Skip to comments.
Boffins follow TOR breadcrumbs to identify users
The Register ^
| 1 September 2013
| Richard Chirgwin
Posted on 09/02/2013 2:05:27 PM PDT by ShadowAce
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-29 next last
1
posted on
09/02/2013 2:05:27 PM PDT
by
ShadowAce
To: rdb3; Calvinist_Dark_Lord; Salo; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ...
2
posted on
09/02/2013 2:05:42 PM PDT
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: ShadowAce
So no more anonymity? What do we have to do to get some real privacy? Launch and use some microsats as relays?
3
posted on
09/02/2013 2:13:47 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the mooslimbs trying to kill them-)
To: ShadowAce
For best security you should run a TOR node.
You have to put up with annoying emails from various copyright holders as they all seem to think the TOR traffic is yours. Once informed that the ip is a TOR node they cease their pestering ways.
4
posted on
09/02/2013 2:14:36 PM PDT
by
Bobalu
(Bobo the Wonder Marxist leads Operation Rodeo Clown against Syria)
To: ShadowAce
Paging Mr. Johnson...
5
posted on
09/02/2013 2:14:56 PM PDT
by
Kip Russell
(Be wary of strong drink. It can make you shoot at tax collectors -- and miss. ---Robert A. Heinlein)
To: ShadowAce
Yup, there’s no such thing as privacy on the internet. And that’s just regular attackers, when the government (you know the guys that constructed ARPA that is the backbone of the internet) gets involved it’s even easier.
6
posted on
09/02/2013 2:16:07 PM PDT
by
discostu
(This is why we have ants!)
To: Utilizer
7
posted on
09/02/2013 2:16:28 PM PDT
by
discostu
(This is why we have ants!)
To: ShadowAce
With each passing day, the 'net loses a bit more of its appeal.
Given the volume of prying being done by such fascist maggots as referenced above, at the behest of their Stasi overlords, the day will come when the 'little guy' may just decide it's not worth it.
8
posted on
09/02/2013 2:19:52 PM PDT
by
tomkat
To: ShadowAce
The paranoid Soviet government required the registration of typewriters.
The new paranoid state overlords are doing the same with the Internet.
You will have to wardrive.
9
posted on
09/02/2013 2:23:12 PM PDT
by
Bon mots
To: COUNTrecount; Nowhere Man; FightThePower!; C. Edmund Wright; jacob allen; Travis McGee; opentalk; ..
Nut-job Conspiracy Theory Ping!
To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I dont add you to the list...
10
posted on
09/02/2013 2:29:02 PM PDT
by
null and void
(I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
To: ShadowAce
11
posted on
09/02/2013 2:34:59 PM PDT
by
OldNewYork
(Biden '13. Impeach now.)
To: null and void
You have to add me to your ping list or I’ll report you to the mods.
To: null and void
would anyone like a solution to this problem?
how to monetize an anonymous communications system?
13
posted on
09/02/2013 2:36:44 PM PDT
by
sten
(fighting tyranny never goes out of style)
To: Utilizer
The bottom line is that nothing electronic can be trusted. About the only communication that can be relied on for privacy are hand written notes, hand delivered.
The sad thing is how many government and private organizations are obsessed with such minutiae. Truly, it accomplishes nothing, and comes across as a mental illness.
14
posted on
09/02/2013 2:47:12 PM PDT
by
yefragetuwrabrumuy
(The best War on Terror News is at rantburg.com)
To: ShadowAce
For all of us dinosaurs (like me!) on FR who are clueless as to what TOR is:
http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29
“Tor (originally short for The Onion Router) is free software for enabling online anonymity.
Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis.
Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the user and is intended to protect users’ personal privacy, freedom, and ability to conduct confidential business by keeping their internet activities from being monitored.”
15
posted on
09/02/2013 3:03:32 PM PDT
by
BwanaNdege
("Life is short. It's even shorter if you suggest going out for pizza on your anniversary" Peter Egan)
To: yefragetuwrabrumuy
I dunno about that. Over the years I have seen several methods of encryption using methods that I guarantee you are not going to break unless you know the exact key and method used. I even know of a method, quite simple actually, to shrink down any dual layer movie-dvd -sized data to about half its size and sometimes quite a bit more, using an algorithm that you have probably used many times before unknowingly, and that is before using more readily available methods like the zip and 7z formats. Just make absolutely sure you never lose the encryption key or even the person or computer system used will never recover it.
Encryption, however is not the same as anonymity. I guarantee using that level of encryption you can send the data over the net with little chance of anyone deciphering it. No, what I am concerned with is the ability for unwanted others to track us over the internet.
16
posted on
09/02/2013 3:07:28 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the mooslimbs trying to kill them-)
To: expat_panama
17
posted on
09/02/2013 3:09:13 PM PDT
by
null and void
(I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
To: ShadowAce
Back to carrier pigeons? Since the Libs hate guns and won’t have them around (so they say), we don’t have to worry about them shooting the pigeons down. /S
18
posted on
09/02/2013 3:21:52 PM PDT
by
MissMagnolia
(You see, truth always resides wherever brave men still have ammunition. I pick truth. (John Ransom))
To: OldNewYork
Daggone ... should have read all the comments before I posted. :-)
19
posted on
09/02/2013 3:24:11 PM PDT
by
MissMagnolia
(You see, truth always resides wherever brave men still have ammunition. I pick truth. (John Ransom))
To: ShadowAce
So do you use a TOR with a VPN? Or is a VPN all you need to provide anonymity? If so do you have any recommendations on VPNs?
Navigation: use the links below to view more comments.
first 1-20, 21-29 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson