What's new

TOR, Anonymous Proxy Server or Something Else?

Macola

New member
Some of my comments.

Fuzz420, using a VPN always involved a trust factor. How do you know how good is their security, how do you know it isn't a sting, how do you know they don't co-operate with LE, ... For me personally it's not worth the risk especially since we have TOR.

schwilly, TOR rotates nodes and randomly connects to the next one so it's practically impossible someone would own your whole "path".

Mukind, if I remember correctly, drogen-forum.de (forum just like this one, just with focus being on other drugs) was raided a few years back. Or this
833314
bloke. Phelps example isn't really the best since he is extra famous, you can smoke anything in a bong, and getting evidence for that past event would be impossible.

wdcf, hushmail is snitch mail. Use encryption for sensitive matters. I can write up a PGP tutorial if desired.

Standard recommendations for TOR browser are that you turn off Java Script and, more hardcore mode, to run it from a snapshot in a virtualization software. Potential attacker can then only access the sandbox environment.

GP73LPC, sorry for derailing your thread. I would be OK with just TOR or a trusted VPN+TOR but not just VPN.
 

GP73LPC

Strain Collector/Seed Junkie/Landrace Accumulator/
Veteran
thanks macola, more information is good information in my book...
 

bootea

Member
Tor with HTTPS everywhere

Tor with HTTPS everywhere

I think it makes sense to use Tor in conjunction with https security encrypted service, especially the HTTPS Everywhere version that is sponsored by the Electronic Frontier Foundation in cooperation with the Tor Project. The design of the Tor system requires the last hop from the final proxy relay be unencrypted to the destination site. With HTTPS Everywhere that last hop is encrypted all the way from your computer to the destination.

I like Macola's suggestion of running it all in a virtual machine. Thats my next step to investigate for a deeper mode of anonymity.
 

wdcf

Active member
Some of my comments.

Fuzz420, using a VPN always involved a trust factor. How do you know how good is their security, how do you know it isn't a sting, how do you know they don't co-operate with LE, ... For me personally it's not worth the risk especially since we have TOR.

schwilly, TOR rotates nodes and randomly connects to the next one so it's practically impossible someone would own your whole "path".

Mukind, if I remember correctly, drogen-forum.de (forum just like this one, just with focus being on other drugs) was raided a few years back. Or thisView Image bloke. Phelps example isn't really the best since he is extra famous, you can smoke anything in a bong, and getting evidence for that past event would be impossible.

wdcf, hushmail is snitch mail. Use encryption for sensitive matters. I can write up a PGP tutorial if desired.

Standard recommendations for TOR browser are that you turn off Java Script and, more hardcore mode, to run it from a snapshot in a virtualization software. Potential attacker can then only access the sandbox environment.

GP73LPC, sorry for derailing your thread. I would be OK with just TOR or a trusted VPN+TOR but not just VPN.

Good Knowledge, Thank You
 
Everyone should be running TOR on a virtual machine running off a usb stick. Theres many detailed write ups on how to do this just do a search.
 

Browser

H8ters gonna h8
ICMag Donor
Veteran
Hi,

I'm relatively new at this, been playing with TOR lately. My main problem is that it keeps logging me out of ICmag... I gotta log in again every 10-15 mins, which is a real hassle.

Anyone has any idea of why this might be?

Thanks,
:tiphat: B
 

GP73LPC

Strain Collector/Seed Junkie/Landrace Accumulator/
Veteran
your ip addy is consistently being changed in the TOR network. that's why you have to re-logon... a real pain in the ass when you already have very slow internet...

i have to logon and then logon again to get to 'MY IC' because my shit is so slow. or type my response out, and logon again to post :cry:
 

Ruosk

Active member
Everyone using TOR, remember to disable flash, java etc as they can and will leak your identity. Would be good idea to set up Truecrypt with dual boot, one side for normal use and other for anonymous browsing and such, then go through TOR or (/and) VPN with stripped browser (and Linux distros), there are some that are written and configured with privacy in mind. Not that most people would need this kind of security, but if you are dealing pot / other drugs / seeds it might be a good idea.
 

foaf

Well-known member
Veteran
except for the nominal yearly fee... a paid vpn proxy is much faster and more reliable than tor. instead of relying on safety coming from proxy servers that you know absolutely nothing about, you rely on a proxy servers rented to you by a company who makes its money keeping your identity secret. blacklogic is the current industry standards. servers all over the world to choose from. worth every penny.
 

GP73LPC

Strain Collector/Seed Junkie/Landrace Accumulator/
Veteran
when i can afford that ^^^^^ i might consider...

what's the annual cost?
 

foaf

Well-known member
Veteran
$8 a month. its fast and reliable enough to use if for torrents and not worry about any copyright police finding you.
 
except for the nominal yearly fee... a paid vpn proxy is much faster and more reliable than tor. instead of relying on safety coming from proxy servers that you know absolutely nothing about, you rely on a proxy servers rented to you by a company who makes its money keeping your identity secret. blacklogic is the current industry standards. servers all over the world to choose from. worth every penny.

Not worth a single penny IMO if you're an American, all due respect.

