What are the most needed addons for the TOR browser? I have ghostery...

What are the most needed addons for the TOR browser? I have ghostery, but don't know what else I should be using for convenience or security purposes.

Other urls found in this thread:

arstechnica.com/tech-policy/2017/03/doj-drops-case-against-child-porn-suspect-rather-than-disclose-fbi-hack/
news.softpedia.com/news/riffle-our-anonymity-network-is-better-than-tor-says-mit-506231.shtml
torrentfreak.com/vpn-providers-no-logging-claims-tested-in-fbi-case-160312/
en.wikipedia.org/wiki/Honeypot_(computing)
twitter.com/SFWRedditVideos

ghostery sells data, do not use
also don't install random addons, they can leak data

You shouldn't use add ons in the Tor browser you fucking retard.

>What are the most needed addons for the TOR browser?
None. Tor was meant to be used as-is, without any potentially risky additions.

I like that one Stylish addon with themes and usually soke gamebaddons because there are gardlybany games on tor

Google Translate extension for those situations when you visit russian arm smuggling marketplaces.

It's not that the additions are risky, it's just that it gets reported to websites what add ons are installed. You want to blend in with other Tor users, not stick out by being the only retard to use some retarded add on.

This is bait

Exactly.

block all javascript so they can't detect your addons, problem solved

uBlock Origin and uMatrix. Remove NoScript and HTTPS Everywhere, they're useless.

Do you guys run Tor on your base system or in a VM?

Host ofcourse, why would you run it in a VM?

Keep it contained.

And now you stand out as a user who disables javascript.

Which honestly isn't particularly meaningful, but using ghostery on the tor browser makes you retarded

8/8

Yes goy and don't use tor, incognito mode will work just as well.

>stand out cause you block javascript
yeah nah, some sites sites will just think you're one of the billions of crawlers/bots that request info and maybe have you input a captcha, that's all

First of all
>Don't use TOR
It has been compromised a long time ago
Get i2p nigga

It only sells data if you say yes to all those questions when you set it up. You're right about not installing random addons. It just increases the attack surface.

Literally never listen to Femanon. If she's not from a three letter agency she's just off the scale retarded.

You may want to read the complete post before responding.

I thought tor now blocks javascript by default. The creators even recommended blocking javascript because it's really easy to use that to identity users.

WTF, lol

yeah nah, the correction stands

>doesn't know it is Tor not TOR
>calls it compromised without providing a source

You seem educated on the matter.

What? I said you don't need NoScript which is inferior to uMatrix and HTTPS everywhere is redundant these days.

Yes JavaScript is blocked by default because it's dangerous as fug, Java drivebys by RuneScape baiters can put a rat on your PC so just imagine what the CIA or NSA are capable of

It might be. There was the recent case where the FBI dropped a ton of child pornography charges in order to keep however they found these people a secret.

Are people literally retarded?
What the fuck, Sup Forums.

doubt.jpg

>not using a VPN service to connect to your VPS running OpenVPN to connect to the real server you flew to Russia and hid in a utility box that's stealing wifi from the surrounding area and then connecting to tor
>2017

...

the way they can get you through tor is by profiling your browsing habits

if you visit the same three onion sites every time you login they are going to have a good idea who you are if they want to perform a heuristics analysis on the exit nodes they run

>he doesn't bounce his internet off the moon

arstechnica.com/tech-policy/2017/03/doj-drops-case-against-child-porn-suspect-rather-than-disclose-fbi-hack/

Decide for yourself.

>Protecting your privacy
>Google
pick one

thatsthejoke

Have fun being uniquely identifiable. You even mentioned you solely use Russian nodes for entry and exit. You couldn't make it easier for anyone to solely identify your traffic. lolz

you are one of like 3 people in the world with that browser fingerprint

while you're at it you might as well set your window size to something retarded like 1337 x 1337 pixels so they'll pick you out for sure

That looks niiice (:

>You even mentioned you solely use Russian nodes
I doubt. I even showed my torrc config. I clearly don't "solely use Russian nodes".

I know fons and plugins affect your fingrprint, not extensions. Window size is usually 1280x1410, as that's the size when I dock it on side.

>Window size is usually 1280x1410, as that's the size when I dock it on side

needs moar open shelving

??

when will you post a pic of your hand?

Why do you even use Tor? You're as unique as you can be.

NEVER
NEVER
NEVER

resize the default tor browser window

even on the hardened tor browser

>using tor
>swapping out the default extensions
>resizing the window
>visiting non-onion sites

jesus christ just kill yourself already

Oh yeah, I should have said solely Russian and Ukrainian nodes.

You suffer from Dunning-Kruger effect. You're either a troll or a complete moron. I think the latter.

This^

Femanon goes against all the advice of the Tor developers themselves regarding usage.

With all those Sup Forums-tards around you cant be sure anymore these days

No one (three letter entity) has any interest of following me throughout Tor network. But no site owner could associate my Tor session with my regular one. I don't need more than that.

Well, sucks. I'm not going to browse on this. It's too narrow.

Ahahahah, no

Right.. I don't see you following me anytime soon..

>No one (three letter entity) has any interest of following me throughout Tor network. But no site owner could associate my Tor session with my regular one. I don't need more than that.

what you need is a shared VPN

DO NOT VISIT NON-ONION SITES WITH TOR

FOR THE LAST FUCKING TIME

EXIT NODES WILL SNIFF YOUR PLAINTEXT DATA

>Right.. I don't see you following me anytime soon..

