Comments (18)
sorted by:
3
Illuminaughtie 3 points ago +3 / -0

nothing is safe from them.....unless you are important or part of the democrat machine

2
jus74funpa 2 points ago +2 / -0

TOR isn't safe, especially if you just happen to be an exit node. It was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online.

0
TownesVanCamp [S] 0 points ago +1 / -1

At least it’s an unchecked source for web access.

1
jus74funpa 1 point ago +1 / -0

Really? Tell that to the person who started the Silk Road on TOR who is currently serving multiple life sentences for just writing code. Nothing is private..especially something that is pushed as being private..

0
TownesVanCamp [S] 0 points ago +1 / -1

I knew Ross vaguely, from the university of Texas. He hired a hit man. Yes you can still be caught if you are breaking laws I’m not talking about using it to start a revolution. I am talking about using it so that we can have at least a modicum of free speech. It is going to be our last refuge of information.

2
deleted 2 points ago +2 / -0
1
deleted 1 point ago +1 / -0
1
deleted 1 point ago +1 / -0
0
TownesVanCamp [S] 0 points ago +1 / -1

Thank you, are pastrbins the best way of navigating? I’ve in the past tried tor search engines in the past. They sucked ass

2
torrc 2 points ago +2 / -0
  1. Just download a tor browser. The default setting will route your traffic through tor

  2. Tor provides anonymity, not security

  3. With enough time anyone can trace your tor network back to you

  4. I suggest signing up for protonmail, they will provide you a free VPN service. Protonmail is based in Switzerland and their motto is privacy above all else. As of right now I suggest using their VPN rather than those you see being marketed around because truthfully, your data is being stolen one way or another, why pay for it to be stolen.

0
TownesVanCamp [S] 0 points ago +1 / -1

I’ve been using proton since they were passing out tokens for downloads years ago.

2
10R1440 2 points ago +2 / -0

Other options:

https://geti2p.net/en/

https://freenetproject.org/pages/about.html

i2p is like tor.

Unlike both of them, Freenet doesn't interface with the www at all.

2
GaryJackson 2 points ago +2 / -0

I'm actually taking a Cyber Security class right now for logistics.

Think of digital warfare like a medieval siege.

Tor and VPNs are like a hidden tunnel into and out of your fortress.

Encryption software and authentication is like a system of locks, keys and door bars

Your fire wall is the fortress wall.

Anti-virus is like a garrison or guards that are supposed to kick out intruders but (usually) fail.

Cyber security is actually really rudimentary and primitive. I would highly recommend reading http://aeneastacticus.net/ Aeneas Tactitus' treatise on siege warfare and design to help you.

I would also create false folders with files that trip your anti-virus software. These will act as trenches which an invader could trip into when storming your system.

1
thallos 1 point ago +1 / -0

No you just download TOR and start using it. Basically it joins a network and there are a bunch of "exit nodes" which makes it sort of like a VPN. It will randomly pick one each time you use it. You can press a button in a menu to swap exit nodes if you need to.

I wouldn't recommend planning a revolution with it, nsa / fbi etc have it but use it for browsing the web where you want your identity masked at least somewhat.

1
GaryJackson 1 point ago +1 / -0

I would be careful. The FBI knows about Tor. To my knowledge while they can look up that you've been on Tor they can't look at what you were looking at. I think that in the off chance they can trace things back to you they can only gather METADATA which is the big picture of your data but they would basically have to give that to an information analyst and even then it would take them too long to break down that data and store in in their own database that it would be ineffective evidence in a hearing.

1
debacle 1 point ago +1 / -0

Tor is compromised. Without properly securing what you're doing your traffic is way more visible than not using Tor at all.

0
TownesVanCamp [S] 0 points ago +1 / -1

This is why I ask someone who knows how to set it up to provide insight. Even a link to quality information.

2
debacle 2 points ago +2 / -0

If they want to find you, they will. Remember that. You can use a VPN, even a foreign VPN. They will fingerprint your browser.

If you want to be untraceable, you need a second device that can only connect to the VPN before accessing the Internet (meaning everything else IP4/6, DNS, etc is hard blocked). It needs to have Linux installed on it after a hard wipe. You need to block the camera + microphone completely.