The comment has been deleted.
10

Tor (The Onion Router)

Posted by jack1776 5 months, 3 weeks ago to Technology
9 comments | Share | Flag

This is for my comrades in the great socialist states of American.

How many people here know about Tor, or how it works?

https://www.torproject.org/download/

Tor is a step towards anonymity on the internet, obviously it’s not perfect and I understand that some nodes are run by the government. The way this system works is interesting. The browser encrypts your message and submits your data to a tor node, which encrypts it again and submits it to another tor node. The entry point can identify you and the exit point can identify the target host.

VPN isn’t anonymous, they all keep records and as soon as the heavy hand of government gets involved, they will happily surrender their records with a court order.

Of course, if you plan on doing anything truly nefarious, you will have to take additional precautions. Using a public network for communication away from your residents and cameras. Don’t use your own computer or phone, use an ephemeral environment with a random MAC address. Reset your ephemeral environment after use…

I have a feeling that if they steal the election that we will be truly dealing with people being prosecuted for thought crimes; I hope I’m wrong….


All Comments

  • Posted by 5 months, 3 weeks ago in reply to this comment.
    That is why you use multiple layers, the external public network and an ephemeral device, like Trails. Right, no way to tell but chances are you won't hit a government owned node on the way in and out, no way for them to tell what you're doing.
    Reply | Permalink  
  • Posted by rhfinle 5 months, 3 weeks ago
    Thanks, Jack. That's good info. The hard part, it would seem, is to ensure that your entry point isn't compromised. I have no idea how one would do that.
    Reply | Permalink  
  • Posted by 5 months, 3 weeks ago in reply to this comment.
    It’s distributed.... Each node you hit in between has no information about the source or destination, each node uses encryption keys that is unique for that stage. The entry node knows the source, you, but doesn’t know the destination for the package or the payload. The final node knows the payload and the target for the packet. The payload is typically SSL so only the source can decrypt.

    The minimum number of nodes to hit is typically three, entry, and exit nodes and a single hop in between.

    There are stories that the government has infiltrated this system, but they would have to have nodes at the entry point and exit and these can change in the middle of your communication. An ease dropper would have to have the source of the communication, the destination of the communication as well as the content of this communication. All three are encrypted independently making this extremely hard to circumvent. Its not perfect and can be compromised, this is why you should take the addition steps. Don’t use a network you own and use an ephemeral device, like Tails.
    Reply | Permalink  
  • Comment deleted.
  • Posted by freedomforall 5 months, 3 weeks ago in reply to this comment.
    Depending on your software needs, Linux may be a very easy transition.
    You may also be able to retain any irreplaceable windows applications
    under Linux in a virtual machine using something like virtual box.
    Thanks for posting the info on Tor. 👍
    Reply | Permalink  
  • Posted by 5 months, 3 weeks ago
    This with switching to Linux as soon as I can is a priority for me...
    Reply | Permalink  

  • Comment hidden. Undo