[ / / / / / / / / ] [ b / news+ / boards ] [ operate / meta ] [ ]

/onion/ - Tor Hidden Services

Tor and "darknet" discussion

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Options
Password (For file and post deletion.)

Allowed file types: jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 5 per post.


File: 1420326198005.png (279.05 KB, 500x500, 1:1, Pickapeppa-Logo.png)

 No.144

http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/

Every new user of Tor should read this to get an idea on the basics of protecting your self while using Tor.

Never log into your personal accounts using Tor please.

 No.328

Leo Laporte "Is Tor really Anonymous?"

 No.329


 No.330

starts at ~40min.

 No.331

Hotwheels made 8chan an onion

http://fullchan4jtta4sx.onion/

 No.337

http://xordern.net/checkip


If you use your mobile to access Tor, perform this test.

 No.338

>>337
HTML5 IS LEAKED if there is a video on the page. I advise using a OPENVPN for Android app . it has been advise to use Firefox.

 No.342

>>338
HTML5 leaks your IP address if you are using android. It is advised to switch to Firefox (and install specific add-ons) and then use Orbot. With using the OpenVpn for Android app (prefer the Arne Schwabe version) and a purchased VPN, it only leaks back to my VPN.

 No.343


 No.345

People should stop using Tails and other live OSes

non persistent entry guards are very bad

 No.347

>>345
You are fucking retarded and should stop giving advise to anyone. Wtf do "non persistent entry guards" have to do with live OSes?

 No.358

>>345
This is fucking autistic. Stop the flow of bullshit that is coming from your face when you have no idea what you are talking about.

 No.364

http://fullchan4jtta4sx.onion/onion/res/144.html#345

>>347
>>358

Tor is supposed to use the same entry guard for about 8 months Torproject recently reduced it down from 3 to 1 for better security. When you use live cds like Tails, you rotate to a new guard after ever reboot. This greatly increases your chances of selecting a malicious guard, thus making you more vulnerable to traffic confirmation attacks


More info:

https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters

>Second, the Tails live CD doesn't use persistent guards. That's really bad I think


Even Roger Dingledine says Tails is bad becauses of this.

 No.365

>>364

>Torproject recently reduced it down from 3 to 1 for better security.


***Torproject recently reduced the number of entry guards from 3 to 1 for better security.

 No.368

>>364
>>365

Solution: use a bridge.



Delete Post [ ]
[]
[Return][Go to top][Catalog]
[ / / / / / / / / ] [ b / news+ / boards ] [ operate / meta ] [ ]