This is irrelevant and also not an argument. You go against the warnings of the tor developers themselves. Little knowledge and lots of arrogance = Femanon.

Idk, I've been using it for years. I do have OpenVPN set up too though. I still need two (or more) different identities at once. Tor is able to do that.

Why?

>go to onion site
>oh this is the only user blocking this specific piece of script/IP
>oh this is the only user not blocking this specific piece of script/IP

>I've been doing something stupid for years so that makes it OK

Wow. Femanon once again proved to be the most retarded user Sup Forums has ever known. The sad thing is she could have been on the same level as everyone else right now if she would have actually listened to the advise she got here in stead of attentionwhoring and trying to safe face as a namefig.

Experience beats theory.

>Experience beats theory.

omfg how fucking delusional. i believe you are a woman now.

What if you use a VPN?

No, I clearly remember you saying you only use russion nodes. You're a fucking retard one likes you here.

that question doesn't have enough information

if we're talking vpns we've entered an entirely different realm of possibilities

>anecdotal evidence beats empirical evidence

no one*

If I use a VPN and then connect to Tor is it safer then just connecting directly?

You remember wrong. See I think you don't understand those words very well.

in 99% of scenarios this method is less secure than just using tor directly

but it ultimately depends on your threat model

How?

...

Because it has to be assumed from a cogent security model that the VPN server is logging your activity

Can I browse Tor while logged on my google account?

Great. now back to the subreddit you crawled from.

Use Riffle

news.softpedia.com/news/riffle-our-anonymity-network-is-better-than-tor-says-mit-506231.shtml

Yes, but why would you do that? Google is the master botnet.

I see but some genuinely don't keep logs.

To upload videos on my youtube channel

What If I globally block all scripts?

>I see but some genuinely don't keep logs.
>genuinely

there is no way for you to know that

this is what happened to hidemyass

they claimed they didn't log anything, government came a-knockin' and WOOPS! it turns out they did keep logs of everything.

And why would you do that? Tor even configured in a way to make it faster is still slow.

Screens resolution can be determined even without JS. If you care enough, don't resize it.

how does it make you feel to know that you're this retarded?

You have to be trolling at this point

The reason to use the default plugins is because it does not allow you to be individually fingerprinted among all of the other Tor users

changing which scripts you block and don't block by fucking with the default plugins just singles you out from the crowd

All of this stuff is literally on the tor website, I don't know why you keep bothering us with it.

Here's what I don't get: if a VPN claims to not keep logs, what benefit is it to them to lie and actually keep the logs? What am I missing?

Because they can sell it. Are you asking why someone would want easy money?

One reasonable answer is incompetence. Another is that the VPN might be a honeypot. Or they are trying to profit off the data. Who knows. All I know is that it has happened in the past and it's very likely happening right now.

>profiting off the data

How much could they possibly make from this? Google, Microsoft, etc. could make a shit load because they have many millions or even a billion users. How many does a medium sized VPN have? Thousands, if that? Is it worth risking your business over it? I don't think so.

Jesus you are insufferable

Who knows

That's the fucking answer right there

Can you vet it? No. OK, it has to be considered insecure from a security protocol.

It's likely they aren't trying to profit from it directly right now. It could just be a honeypot. Maybe they will use it for an exit scam. Maybe they will use it to blackmail their users.

I don't fucking know because I'm not a diabolical asshole selling user data on the darknet

But I know that type of data is there so SOMEONE is doing it. I also know other highly touted VPNs have been caught storing user data and logs. It only makes sense that others are doing it as well.

I'm not sure why anyone would take advice on my being anonymous by someone who goes out of their way to not be anonymous and a Vietnamese sewing board.

I read that PIA were confronted and they couldn't give over anything because they didn't store anything.

Its true what you said though.

I always thought it would be harder for a hacker or something to get your IP if you have a VPN.

>I read that
You sure did

"hacker" is such a useless term. the question is WHO is hacking you and HOW MUCH MONEY do they have?

All of these security measures have pros and cons depending on your threat vector

Tor falls under the "I will be locked up by the government" vector so anything that you put between you and Tor is an additional risk

If your goal is to avoid website tracking then a vpn might be a suitable compromise

If you don't trust your ISP then the question comes down to: do I trust my VPN MORE than my ISP?

If you are trying obfuscate activity on the clearnet then you have to assume that your VPN is safe and use a shared IP pool for plausible deniability

if you are using tor you have to worry about the exit nodes parsing your data

you can run tor->VPN but in that case your VPN is still the weak link

You can run your own VPN on a VPS host but then the question comes down to...do you trust your VPS host?

there's not a one-size fits all answer

>based on firecucks
you should just google chrome with vidalia, at least you haven't a shitty browser. :^)

>google chrome
>tor

> And now you stand out as a user who disables javascript.

please educate yourself before posting your garbage

>do I trust my VPN MORE than my ISP?

I don't see why anybody wouldn't, seeing as how you can't trust your ISP at all. They log everything and never tell you otherwise.

Oh, so you don't have any idea what you're talking about. Got it.

torrentfreak.com/vpn-providers-no-logging-claims-tested-in-fbi-case-160312/

I do trust my VPN more then my ISP. Comcast fucking sucks.

>But still, the big question remains: how can a prospective customer be sure that their VPN provider really keeps no logs? In reality the answer to that question is largely a matter of trust, weighed up against the goodwill the company has built up over its time in business.

>(((tested))) FBI case
Yes goy, it's totally safe, see? Even the FBI can't get to them, haha!

en.wikipedia.org/wiki/Honeypot_(computing)