10

Tor (The Onion Router)

Posted by jack1776 2 weeks, 4 days ago to Technology
9 comments | Share | Flag

This is for my comrades in the great socialist states of American.

How many people here know about Tor, or how it works?

https://www.torproject.org/download/

Tor is a step towards anonymity on the internet, obviously it’s not perfect and I understand that some nodes are run by the government. The way this system works is interesting. The browser encrypts your message and submits your data to a tor node, which encrypts it again and submits it to another tor node. The entry point can identify you and the exit point can identify the target host.

VPN isn’t anonymous, they all keep records and as soon as the heavy hand of government gets involved, they will happily surrender their records with a court order.

Of course, if you plan on doing anything truly nefarious, you will have to take additional precautions. Using a public network for communication away from your residents and cameras. Don’t use your own computer or phone, use an ephemeral environment with a random MAC address. Reset your ephemeral environment after use…

I have a feeling that if they steal the election that we will be truly dealing with people being prosecuted for thought crimes; I hope I’m wrong….
SOURCE URL: https://en.wikipedia.org/wiki/Tor_(network)


Add Comment

FORMATTING HELP

All Comments Hide marked as read Mark all as read

  • Posted by $ SpiritWoman 2 weeks, 3 days ago
    Seems to me to be all the many more 'places' censorship can have input. If the Tor program is used for an FBI or CIA or MI5 or MI6 operation. How do we know it's not?
    Reply | Mark as read | Best of... | Permalink  
    • Posted by 2 weeks, 3 days ago
      It’s distributed.... Each node you hit in between has no information about the source or destination, each node uses encryption keys that is unique for that stage. The entry node knows the source, you, but doesn’t know the destination for the package or the payload. The final node knows the payload and the target for the packet. The payload is typically SSL so only the source can decrypt.

      The minimum number of nodes to hit is typically three, entry, and exit nodes and a single hop in between.

      There are stories that the government has infiltrated this system, but they would have to have nodes at the entry point and exit and these can change in the middle of your communication. An ease dropper would have to have the source of the communication, the destination of the communication as well as the content of this communication. All three are encrypted independently making this extremely hard to circumvent. Its not perfect and can be compromised, this is why you should take the addition steps. Don’t use a network you own and use an ephemeral device, like Tails.
      Reply | Mark as read | Parent | Best of... | Permalink  
  • Posted by rhfinle 2 weeks, 2 days ago
    Thanks, Jack. That's good info. The hard part, it would seem, is to ensure that your entry point isn't compromised. I have no idea how one would do that.
    Reply | Mark as read | Best of... | Permalink  
    • Posted by 2 weeks, 2 days ago
      That is why you use multiple layers, the external public network and an ephemeral device, like Trails. Right, no way to tell but chances are you won't hit a government owned node on the way in and out, no way for them to tell what you're doing.
      Reply | Mark as read | Parent | Best of... | Permalink  

FORMATTING HELP

  • Comment hidden. Undo