even so there was no direct evidence it only led them to the right person. He also shat where he ate, had he sent a bomb threat anywhere else nothing would have come of it.
Once again, I only intended to show it as a very simple example of how someone might not think like an infosec conscious person and thus open themselves up to being compromised in ways they don't even consider.Really the only reason I read about people being busted these days is javascript drivebys. And that can be avoided with a seperate Tor router.
This is a real problem with trusting the Tor people with all security regarding their little browser package.The problem is this inherently means you have to trust somebody else. That's a security hole no matter how you look at it and no matter who runs the VPN service.
Unless you're going to take all the steps yourself, that's what you're doing anyway when you download and use the Tor browser package. And as far as easy plug and play solutions go, VPNs are so incredibly superior that it's not even funny. -
2017-02-23 at 4:34 AM UTC
-
2017-02-23 at 5:36 AM UTCThat's pretty stupid but I still laughed