Danja

Registered last year
Last Visited last month
Total Posts 75


Posts by Danja


How to use Tor the right way. Best practices.

by Admin in Userspace Software

...
  Danja   last month

I think this text is far too paranoid.
Windows version of Firefox was broken only ONCE, when FBI took down the FreedomHosting. Other versions (Linux, MacOS) were broken zero times. This is 100% less, but this is also less by 1. So it's up to you to threat Windows as "totally insecure" ...

View Topic (6 replies)



"real" geographical public IPs

by adrenalina in Userspace Software

...
  Danja   last month

Empty blocks for 'Region' only means that IP database is not very accurate. Big ISP's can assign IP adresses dynamically to their customers all over the counrty, so there is no way to determine City/Region . Sometimes (AOL, CloudFlare..) even country is hard to guess. So you'll never get 100% cor ...

View Topic (1 replies)



proxychains other programs

by brembrem in General Questions

...
  Danja   last month

Running Tor exit node in censored country could be useful for 'exporting' local sites outside. Some torrent trackers, file sharing services, forums etc limit access for foreigners to avoid international copyright violation reports. The only way to get them is by Tor or some local proxy.
PS: I ...

View Topic (7 replies)



Windows Remote Desktop over Tor

by joeforte23 in General Questions

...
  Danja   last month

There are several solutions for this.
1) You can 'torify' any application, that doesn't support proxy. There are a lot of programs to do this: widecap, sockscap, opencap, proxify, proxifier, torify... Full list is here: http://en.wikipedia.org/wiki/Comparison_of_proxifiers
2) You can set up ...

View Topic (2 replies)



Did I set up Privoxy with I2P and Tor right?

by Anonymoose in General Questions

...
  Danja   last month

You can use -profile switch with your firefox to separate cookies/cache/etc.
Private Mode is also an option.

View Topic (2 replies)



Hidden service not reachable

by anyone in Running a Server

...
  Danja   2 months ago

Does apache (or nginx) still work? What happens when you try to access http server directly, via localhost?
Can you still see /usr/bin/tor in processlist after hidden service went offline?

View Topic (2 replies)



Proxy AFTER TOR

by zipzap80 in General Questions

...
  Danja   2 months ago

Just copy the whole Bundle to another folder, and change ports from 9050 and 9051 to, say, 8050 and 8051 everywhere.

View Topic (12 replies)



Tutorial: SSH over Tor

by TOR Hacker in General Questions

...
  Danja   2 months ago

9051 is control port (for Vidalia to send commands to Tor) and 9050 is data port (for other applications to use it as socks proxy). Maybe your setup is different, but default Tor Browser Bundle comes with this settings.

View Topic (6 replies)



Proxy AFTER TOR

by zipzap80 in General Questions

...
  Danja   2 months ago

TOR Hacker is right, you should torify the whole browser and put your private proxy settings inside it.
If the Internet program you are using does not have a socks proxy option you can use Sockscap to make it support socks proxy. Here is a tutorial showing how to use Sockscap. http://www.socks ...

View Topic (12 replies)



Tutorial: SSH over Tor

by TOR Hacker in General Questions

...
  Danja   2 months ago

For Windows users there is a program called PuTTY. Small, powerful and free.
It supports SSH-Tunneling (which creates SOCKS5 proxy on desired port on Localhost, that you can use in your browser settings), and also it has it's own proxy settings and therefore can work via proxy created by To ...

View Topic (6 replies)



Tor and Privoxy of a FritzBox 7390

by Coolzero in Userspace Software

...
  Danja   2 months ago


I see her http://torcheck.xenobite.eu/index.php?
Your IP is identified to be a Tor-EXIT.
So you are using Tor successfully to reach the web!
So i thing Tor is correctly running! Is this right?
Now i have some other Problems, this site:
http://ip-check.info/index.php?jsID=121 ...

View Topic (10 replies)



Send ALL traffic to tor

by geps in General Questions

...
  Danja   3 months ago

These projects use same approach (Sending ALL traffic from VirtualBox to Tor):
http://whonix.org
http://www.janusvm.com/tor_vm/

View Topic (2 replies)



Configure which countries Tor will (not) use?

by AEN007 in General Questions

...
  Danja   3 months ago

... in general it is considered a VERY BAD IDEA to use same browser for both Tor and non-Tor browsing. It can store cookies, HTML5 Local Storage, Shared objects and so and so on, ... and can do whole lot of other things to de-anon you. "AEN007"So, I have 1 MFFportable "install" that I use exclusiv ...

View Topic (26 replies)



Filezilla on Tor, problem

by kirushiwa in Userspace Software

...
  Danja   3 months ago

FTP goes unencrypted on last hop (from Tor Exit Node to FTP Server), so it is not secure at all. You should use SCP or SFTP instead. Otherwise Tor Exit Node can grab your ftp password or even modify files you are uploading. But this dowsn't reveal your location, only your data.
"protocol ...

View Topic (1 replies)



Facebook over Tor

by trommler in Security Questions

...
  Danja   3 months ago

I guess, Facebook won't let you log in through Tor. It blocks Tor exit nodes (maybe not all of them though).
Fresh clean installation of Firefox, on fresh clean system (inside VirtualBox or VMWare), with manually changed MAC address & from any public WI-FI place with no CCTV nearby.

View Topic (3 replies)



Tor network (Orbot for android.)

by The_Watchman in Security Questions

...
  Danja   3 months ago

if it's possible that the threat is so well hidden that the security software can't pick up on it?
Of course yes. Antiviruses are widely over-estimated.
But what you described here is more likely to be just normal Orbot's behavior.
It consumes 100% CPU & memory, so everything else ...

View Topic (1 replies)



Anything be Done about Fing Big Brother

by IdiotGovernment in Userspace Software

...
  Danja   3 months ago

i2p has a bit better design. Designed to stay secure even if all transit nodes are compromised, exept yours and destination.
Tor has still many nodes that are not belong to governments. Block USA & Canada in your default settings, or leave only exotic countries such as Cambodia or Tajikista ...

View Topic (1 replies)



How anonymous is Tor?

by danblukk in Security Questions

...
  Danja   3 months ago

Just meant your average joe user thats looking at or buying dodgy stuff."danblukk"
Only if you're buying stuff on a website that was compromised.
Using Virtual Environment Setup (such as http://whonix.org) instead of Tor Browser Button is a bit more complicated, but secures you even in this ...

View Topic (5 replies)



Tutorial: SSH over Tor

by TOR Hacker in General Questions

...
  Danja   3 months ago

Why so complicate, when there is a tool which do exactly the same automatically? Use torify as follows:
$ torify ssh user@remote.ip
And if you don't know ip address and don't want to leak DNS use tor-resolve
$ tor-resolve remote.hostname localhost:9050
or together:
$ torify ssh u ...

View Topic (6 replies)