Patriot Act-sanctioned provisional bypass requires zero signatures. Just a hunch from an agent who you somehow managed to piss off is more than sufficient for the feds to get to snooping under the guise national security (and there is a long history of using this cover to investigate drug cases. Ask your attorney, he'll back me).

And no, you don't have to be the center of some huge criminal investigation for an agent to snoop ur shit. There is a plethora of reading one can do on this topic on the DOJ website. Agents E-snoop on hunches from random shit regularly.

In other words, if somebody affiliated with LEO at the federal level wants to see what you're up to, they will very easily sidestep a few noob proxies.


Fooling around with tor et al is a complete and utter waste of time, unless your concern is simple IP hacking via civilians who you manage to piss off on forums or something. For serious govt stuff it's useless.


I would normally do more linking and make less claims without evidence, but I am tired and it's late. You can easily find all this out online.
 

foaf

Well-known member
Veteran
The recent arrest of the head anonymous hacker took place because just once, he accidentally posted on a forum without his proxy. That's how they say the found him.

Worthless, you don't understand apparently. You choose from servers all over the world. I don't think a local over zealous drug agent is going to easily get discovery rights in china or Netherlands. What do you propose?

And you mis identify the likely threats.

Sure, if the feds single you out, you have problems. But if they single you out, you have already fucked up.

For example, when overgrow went down and everyone freaked out because the mounties had the servers and were examining them, if all of your posts were stamped with the ip address of a server in china, you really had nothing to fear. Turns out that not one person was tracked down through server logs ect anyway. We would have heard about it if they were.

And with a vpn, all of your communications from your box to the server, say in Netherlands, is encrypted. The feds cant magically break that, they wish that they could. So anyone hacking your local wifi, or a crazy person or dea set up at your isp, cant fish out what you are doing even if they want to.

And your point about a private person is important, because that's not an insignificant worry. someone hacking the server at icmag and then finding you from you ip address and blackmailing you.

the list of possible compromises that tor and a vpn protect you from is long. sure, if they target you as a terrorist or drug kingpin, they will get you.

and hiding your IP address, of course, isnt the only security measure people should take, its just the topic of this thread.
 

GP73LPC

Strain Collector/Seed Junkie/Landrace Accumulator/
Veteran
so in your opinion, an anonymous server in russia is just as safe as TOR.

and hiding your IP address, of course, isnt the only security measure people should take, its just the topic of this thread.

are you talking about online stuff? if so, please elaborate...
 

foaf

Well-known member
Veteran
I haven't used tor enough to be an expert, but from what I understand, properly used tor is just fine, there are servers all over the place, but there can be issues of speed and reliability that may be less of a problem than in the past. So, no, my understanding is that tor is quite effective.

And other online security measures that I think are important mostly center around keeping evidence off of your computer at the house. Possible drive encryption and at least browsing in private and using tools like ccleaner to try and safe delete temp files an cookies and such
 

Al Botross

Active member
ICMag Donor
Veteran
Looks like Authorities have CRACKED TOR

http://blogs.laweekly.com/informer/2012/04/ecstasy_sold_online_marijuana_farmers_market_bust.php

What if we were to tell you there was a place online where you could buy ecstasy, marijuana and LSD, no questions asked?

You'd say, Right on! (We know our readers).

Federal authorities, unfortunately, weren't as gung-ho about this particular operation, and today they announced that the so-called Farmers Market online drug bazaar has been taken down:


Gymeka Williams, a U.S. Attorney's Office spokesperson in L.A., tells the Weekly that the ring was taken down with the help of an undercover agent who "infiltrated" the operation in Los Angeles.

Eight people involved in the ring were arrested yesterday and today based on federal charges that they sold more than $1 million worth of illicit drugs through the online system to 3,000 customers in 34 countries and 50 states.









Ecstasy.



None of the defendants is based in L.A.

As part of the bust, feds seized "hashish, LSD and MDMA, as well as an indoor psychotropic mushroom grow, and 3 indoor marijuana grows," according to a U.S. Attorney's Office statement.

Authorities say the ring accepted PayPal for purchases (was there a customer satisfaction guarantee too?).

A two-year federal investigation brought down the scheme, which the statement alleges went like this:

The on-line marketplaces handled all communications between the sources of supply and customers. For these services, the operators charged a commission based upon the value of the order. Customers of the on-line marketplaces have been identified in every one of the states of the United States and the District of Columbia and in approximately 34 other countries ... The on-line marketplaces have multiple sources of supply offering various controlled substances, including LSD, MDMA (ecstasy), fentanyl, mescaline, ketamine, DMT, and high-end marijuana. Between January 2007 and October 2009 alone, defendants ... processed approximately 5,256 on-line orders for controlled substances valued at approximately $1,041,244 via the on-line controlled substances marketplaces.

Feds say the crew operated on the TOR network, which promises anonymity (guess not) through "a circuit of encrypted connections," according to the U.S. Attorney's statement.

Each of the defendants faces a charge of conspiracy to distribute controlled substance, which carries a possible life sentence, and money laundering, a 20-year offense.

United States Attorney André Birotte Jr., the federal government's top prosecutor in L.A:

Illegal narcotics trafficking now reaches every corner of our world, including our home computers. But the reach of the law is just as long ...

Read the federal indictment:

Willemsindictment Filed.045
 
Top