TOR isn't safe, especially if you just happen to be an exit node. It was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online.
Really? Tell that to the person who started the Silk Road on TOR who is currently serving multiple life sentences for just writing code. Nothing is private..especially something that is pushed as being private..
I knew Ross vaguely, from the university of Texas. He hired a hit man. Yes you can still be caught if you are breaking laws I’m not talking about using it to start a revolution. I am talking about using it so that we can have at least a modicum of free speech. It is going to be our last refuge of information.
Just download a tor browser. The default setting will route your traffic through tor
Tor provides anonymity, not security
With enough time anyone can trace your tor network back to you
I suggest signing up for protonmail, they will provide you a free VPN service. Protonmail is based in Switzerland and their motto is privacy above all else. As of right now I suggest using their VPN rather than those you see being marketed around because truthfully, your data is being stolen one way or another, why pay for it to be stolen.
I'm actually taking a Cyber Security class right now for logistics.
Think of digital warfare like a medieval siege.
Tor and VPNs are like a hidden tunnel into and out of your fortress.
Encryption software and authentication is like a system of locks, keys and door bars
Your fire wall is the fortress wall.
Anti-virus is like a garrison or guards that are supposed to kick out intruders but (usually) fail.
Cyber security is actually really rudimentary and primitive. I would highly recommend reading http://aeneastacticus.net/ Aeneas Tactitus' treatise on siege warfare and design to help you.
I would also create false folders with files that trip your anti-virus software. These will act as trenches which an invader could trip into when storming your system.
No you just download TOR and start using it. Basically it joins a network and there are a bunch of "exit nodes" which makes it sort of like a VPN. It will randomly pick one each time you use it. You can press a button in a menu to swap exit nodes if you need to.
I wouldn't recommend planning a revolution with it, nsa / fbi etc have it but use it for browsing the web where you want your identity masked at least somewhat.
I would be careful. The FBI knows about Tor. To my knowledge while they can look up that you've been on Tor they can't look at what you were looking at. I think that in the off chance they can trace things back to you they can only gather METADATA which is the big picture of your data but they would basically have to give that to an information analyst and even then it would take them too long to break down that data and store in in their own database that it would be ineffective evidence in a hearing.
If they want to find you, they will. Remember that. You can use a VPN, even a foreign VPN. They will fingerprint your browser.
If you want to be untraceable, you need a second device that can only connect to the VPN before accessing the Internet (meaning everything else IP4/6, DNS, etc is hard blocked). It needs to have Linux installed on it after a hard wipe. You need to block the camera + microphone completely.
nothing is safe from them.....unless you are important or part of the democrat machine
TOR isn't safe, especially if you just happen to be an exit node. It was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online.
At least it’s an unchecked source for web access.
Really? Tell that to the person who started the Silk Road on TOR who is currently serving multiple life sentences for just writing code. Nothing is private..especially something that is pushed as being private..
I knew Ross vaguely, from the university of Texas. He hired a hit man. Yes you can still be caught if you are breaking laws I’m not talking about using it to start a revolution. I am talking about using it so that we can have at least a modicum of free speech. It is going to be our last refuge of information.
Thank you, are pastrbins the best way of navigating? I’ve in the past tried tor search engines in the past. They sucked ass
Just download a tor browser. The default setting will route your traffic through tor
Tor provides anonymity, not security
With enough time anyone can trace your tor network back to you
I suggest signing up for protonmail, they will provide you a free VPN service. Protonmail is based in Switzerland and their motto is privacy above all else. As of right now I suggest using their VPN rather than those you see being marketed around because truthfully, your data is being stolen one way or another, why pay for it to be stolen.
I’ve been using proton since they were passing out tokens for downloads years ago.
Other options:
https://geti2p.net/en/
https://freenetproject.org/pages/about.html
i2p is like tor.
Unlike both of them, Freenet doesn't interface with the www at all.
I'm actually taking a Cyber Security class right now for logistics.
Think of digital warfare like a medieval siege.
Tor and VPNs are like a hidden tunnel into and out of your fortress.
Encryption software and authentication is like a system of locks, keys and door bars
Your fire wall is the fortress wall.
Anti-virus is like a garrison or guards that are supposed to kick out intruders but (usually) fail.
Cyber security is actually really rudimentary and primitive. I would highly recommend reading http://aeneastacticus.net/ Aeneas Tactitus' treatise on siege warfare and design to help you.
I would also create false folders with files that trip your anti-virus software. These will act as trenches which an invader could trip into when storming your system.
No you just download TOR and start using it. Basically it joins a network and there are a bunch of "exit nodes" which makes it sort of like a VPN. It will randomly pick one each time you use it. You can press a button in a menu to swap exit nodes if you need to.
I wouldn't recommend planning a revolution with it, nsa / fbi etc have it but use it for browsing the web where you want your identity masked at least somewhat.
I would be careful. The FBI knows about Tor. To my knowledge while they can look up that you've been on Tor they can't look at what you were looking at. I think that in the off chance they can trace things back to you they can only gather METADATA which is the big picture of your data but they would basically have to give that to an information analyst and even then it would take them too long to break down that data and store in in their own database that it would be ineffective evidence in a hearing.
Tor is compromised. Without properly securing what you're doing your traffic is way more visible than not using Tor at all.
This is why I ask someone who knows how to set it up to provide insight. Even a link to quality information.
If they want to find you, they will. Remember that. You can use a VPN, even a foreign VPN. They will fingerprint your browser.
If you want to be untraceable, you need a second device that can only connect to the VPN before accessing the Internet (meaning everything else IP4/6, DNS, etc is hard blocked). It needs to have Linux installed on it after a hard wipe. You need to block the camera + microphone completely.