Registered | 3 months ago |
Last Visited | 2 months ago |
Total Posts | 71 |
by Unnamed Entity in Userspace Software
![]() | Unnamed Entity 7 months ago |
Tor security advisory: "relay early" traffic confirmation attack
On July 4 2014 we found a group of relays that we assume were trying to deanonymize users. They appear to have been targeting people who operate or access Tor hidden services. The attack involved modifying Tor protocol headers to d
by mobbynoob in Userspace Software
...
![]() | Unnamed Entity 7 months ago |
If the site uses HTTPS (as shown by the little lock icon, you know the drill) this protects your password just as it would when browsing the web normally. If the site does not use HTTPS, then YES the exit node can read your password. I'm not aware of any particular reports of people having accounts
by Redstar2613 in General Questions
...
![]() | Unnamed Entity 7 months ago |
Either they're just using that as a generic "undesirable IP" message and they're intentionally blocking Tor, or it's just because a "bot" (whatever that means in this context) used the same exit node in the past and got the IP blacklisted. It's extremely unlikely this refers to a
by Unnamed Entity in Userspace Software
![]() | Unnamed Entity 7 months ago |
This isn't a warning, per se, just something I've been thinking about.
Say you're about to use Tor to post a message online. A message that could make you very powerful enemies. You fire up Tor browser, send your message, shut it down, and maybe even uninstall Tor browser for good measure.
B
by ringo14 in Userspace Software
...
![]() | Unnamed Entity 7 months ago |
Most likely this is due to changing IP Addresses. You might try using one of those free web proxies IN ADDITION to Tor. This way Facebook (for example) will see the same IP address all the time. Another thing that works on some sites (like this forum) is to just check the "remember me" but
by mertesto in General Questions
...
![]() | Unnamed Entity 7 months ago |
It should "just work" without doing anything extra. If it doesn't, either you're not set up right, or the site is down.
Here's one that I just tested to be working (hidden wiki):
http://wikitjerrta4qgz4.onion/
One other possibility, odd though it sounds, is that your clock is w
by jhnorct in General Questions
...
![]() | Unnamed Entity 7 months ago |
To be able to change identities without closing the browser, you'll need to bring Vidalia back.
You can get it here: https://people.torproject.org/~erinn/vi ... e-bundles/
Then make sure to use the "New Identity" command in Vidalia, not in the browser itself.
by xmppwokki in General Questions
...
![]() | Unnamed Entity 7 months ago |
Tor Browser uses it's own instance of Tor. You need a different version of Vidalia to configure it. (Yeah it's annoying, I don't understand why they did it this way.)
Anyway, you can get it here: https://people.torproject.org/~erinn/vi ... e-bundles/
by baron in Security Questions
...
![]() | Unnamed Entity last year |
There are, of course, countless things that could go wrong. But everything you described sounds good.
by serialci in Userspace Software
...
![]() | Unnamed Entity last year |
You can, but you really, really shouldn't. Flash looks like it's part of the browser, but effective it's a whole separate program. Tor will NOT protect you when you use Flash. Unless you're using Tor for some purpose other than protecting your identity, using Flash completely defeats the purpose.
by dragoon in Userspace Software
...
![]() | Unnamed Entity last year |
If you created the account through Tor and never access the account without Tor, then yes, you should be very difficult to identify.
by thekos in General Questions
...
![]() | Unnamed Entity last year |
I don't know if this tip applies to that particular website. But if a "remember me" or "log me in each time I visit" option is available, checking that will often help.
by kiki2015 in General Questions
...
![]() | Unnamed Entity last year |
I think it's kind of a tossup between Tails and Whonix. Tails is probably the quickest to get up and running, but Whonix is more flexible.
by lordofddeath in General Questions
...
![]() | Unnamed Entity last year |
No worries, other non-encrypted traffic coming from your network will not have any effect on your Tor connection.
by torfan in Security Questions
...
![]() | Unnamed Entity last year |
This is a a well known problem, probably Tor's biggest weakness. It's generally considered difficult to pull off in practice, but it's a risk for sure. There's not much of a way to avoid this unless you switch to a high-latency system (i.e. one that adds deliberate delays, rather than trying to send
![]() | Unnamed Entity last year |
Firefox is a web browser, and Mozilla is the company that makes it, so I'm not quite sure what you mean there. Perhaps the mean Thunderbird (the email client made by the same company)? But actually, using standard Firefox is not recommend for strong privacy, Torbrowser is. This is based on Firefox h
by Unnamed Entity in TorForum.org
![]() | Unnamed Entity last year |
Would it be possible to auto-ban anyone who uses the word k*tchen?
by Antmound in General Questions
...
![]() | Unnamed Entity last year |
Having JavaScript enabled DOES open you up to being "not so anonymous". The Tor Project admits this is a trade off in usability vs. security. They apparently think it's an acceptable risk, but personally I always turn it off.
by Antmound in General Questions
...
![]() | Unnamed Entity last year |
Indeed. Your ISP, or cellular carrier can tell you use Tor (or Orbot). If you're in a nominally free country (as opposed to one of those that doesn't even bother to pretend) this is probably OK. They can see you're using Tor, but not what you're using it for, at least that's the idea.
But Orbot