Snoopers Charter

So as many of you may or may not be aware the Snoopers Charter has been brought into power into the wonderfully free and democratic UK under the guise of 'aiding counter-terrorism' whilst giving organisations like the DWP, The Gambling Comission, and your local council amongst MANY MANY more the freedom to view your entire browsing history, not just of your computer but your phone and other devices.

Aside from using this browser and a VPN what other steps can I take to secure my browser. Is there a 'correct' way to get most use from TOR? Are there any highly recommended VPN's I should use, and how do I go about securing my phone? (I've also heard a rumor in the comments section of web articles reporting them that VPN's will be rendered useless by this, can anyone with more knowledge on the subject enlighten me?)

As for the age old 'nothing to hide, nothing to fear' bullshit, I have nothing to hide when I take a shit, but it doesnt mean I want the government watching me drop a deuce.

Other urls found in this thread:

github.com/superkuh/snoopers-obfuscator
privacytools.io/
independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html.
petition.parliament.uk/petitions/173199
openrightsgroup.org/campaigns/digital-economy-bill-hub/stop-uk-censorship-of-legal-content
openrightsgroup.org/join/
gutenberg.net.au/ebooks01/0100021.txt
degooglisons-internet.org/alternatives
privacytools.io
prism-break.org/en/
securityinabox.org/en
ssd.eff.org/
torproject.org/docs/bridges
twitter.com/AnonBabble

Bumb for interest

Thanks moar bump

Bumping for interest.

I think the VPN thing is because VPN providers are also required to keep logs, but that only applies to VPNs inside the UK.

Anyone up for a little civil disobedience?

github.com/superkuh/snoopers-obfuscator

Run yours today.

What the fuck is wrong with UK.

Shit I might as well just move to Dublin or Cork, stupid politicians.

using a vpn gets you watched even more closely

yeah but if you're using a vpn it doesn't matter how close they watch because they're not going to see anything

furthermore, they're going to see a massive spike in vpn usage once they start attempting to get ISPs to block various porn sites in the near future

Does anyone know if browsing data has been stored already so that they can go back a year from next week when it's in play?

I really doubt any will have historical logs, as storing logs they aren't legally required to keep is wasted money, and has data security implications that they'd like to avoid.

I really doubt many will have even implemented it yet, as storing a year of browsing data for every single customer has significant security, storage capacity, and network traffic concerns, meaning and will require an IT solution for the ISP, which will need to be proposed, tailored, approved, adjusted, re-approved, and finally rolled out, assuming nothing goes wrong, and that process doesn't happen in a week unless the government is throwing money at every ISP, which I highly doubt they are.

It's likely that they've been monitoring us for a long time.

This might help - privacytools.io/

Been hiding my sexuality and worried now obviously.

Can't wait to leave this shithole country.

Surveillance in the name of """"protection"""" means more than treating your citizens like people.

They already are watching everyone.

Fucking this. People should be entitled to their privacy. I'm so sorry this is happening to you user. Fuck May.

i don't think the government care about your sexuality bruh

Just worried they've stored the last year and that it could be released any time from now

Until hackers access the files and release them publicly

if hackers were bothered about exposing your sexuality then they would have done it already

if it makes you feel any better, your family probably already thing you're a gayboi

Not very bright are you, he's saying that hackers can just release ALL files and you could search for a name and boom, that persons entire internet history. Doesn't matter that they didn't target specific people, if it's a batch of files then it doesn't matter

It's not even just "the government"- independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-bill-act-snoopers-charter-browsing-history-what-does-it-mean-a7436251.html.

>Food Standards Agency
Why the fuck would they need to know what porn I am browsing?

If you're fingering dogs, then they don't want you feeding kids obviously.

Don't fall for the "use a VPN with Tor" May May. It's pointless. It's used as a selling point by "darknet markets" to try to spook you into buying their sponsor's VPN.

Tor Rules:
It's called Tor, not TOR. Read the documentation and you'll know why. The fact you haven't read the docs makes me concerned.

If the site does not support HTTPS, don't use that site! E-mail them and link them to Comodo or Let's Encrypt! Explain why HTTPS is important!

Do not enable JavaScript for Google!

You may install Adblock Plus - It's used in tails, and it's slower than uBlock Origin, but if you use it, you'll appear more unique. You can also block ads via your host file. Look into it.

Use Tails! It's good.

Interesting stuff about warrant canarys on VPN's. Useful.

Using a VPN to connect to Tor is not pointless. Why would you think that?

petition.parliament.uk/petitions/173199

Brits get signing.

And this one
openrightsgroup.org/campaigns/digital-economy-bill-hub/stop-uk-censorship-of-legal-content

And if you have some income, please join the ORG
openrightsgroup.org/join/

Here is a incomplete list of who can now look at brits Internet history just by asking. Only a matter of time before someone ends up hacking Talk Talk and posting peoples Internet history for the whole fucking world to see. vpn will soon be a must for safety.

Metropolitan police force
City of London police force
Police forces maintained under section 2 of the Police Act 1996
Police Service of Scotland
Police Service of Northern Ireland
British Transport Police
Ministry of Defence Police
Royal Navy Police
Royal Military Police
Royal Air Force Police
Security Service
Secret Intelligence Service
GCHQ
Ministry of Defence
Department of Health
Home Office
Ministry of Justice
National Crime Agency
HM Revenue & Customs
Department for Transport
Department for Work and Pensions
NHS trusts and foundation trusts in England that provide ambulance services
Common Services Agency for the Scottish Health Service
Competition and Markets Authority
Criminal Cases Review Commission
Department for Communities in Northern Ireland
Department for the Economy in Northern Ireland
Department of Justice in Northern Ireland
Financial Conduct Authority
Fire and rescue authorities under the Fire and Rescue Services Act 2004
Food Standards Agency
Food Standards Scotland
Gambling Commission
Gangmasters and Labour Abuse Authority
Health and Safety Executive
Independent Police Complaints Commissioner
Information Commissioner
NHS Business Services Authority
Northern Ireland Ambulance Service Health and Social Care Trust
Northern Ireland Fire and Rescue Service Board
Northern Ireland Health and Social Care Regional Business Services Organisation
Office of Communications
Office of the Police Ombudsman for Northern Ireland
Police Investigations and Review Commissioner
Scottish Ambulance Service Board
Scottish Criminal Cases Review Commission
Serious Fraud Office
Welsh Ambulance Services National Health Service Trust

bump

gutenberg.net.au/ebooks01/0100021.txt

...

