Tor, vpns and gbi

Dont want to get haxed by fbi just for opening tor or using a vpn but i also dont want the nsa or fbi to know how many times i took a shit today what do?

Other urls found in this thread:

en.wikipedia.org/wiki/Australian_Security_Intelligence_Organisation
extremetech.com/internet/180485-the-ultimate-guide-to-staying-anonymous-and-protecting-your-privacy-online
whonix.org/wiki/Comparison_with_Others
torproject.org/about/overview.html.en
youtube.com/watch?v=dD0_gq_ugw8
twitter.com/NSFWRedditGif

Stop namefagging

i just wanted to look kewl senpai :(

Install Solus

>what do?
unplug yourself

Op here aus fag btw memes aside what can i do to not be the fbi's bitch

>what can i do to not be the fbi's bitch
commit yorself to prevent them from using you as a puppet

>aus fag

outside the fbi's jurisdiction, but I promise you the NSA has a full record of your shitposting + all the porn you watch.

Yeah but still they hack pcs all around the world and also i dont want the nsa to see mah porns and the new goverment snooper thingy what tor alternitives do i use or should i just wait it out somehow, what the hell is going on i want to go back to 2005 :(

Unplug your internet.

>aus fag
>fbi
en.wikipedia.org/wiki/Australian_Security_Intelligence_Organisation

Anyway, Tor's fairly robust.

they're already watching you

What about using a empty pc that was built when windows vistah cane out eould dat helrp

with tails?

Tor is secure.

The people that use it are not.

How tor works is it stops your computer from leaking information about itself, but it does not stop you from leaking information about yourself.

this desu

is tunnelbear a good vpn for PC/android use? looking for the cheapest way to cover my phone and laptop at the very least.

>get haxed by fbi just for opening tor or using
Which shithole you live in??

Tor is a botnet.

New US law that comes into effect Dec 1 makes everyone susceptible to search warrants for using TOR.

Or VPN

>Tor is a botnet.
People have been claiming that since it came out, and none of them have ever come up with any solid evidence.

>New US law that comes into effect Dec 1 makes everyone susceptible to search warrants for using TOR.
Given they've repeatedly demonstrated they consider search warrants to be optional anyway, that's not really much of a threat.

Should I?
Redpill me Sup Forums

...

>t i also dont want the nsa or fbi to know how many times i took a shit today what do?
1. Stop namefagging
2. Stop using social medias
3. Install gentoo

lifetime = average 24 months
when you are a vpn degenerate, the cia niggers will administer suicide encouragement

Not if the node you connect to is compromised or malicious.

>not getting the aus fag joke

Well hello there, Yulya

People don't get busted for opening tor.
They get busted from allowing java shit to be installed while browsing kiddy pr0n.
Stick to tails and common sense and you should be fine.

>ublock on tor browser

What type of node? There's a difference.

What you fail to understand is that EVERY node you connect to has to be FULLY compromised to deanonymise you reliably.

Eh, not really. The node just has to be monitored. Tor is a low-latency network, so timing attacks could deanonymize the entire network if the whole network is being monitored.

Idk if you're still in the thread or not, but generally it's not a good idea to skimp on VPN service. When you buy a VPN, you're replacing your ISP with the VPN as the weakest link in your browsing. The VPN you purchase can easily monitor your Internet usage, so it's important to pick a well-vetted, trustworthy provider.

Kevinnnnnnnnnnnnnnnnnn

If the entry node is compromised, you're fucked though, right?

19 ways to stay anonymous and protect your online privacy
extremetech.com/internet/180485-the-ultimate-guide-to-staying-anonymous-and-protecting-your-privacy-online

Not that user, but a comprised entry node would only give away your IP address, it wouldn't know the content of your traffic or where it came from.

>recommending ghostery

Qubes+Whonix is more secure

>Qubes

monica

I think I need to read up on how this works. I'm clearly not thinking right either. I for some reason thought that client -> entry node was encrypted but in a way that the entry node could decrypt

>Qubes+Whonix is more secure
I've seen this thrown around alot whats the reasoning behind it

whonix.org/wiki/Comparison_with_Others

Their website has a lot of information.

torproject.org/about/overview.html.en

fbi/nsa already /marked/ you because of this post OP. they're already inside your shit.

Heres a vid that does a good job of explaining how it works

youtube.com/watch?v=dD0_gq_ugw8

>already inside you
i wish.

UK just cucked itself deeper into becoming Big Brother: The country
Can someone rec me a decent babies first vpn?

I don't think he meant it as in "hur dur i hate tripfags" but if you don't want to be tracked, why use one?

How does the final node decrypt what is sent to Jane?

Is TOR backdoored?

