|
I'm interested in learning more about the TOR network and how it works. Can anyone give me the basics about it or point me to somewhere I can read up on it? Or tell me things about it that I won't learn through normal site about it.
|
# ? May 9, 2015 03:40 |
|
|
# ? Apr 26, 2024 14:29 |
|
The NSA own it, so all you're doing is sending them your data when you use it.
|
# ? May 11, 2015 04:11 |
|
EvilElmo posted:The NSA own it, so all you're doing is sending them your data when you use it. So in reality, it's no different than the clearnet.
|
# ? May 11, 2015 17:43 |
|
BigRed0427 posted:I'm interested in learning more about the TOR network and how it works. Can anyone give me the basics about it or point me to somewhere I can read up on it? Or tell me things about it that I won't learn through normal site about it. Seriously? http://www.justfuckinggoogleit.com/
|
# ? May 11, 2015 17:45 |
|
The most important thing to know about tor is that it doesn't make you anonymous, it just obfuscates your location. The traffic that you pass through the network will no longer have an obvious single physical origin but all of your information passing through the network is known to be related to a single entity. This lack of anonymity is the result of a number of exit nodes being operated by the government. Regardless, your location is still obfuscated. One thing a lot of people misunderstand about tor is its purpose, which was never to make people anonymous. A analogous criticism you hear is that wikipedia isn't a peer-reviewed scholarly encyclopedia; no poo poo, it's not meant to be. Good info for end-users about tor is provided by the EFF: https://www.eff.org/pages/tor-and-https The animated diagram on this page is basically everything you need to know as long as you're not setting up a relay or bridge node.
|
# ? May 12, 2015 03:43 |
|
Even if the NSA doesn't own it, exit nodes can sniff your traffic and you should basically never use it for anything that isn't over https, and should treat every certificate error as a snooped connection.
|
# ? May 12, 2015 06:28 |
|
The way I understood it was your ISP (and the NSA) could see that you used TOR but couldn't see what you did in it. I thought that was why it was popular in China. I dont know that much about computers so I might be wrong.
|
# ? May 12, 2015 08:24 |
|
Tor is an anonymity network with two major properties. First, any party intercepting traffic coming out of your computer can't tell what you're doing as the traffic is encrypted (like regular SSL/TLS/HTTPS traffic), but also because the destination of the traffic is effectively a random computer on the Internet instead of being a well-known server. At one time, they may have been able to tell you were using Tor, but now it's difficult to distinguish Tor traffic from other HTTPS traffic. This property is what enables Tor to bypass censorship and is the reason for its popularity in places where the Internet is actively censored. You can't just block Google, Facebook, Wikipedia, etc., without blocking encrypted communications entirely, which is defeating for any tech-oriented economy. Second, any party intercepting traffic coming out of the Tor network (the exit node) can't tell who/where the traffic originated, so they can't track it back to the source. This allows people to anonymously browse websites without fear of being tracked by their IP address. The major caveat here is that if the traffic itself contains personally identifiable information, then an interceptor can still ascribe traffic to a particular user. Generally, browsing HTTPS websites over Tor should be no worse here than not using Tor, except that by routing traffic through (more) untrusted hosts presents greater opportunities for weaknesses in browser security to be exploited. For this reason, folks may be interested in using the Tor Browser. In addition to automatically routing traffic over Tor, it contains a number of safeguards over traditional browsers to preserve privacy and mitigate security threats. The Tor website and Wikipedia page have decent overviews and technical backgrounds of the projects. However, if you're interested in use, history, political confrontations, etc., the Tor folks regularly give talks at CCC that are pretty insightful and recommended for watching/listening. ExcessBLarg! fucked around with this message at 15:38 on May 12, 2015 |
# ? May 12, 2015 15:32 |
|
BigRed0427 posted:I'm interested in learning more about the TOR network and how it works. Can anyone give me the basics about it or point me to somewhere I can read up on it? Or tell me things about it that I won't learn through normal site about it. It's a thing used by people who want to buy drugs and/or kiddie porn on the internet, and sometimes also by fringe conspiracy theory loonies
|
# ? May 29, 2015 09:41 |
|
I used it a couple times because it makes me feel like a badass cyberpunk rebel hacker.
|
# ? May 29, 2015 11:44 |
|
But those other reasons are probably good too I don't wanna stigmatize or kinkshame or whatever
|
# ? May 29, 2015 11:45 |
|
QuarkJets posted:It's a thing used by people who want to buy drugs and/or kiddie porn on the internet, and sometimes also by fringe conspiracy theory loonies Are you referring to the fringe conspiracy theory that the NSA et al. are actively monitoring and saving all internet traffic?
|
# ? May 29, 2015 15:28 |
|
oliwan posted:Are you referring to the fringe conspiracy theory that the NSA et al. are actively monitoring and saving all internet traffic? The fringe conspiracy theory is that the government gives even half a gently caress what the average person is doing online.
