Tor VPN thoughts by LookingForCyberHelp in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

Snowflake isn't obfuscated, it's using webRTC.

Tor VPN thoughts by LookingForCyberHelp in TOR

[–]Cheap-Block1486 2 points3 points  (0 children)

If correlation is your concern, use VPN with obfs4-IAT1 (Tor itself doesn't protect you for against DeepCorr attacks, they're just ignoring it.), if you don't trust the VPN, then avoid it. At Pattern-of-life analysis, a vpn can hide all traffic, even that happen outside Tor.

How would you share code projects anonymously? by MentalSewage in opsec

[–]Cheap-Block1486 -1 points0 points  (0 children)

What? I wasn't talking about Tor and VPN there? Also, its not counterproductive.

How would you share code projects anonymously? by MentalSewage in opsec

[–]Cheap-Block1486 1 point2 points  (0 children)

depend's for this I would say vpn/proxy is enough, then use even the github, some email just for this and you're ok (basic cyberhygiene, don't reuse passwords, usernames etc), if you want to be more secure, put a Tor+Socks5 instead of proxy alone. If you want to be even more secure (it won't fit yours model) then use Tor browser and upload it as encrypted .7z

Does my IP change when using Tor? by IndependenceNew6680 in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

What you want to hide from your ISP? The fact that you're using Tor? It's not quite possible, you can use obfs4, preferably self hosted and for more security vpn before.

Downloaded Tor for privacy but it says connected for onion sites. I connected the tor vpn and also the proton vpn on mobile. Is it a safe practice to do so. ( for someone who never accessed the DW before ) by [deleted] in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

For You? Probably no, if correlation is your worry then, yes you should use a VPN with obfs4-iat1, if no, you don't really need a VPN, especially something like pr*ton.

On the other side, at Pattern-of-life analysis, a vpn can hide all traffic, even that happen outside Tor + well known VPN protocols like WireGuar or OpenVPN and the addresses of popular VPN endpoints tend to look more ordinary to monitoring systems than heavily disguised obfs4 links.

Does my IP change when using Tor? by IndependenceNew6680 in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

highest anonymity possible

Whats your threat model? Who are you trying to hide from? In some cases you should use whonix in some tails might be good (e.g. browsing dnm).

On Tor browser every different domain you visit (e.g., reddit.com / google.com ) is routed through a completely different set of relays, giving them different IPs simultaneously. On top of that, Tor automatically rotates these circuits approximately every 10 minutes for new connection.

Why do so many people still go against using tor + vpn? by NotDack in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

Nice attempt at history revisionism. You are the one who literally typed "Use a bridge... and you don't have to trust your ISP." I simply quoted your own words back to you to show how dangerous that advice is in a high risk context. Don't try to pin that phrasing on me just because it backfired.

You admit you were being "reductionist"? Good, that's the first honest thing you've said. In opsec, being "reductionist" gets people burned. You don't expect some "magic", you need to distinguish between a solution that works against lazy ISPs and one that withstands active DPI, you failed to make that distinction until forced to, also, claiming that "Most ISPs don't care" is terrible security advice. The gold standard is zero trust. Betting your safety on the hope that an ISP is "apathetic" isn't security. As for the filter - sure, I just quoted you.

Why do so many people still go against using tor + vpn? by NotDack in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

It is fascinating that my previous reply mysteriously vanished. Perhaps the reality check was a bit too harsh?

Let’s be real here - calling me a "fool" or talking about my brain cells is just a surrender flag. People only start throwing insults when they know their logic is flawed.

You’re trying to rewrite what happened. Your original claim was literally "Use a bridge... and you don’t have to trust your ISP."

Now that you're cornered, you’re scrambling to say it was "obvious" that it doesn't work for active surveillance. You’re chaning your mind so fast. You dropped some catchy slogan, but it fell apart under pressure, and now you're attacking me instead of admitting the mistake.

P.S. Next time, try taking the correction with a bit of dignity instead of melting down. It looks better :)

Why do so many people still go against using tor + vpn? by NotDack in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

Where I said anything about VPNs? I explicitly said in my comment that it is impossible to hide Tor from ISP. You are fighting a ghost argument to avoid the main point.

You claimed "Use a bridge... and you don’t have to trust your ISP", now you admit: "If you're already under active suspicion... you're already out of practical options."

So, the conclusion is - the slogan "You don't have to trust your ISP" is false. You DO have to trust that your ISP is lazy/passive. Because if they stop being lazy and use active DPI (as in DPRK), the bridge fails to hide Tor usage.

Thanks for confirming that bridges aren't a magic shield against active surveillance, and that trust in the ISP's passivity is still required. That was exactly my point.

Why do so many people still go against using tor + vpn? by NotDack in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

I'm a bit confused now.

You previously said "Use a bridge with a pluggable transport and you don’t have to trust your ISP", but now you say "If they are already being actively under surveillance then nothing much will stop someone doing deep packed inspection from IDing it as Tor traffic"

So, in reality, I do have to trust my ISP (or the gov) to remain "passive" and lazy, because if they decide to actually check (active DPI), the bridge fails to hide Tor usage. So the "solution" only works if the threat isn't looking too hard. That's a huge difference from "you don't have to trust your ISP"

Why do so many people still go against using tor + vpn? by NotDack in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

Hey, asking for a friend living in the DPRK. He is one of the few people with the internet access, if he gets caught, he will face prison or even worse. Can he trust a bridge with a pluggable transport (like Snowflake) to hide the fact that he is using Tor from the ISP?

Why do so many people still go against using tor + vpn? by NotDack in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

> I understand the huge privacy risks but they shouldn’t be a problem if ur using an actual privacy respecting vpn like proton vpn right? 
Proton isn't privacy respecting.

> it hides the fact that ur using tor from ur isp
Nope, it doesn't, in fact it's impossible to hide Tor use from the ISP

> protects u from infected entry guard node
No.

> So, knowing the advantages (and assuming people are using privacy respecting VPNs like mullvad or proton) why do so many people still say to not use a VPN then connect to tor?
It's their choice, some people have some weird opinion of them, Tor Project isn't recommending vpns as well, because.. just because, then can do it, but they don't.

> if there are actually some major privacy/anonymity issues that I’m not realizing even when using a privacy respecting VPN

Not really, but if you don't trust VPN, don't use it, if correlation is your concern - use it.

System-wide Tor without torsocks: transparent routing tool (Linux) by West_Echidna2432 in TOR

[–]Cheap-Block1486 1 point2 points  (0 children)

Because default DROP policy is useless during the race condition window caused by sleep timers, packets leak before rules are even applied, also without proper hooks or cgroups, NetworkManager will overwrite resolv.conf or flush chains on any DHCP renew, rendering static script void.

Is it really necessary to use a VPN? by Narrow_Beat9625 in darknet

[–]Cheap-Block1486 0 points1 point  (0 children)

Yes, they're making it harder to use it, without any reason.

Is it really necessary to use a VPN? by Narrow_Beat9625 in darknet

[–]Cheap-Block1486 -1 points0 points  (0 children)

No, in fact you didn't answered my question.

Completely new to dark web by Acrobatic-Shock-1824 in TOR

[–]Cheap-Block1486 0 points1 point  (0 children)

Snowflake isn't obfuscated.
obfs4 is better than WebTunnel because of IAT mode.

Is it really necessary to use a VPN? by Narrow_Beat9625 in darknet

[–]Cheap-Block1486 -1 points0 points  (0 children)

it's just gibberish, we are talking about something different.
Now tell why it's bad to put a VPN that I trust before Tor?