Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
11 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Hello those interested in Intenet stealth... (Original Post) defacto7 Nov 2014 OP
This message was self-deleted by its author guyton Nov 2014 #1
Definitely not the point defacto7 Nov 2014 #4
My grandmother is using Tor. L0oniX Nov 2014 #2
Sure, why not? defacto7 Nov 2014 #6
81% of Tor users "in the wild" can be deanonymized. sir pball Nov 2014 #3
Interesting article defacto7 Nov 2014 #5
I meant to replay to your post but didn't defacto7 Nov 2014 #8
How about an update about the "deanoymizing" article... defacto7 Nov 2014 #7
Is Tor free? GOLGO 13 Jul 2015 #9
It's a self-contained app. sir pball Jul 2015 #10
tor is good...but w0nderer Aug 2015 #11

Response to defacto7 (Original post)

defacto7

(13,485 posts)
6. Sure, why not?
Sat Nov 22, 2014, 03:16 AM
Nov 2014

It's not that there something to hide, it's that privacy is slipping away and we need to take it back. There is no place in a civil society for special levels of authority to have a dossier on it's citizens. The word Stazi comes to mind. It's all about freedom and having the choice of privacy where the people choose and the we have no secret rulers.

Kudos to grandma.

sir pball

(4,739 posts)
3. 81% of Tor users "in the wild" can be deanonymized.
Fri Nov 21, 2014, 01:40 PM
Nov 2014

Traffic analysis has been an identified attack against Tor since its very earliest days; a researcher in Delhi has over the last six years worked out a reliable, low-resource method for identifying users.

http://thestack.com/chakravarty-tor-traffic-analysis-141114

defacto7

(13,485 posts)
5. Interesting article
Sat Nov 22, 2014, 03:09 AM
Nov 2014

It seems to be full of facts that no one but those who publish this site know anything about. The prop war is on. There was a breach recently that was published as the deanonymization of 400 illegal sites. The facts showed it was 23 and several of those had nothing to do with the sting, the FBI just wanted the computer of a law abiding TOR node owner. There is quite a concern about even the 23 (or less) that were uncovered but it is becoming clear by FBI statements that the only way they were able to enter those nodes was that those nodes were not following TOR procedures for security, so basically it was likely the fault of the node owner. It's being researched but the article you posted just sits alone among a lot of false propaganda going around. If I find that public non-profit information leads to the conclusion that your article is factual, I'll take it all back. But this definitely does not convince.

defacto7

(13,485 posts)
7. How about an update about the "deanoymizing" article...
Wed Nov 26, 2014, 04:21 AM
Nov 2014

As usual twisting the facts are the name of the game these days...

https://blog.torproject.org/blog/quick-summary-recent-traffic-correlation-using-netflows

While it’s great to see more research on traffic correlation attacks, this is not a new area of research. This is one study on the subject in a controlled environment using one readily available traffic monitoring technology to analyze Tor traffic. The researcher has clarified in the media that it was only 81.4 percent of their experiments not “81 percent of all Tor traffic” as has been reported elsewhere.


sigh...

GOLGO 13

(1,681 posts)
9. Is Tor free?
Tue Jul 21, 2015, 09:13 AM
Jul 2015

Easy to use? I'm no "power-user", so if it requires me to deal with "command line" gymnastics, then it's just not for me.

w0nderer

(1,937 posts)
11. tor is good...but
Mon Aug 17, 2015, 03:53 AM
Aug 2015

tor / vidalia
plus read the manual of tor..very important(javascript for instance can mess you up) so a properly set up brower
i prefer a vpn as well
then i use shell accounts (not graphicals) so

ssh via tor over a vpn
sure...you COULD track it ...eventually


the second thing is red herrings
like all security red herrings are crucial

encrypt your important files
i'll beat you up till you hand them over
encrypt important + other files
how will i know?


paranoia....it's a way of life not a disease

Latest Discussions»Culture Forums»Open Source and Free Software»Hello those interested in...