It doesn't, but the final node doesn't know where the traffic came from. You can, and should, use HTTPS to protect your data from malicious exit nodes.

Not as far as we know. As of 2013, we can be sure it's not back-doored because of the internal documents leaked by Snowden. We can use circumstantial evidence from recent FBI raids to show that law enforcement still relies (at a ridiculously unsuccessful rate) on bugs to break Tor.

So how does the destination server end up with an unencrypted, by-any-given-tcp-service-interpretable request?

I just have this idea in my head that surely, Alice and Jane would have to have a shared secret.

Jane doesn't know the secret, Jane only has the address to the exit node. The exit node can decrypt the packet enough to know it's supposed to be sent to the middle node, but that's all it knows. Then it encrypts the contents and sends it to the middle node. The middle node knows to send the information back to the entry node, but it doesn't have the key to decrypt the contents. Then once the entry node gets it, it sends it to your computer where it's decrypted. This is how your computer receives data from a web page.

The network uses multiple layers of encryption to ensure that at no point in the network does the network know both who is requesting the content and what the content is. This is where it gets the name The Onion Router.

But how does it work the other way around? How does the exit node send data to Jane?

I understand your explanation of how data goes from Jane to Alice though.

The exit node sends data to Jane just as a normal server would. Where the request is coming from is obfuscated completely from Jane.

I must be confused on what is an entry/exit node then.

The request you're talking about is coming from a Tor node that is not Alice, but makes a TCP request to Jane, right? Jane is just any given clearnet server, right?

That's correct.

The entry node is the node closest to the person running the Tor browser and the exit node is the node that connects to the clearnet or a Tor hidden service.

So how does the exit node not know content and destination? Granted, it won't know origin, but then how does it decrypt the content, if it didn't get a secret from Alice? I understand that if it got a secret from Alice, it'd know that Alice is the originator of the request, giving the exit node the ability to listen in on specific targets, so that's not what's going on.

Perhaps my example confused the topic.

When data is flowing from Alice to Jane, the exit node only knows that it got a request from the middle node and the contents of the request. When going from Jane to Alice, the exit node knows the content of the data it got from Alice and it knows the data is going to the middle node. Before it is sent, the data is encrypted so that the middle node doesn't know the contents. The contents arent decrypted until they reach Alice's computer.

>When data is flowing from Alice to Jane
Going to break this down into parts so I can figure out what I'm not getting
>the exit node only knows that it got a request from the middle node
As such it doesn't know that Alice made a request. So far, so good.
>and the contents of the request.
How? This is the part that I don't understand.

Am I maybe confused on how TCP works? Does a normal, non-TOR TCP request from Alice to Jane over clearnet cause Jane to respond, invariably? There's no such thing as Alice merely doing something like a simple, short keepalive message as one might with UDP?

I'm really sorry if this is like explaining to a brick wall.

I don't think my question has been answered in this thread. I almost started one, but
>Catalog

So I've been reading up on VPN services to find a trusted one.

So far I've come across a few different things that I'm trying to find out about different VPN services.

NOW. JUST TO MAKE THIS CLEAR. I'm not trying to do anything like ILLEGAL illegal. Just you know. Copyright infringement. I'm not even trying to upload torrents. Fuck half the time I dont even seed. :(

Just because the provider advertises "NO LOGGING" doesn't mean they don't log info. From what I've read, in order to efficiently run a datacenter, they basically need to log certain info about usage. I guess it's necessary to not only know certain things about the users to accommodate sufficient bandwidth or something, but also to spot abuse of the service.

My concern obviously lies with the company's interpretation of the word ABUSE.

Also, even though the VPN provider has policies agreeing with my needs, doesn't mean my privacy still can't be violated.

If the provider doesn't own the actual hardware running the service, the "landlord" they rent the time/space from can still collect some key data that could lead to being identified.

A while back, maybe years, the pirate bay advertised for a VPN called FrootVPN. I immediately got it without any research on them because
>TPB

Im fairly certain that they rent server space from a company called Portlane AB or Port Lane or Portlane. (At least for their sweden based server) Not sure on the exact registered name of the company but you get it.

I'm also fairly sure that the pirate bay used their servers for their site.

Now, I started using froot after TPB servers got jacked by the 5-0 back in 2014??? They might have been on a different server than tpb because I assume the police can't just take everything you own from your company. So I'm not worried or whatever.

What worries me is that I think Portlane got sold sometime around 2015 or so and is under new administration or something.

I just want to know the new owners reputation as far as privacy is concerned and what their policy is on the amount and type of data they log in they systems.

Should I be worried about them? From what I've read, all the policies seem kind of vague for both frootvpn and Portlane. Which to me seems odd in this day and age.