Tor (The Onion Router)
Posted by jack1776 3 weeks, 2 days ago to Technology
This is for my comrades in the great socialist states of American.
How many people here know about Tor, or how it works?
https://www.torproject.org/download/
Tor is a step towards anonymity on the internet, obviously it’s not perfect and I understand that some nodes are run by the government. The way this system works is interesting. The browser encrypts your message and submits your data to a tor node, which encrypts it again and submits it to another tor node. The entry point can identify you and the exit point can identify the target host.
VPN isn’t anonymous, they all keep records and as soon as the heavy hand of government gets involved, they will happily surrender their records with a court order.
Of course, if you plan on doing anything truly nefarious, you will have to take additional precautions. Using a public network for communication away from your residents and cameras. Don’t use your own computer or phone, use an ephemeral environment with a random MAC address. Reset your ephemeral environment after use…
I have a feeling that if they steal the election that we will be truly dealing with people being prosecuted for thought crimes; I hope I’m wrong….
How many people here know about Tor, or how it works?
https://www.torproject.org/download/
Tor is a step towards anonymity on the internet, obviously it’s not perfect and I understand that some nodes are run by the government. The way this system works is interesting. The browser encrypts your message and submits your data to a tor node, which encrypts it again and submits it to another tor node. The entry point can identify you and the exit point can identify the target host.
VPN isn’t anonymous, they all keep records and as soon as the heavy hand of government gets involved, they will happily surrender their records with a court order.
Of course, if you plan on doing anything truly nefarious, you will have to take additional precautions. Using a public network for communication away from your residents and cameras. Don’t use your own computer or phone, use an ephemeral environment with a random MAC address. Reset your ephemeral environment after use…
I have a feeling that if they steal the election that we will be truly dealing with people being prosecuted for thought crimes; I hope I’m wrong….
SOURCE URL: https://en.wikipedia.org/wiki/Tor_(network)
The minimum number of nodes to hit is typically three, entry, and exit nodes and a single hop in between.
There are stories that the government has infiltrated this system, but they would have to have nodes at the entry point and exit and these can change in the middle of your communication. An ease dropper would have to have the source of the communication, the destination of the communication as well as the content of this communication. All three are encrypted independently making this extremely hard to circumvent. Its not perfect and can be compromised, this is why you should take the addition steps. Don’t use a network you own and use an ephemeral device, like Tails.
https://en.wikipedia.org/wiki/Tails_(...
You may also be able to retain any irreplaceable windows applications
under Linux in a virtual machine using something like virtual box.
Thanks for posting the info on Tor. 👍