|
# ? May 29, 2015 17:25 |
|
In the UK downloading linux ISOs from piratebay is now illegal but using the TOR withdrawal method your computer won't get pregnant and sued if you access the bay of piracy.
|
# ? May 30, 2015 02:56 |
|
that guy that wrote all the words had it mostly right, except he forgot to point out that you don't get end to end TLS even though everyone assumes you do
|
# ? May 30, 2015 05:18 |
|
PT6A posted:The fringe conspiracy theory is that the government gives even half a gently caress what the average person is doing online. The government spends billions of dollars and hires the top talent in the country to work on something they don't care about. Got it.
|
# ? Jun 2, 2015 07:57 |
|
Salt Fish posted:The government spends billions of dollars and hires the top talent in the country to work on something they don't care about. Got it. I think the point he was trying to make is that 99% of the data collected will probably never been seen by a human, just stored/scanned with some serious intelligence gathering software. Not saying it's not a violation of privacy or whatever, just that the government doesn't really give a poo poo about the most of the data they collect, it's just done in bulk because it's easier that way.
|
# ? Jun 2, 2015 08:12 |
|
What about the next government?
|
# ? Jun 2, 2015 18:53 |
|
oliwan posted:What about the next government? Google just wants to sell you ads with your data, so no big worries there.
|
# ? Jun 2, 2015 20:34 |
|
I hid a camera in my girlfriend's bathroom but don't worry, it's not creepy because I don't plan on watching the tapes.
|
# ? Jun 2, 2015 23:56 |
|
So you agree then?
|
# ? Jun 3, 2015 04:35 |
|
oliwan posted:What about the next government? Is the next government going to be run by space aliens? Because people tomorrow aren't going to give any more of a poo poo about your SomethingAwful posting habits than people today. If you're in a region where political speech can get you arrested, then by all means use TOR, but if you're using it for casual browsing then you're just wasting time and resources
|
# ? Jun 7, 2015 18:09 |
|
Yeah, I mean the principle is all very admirable, but right now whether or not you hide your internet activity has literally no impact on your life unless you're actually breaking the law or live in China.
|
# ? Jun 7, 2015 19:38 |
|
There are bugs that appear. There was one technique where if someone suspected you of doing foul things on a site, they could sit at your connection and the exit nodes that connects to the site. Basically they could use a vuln to clog all the other exit nodes except one which they could create or just monitor an existing one. This might seem dumb but they are able to use this to link you to the site just by watching traffic patterns. Went to a security meeting around DC and one person said they still easily catch people who do things like posting identities or accessing sites like mega outside of for because they'll be able to download their disgusting porn faster. Same person said for every idiot, there are a hundred users who burn their anon ids the second they suspect something. EVIL Gibson fucked around with this message at 22:20 on Jun 7, 2015 |
# ? Jun 7, 2015 22:16 |
|
QuarkJets posted:If you're in a region where political speech can get you arrested, then by all means use TOR, but if you're using it for casual browsing then you're just wasting time and resources
|
# ? Jun 8, 2015 21:11 |
|
Strategic Tea posted:Yeah, I mean the principle is all very admirable, but right now whether or not you hide your internet activity has literally no impact on your life unless you're actually breaking the law or live in China. Chilling effect.
|
# ? Jun 11, 2015 06:01 |
|
Downloading any TOR poo poo likely puts you on a watchlist in the first place anyway, defeating the purpose.
|
# ? Jun 17, 2015 22:03 |
|
killaer posted:Downloading any TOR poo poo likely puts you on a watchlist in the first place anyway, defeating the purpose. If you're on a watchlist already, you have nothing to lose! Also its not very hard to defeat that. I mean, jesus, you can do it without knowing a single thing about encryption or the internet. You could literally just go to an internet cafe, pay in cash, and walk out with a USB stick.
|
# ? Jun 18, 2015 06:59 |
|
I tried it once. The only websites I found hosted the works of Thomas Paine (I'm assuming it's already public domain) and sites to drop anonymous news tips. I went in thinking Tor might be interesting, left realizing my life is too calm and safe to need Tor.
|
# ? Jun 18, 2015 19:51 |
|
There's not much to really do unless you know where to look for it, and even so, similar content can be found on the actual Internet.
|
# ? Jun 19, 2015 20:59 |
|
|
# ? Apr 26, 2024 14:29 |
|
Crankit posted:In the UK downloading linux ISOs from piratebay is now illegal but using the TOR withdrawal method your computer won't get pregnant and sued if you access the bay of piracy. Except that standard BitTorrent clients don't work properly with TOR: https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea There appears to be one potential solution, though I haven't personally tried it: http://www.tribler.org/
|
# ? Jun 20, 2015 02:28 |