Didn't this already happen once?

Use multiple WAN to scatter your traffic.

It's not only pointless, it's outright dangerous with very little added benefit. The Jolly Roger Guide used to explain this but since deepdotweb started advertising VPNs, they deleted this section.

There are two ways you can use a VPN with Tor: you can connect to the VPN before or after you connect to Tor. The default is connecting to the VPN before Tor, in which case, the VPN not only has your identification but all of your browsing content as well. You might as well not even be using Tor.

If you configure your VPN so that you connect to Tor first, you still have the problem of the VPN knowing all of your content, which could eventually be used to identify you through timing attacks or an analysis of the data. That is assuming you were careful enough to sign up for the VPN through Tor and used well-laundered btc to pay.

Your whole argument hinges on being a fuck up and not setting things up properly. VPNs are a great way to better hide your traffic.

aren't .io domains generally honeypots?

Nah nigger, watch out for them .tk's though.

degooglisons-internet.org/alternatives
privacytools.io
prism-break.org/en/
securityinabox.org/en
ssd.eff.org/

>VPNs are a great way to hide your traffic according to the happy VPN merchants

Even using https, there's no way to hide your traffic from the VPN. It's a completely unnecessary risk. There's no scenario where a VPN makes you safer than just using vanilla Tor.

If you're worried about your ISP knowing about your Tor usage then set up a private, unlisted bridge. There's no way to monetize that, so you never see it advertised on the deepweb.

>there's no way to hide your traffic
Despite it being encrypted?

It's only encrypted as it travels through the Tor nodes. The VPN can tell you that they encrypt all their traffic and don't keep logs, but it's mostly marketing bullshit. There isn't a VPN merchant out there who would risk their business to stand up to a NSL or a subpoena.

...

That is what I am saying. It all gets encrypted before it goes out and comes in through Tor while adding some buffer.

Yes, but at either end of the Tor network, the data is unencrypted. Connecting to a VPN on either end of the relay is just asking for trouble.

while I appreciate any attempt to combat this shit, is this really effective? none of the sites in the top websites list is suspicious and can be safely sliced away from your log, same for the search results

this is how it works. You need end-to-end encryption like https to make the red connections safer.

>Spend hours looking at VPNs because of this snooping shit
>Still not sure who to use

Considering AirVPN fort now. Seriously though this is fucking stupid and all they're going to do is cause a huge spike in VPN usage.

that isn't how VPNs work..

(You)---(VPN)---(TOR)---(X)

Try again, kid.

Good, you deserve it.

>Welsh Ambulance Services National Health Service Trust
>Fire and rescue authorities under the Fire and Rescue Services Act 2004
What kind of terrorist threats can they prevent by accessing a brit's porn browsing history?

>vpn at end of tor route

Uwot m8?

Fire and rescue authorities wants to know because they got the meaning of fire crotch wrong.

Please please please don't slow down the network by using tor to do things that you don't need privacy for. That's just a massive fuck you to the people who built and maintain the system and to those who actually have a use for it.

Only use your Internet for basic things...like youtube, gaming,banking and etc.

Buy tablet, make up a new identity, use for private use... like Sup Forums, reddit....well anything not being used for sending grandma recipes. Use public networks as much as possible under new identity.

The spying eyes run tens of thousands of instances of the onion router. Tor is compromised. Freenet is identifiable, i2p is under used, zeronet is pretentious.

you can put a VPN on either end, to hide from your ISP that you're using tor(surveillance) or to hide from sites that you're using TOR(tor ips may be banned)

see

Porn is just another excuse for this law, if you think they care about people jerking off to porn then you are wrong.
It's just an easy way to get these laws through

Wouldn't using https stop the government from seeing your web history? They would see the domain that you're connected to but not the specific pages? eg they could see you visited youtube.com but not which specific video?

Please stop with the FUD. If that were the case, then it would have been exploited years ago by the FBI. Instead they're forced to pay millions of dollars for Firefox exploits in the hope of busting half a dozen pedos. Or in the case of SR, it takes a months-long investigation to bust a single Tor hidden service.

That's absolutely absurd. The cost simply doesn't outweigh the incredibly small benefit. If you're concerned with your ISP knowing about your Tor usage, then use bridges, they're very easy to setup and get around even the great firewall of China. Alternatively, you can setup your own private bridge if you are really worried about your ISP logging your Tor usage. There is simply no practical benefit to using a VPN with Tor.

Of course not. They can see every full URL you have visited, HTTPS doesn't stop that. It just means they can't easily eavesdrop on the contents of that page

The full URL is hidden from your ISP under HTTPS.

That's incorrect. The SSL connection is between the TCP layer and the HTTP layer. The client and server first establish a secure encrypted TCP connection (via the SSL/TLS protocol) and then the client will send the HTTP request (either GET or POST) over that encrypted TCP connection.

So how do I create a privacy bridge?

It's not a privacy bridge, it's an obfuscation bridge. There are hundreds available through Tor.org, but you can create your own and not list it so that only you can connect to it.

torproject.org/docs/bridges