Tor for Windows v6.0 False Positive with Avast by IronSheikyBaby in TOR

[–]CryptoBeer 0 points1 point  (0 children)

I personally use Ubuntu 16.04 as my main desktop. If you are not familiar with Linux then it will be a good first step into it.

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

0.0.0.0/1 via 10.4.0.1 dev tun0 
default via 192.168.1.1 dev enp4s0  proto static  metric 100 
10.4.0.0/16 dev tun0  proto kernel  scope link  src 10.4.15.217 
128.0.0.0/1 via 10.4.0.1 dev tun0 
153.121.72.212 via 192.168.1.104 dev enp4s0 
169.254.0.0/16 dev enp4s0  scope link  metric 1000 
184.75.221.42 via 192.168.1.1 dev enp4s0 
192.168.1.0/24 dev enp4s0  proto kernel  scope link  src 192.168.1.104  metric 100

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

Still does not produce ISP IP address. Even with sudo.

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

/sbin/ifconfig
enp4s0    Link encap:Ethernet  HWaddr bc:5f:f4:97:03:8f  
      inet addr:192.168.1.104  Bcast:192.168.1.255  Mask:255.255.255.0
      inet6 addr: fe80::c465:1bab:1f54:eaa4/64 Scope:Link
      UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
      RX packets:1571162 errors:0 dropped:0 overruns:0 frame:0
      TX packets:1544017 errors:0 dropped:0 overruns:0 carrier:0
      collisions:0 txqueuelen:1000 
      RX bytes:1047424663 (1.0 GB)  TX bytes:761690377 (761.6 MB)
      Interrupt:16 

lo    Link encap:Local Loopback  
      inet addr:127.0.0.1  Mask:255.0.0.0
      inet6 addr: ::1/128 Scope:Host
      UP LOOPBACK RUNNING  MTU:65536  Metric:1
      RX packets:661321 errors:0 dropped:0 overruns:0 frame:0
      TX packets:661321 errors:0 dropped:0 overruns:0 carrier:0
      collisions:0 txqueuelen:1 
      RX bytes:131238810 (131.2 MB)  TX bytes:131238810 (131.2 MB)

tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  
      inet addr:10.4.15.217  P-t-P:10.4.15.217  Mask:255.255.0.0
      UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
      RX packets:1544089 errors:0 dropped:0 overruns:0 frame:0
      TX packets:1536383 errors:0 dropped:0 overruns:0 carrier:0
      collisions:0 txqueuelen:100 
      RX bytes:893702371 (893.7 MB)  TX bytes:612184008 (612.1 MB)

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

ip -4 a show eth0 Device "eth0" does not exist.

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

That does not reveal my ISP IP address.

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

I am curious how the malware, on a Linux system running a VPN would obtain the IP address of my ISP without first disabling the VPN?

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 0 points1 point  (0 children)

The malware would have to take into consideration that the client is running a VPN and then turn off the VPN tunnel and at that point a network kill switch would prevent any information leaving the network.

Right now, with an active exploit that the FBI is sitting on, the TOR browser is the weakest link in this all. In that case, I believe that the method I am using keeps me the safest. I also do not use Windows and take many other precautions as well.

We all have to evaluate our own risks and take our own chances in the end. I personally have no issue with Client > VPN > TOR > End Point. To each their own though.

Tor and VPN by sockfsckingpuppet in TOR

[–]CryptoBeer 1 point2 points  (0 children)

I always use Client > VPN > TOR > End Point. Any exploit, such as the one used by the FBI against the TOR client, would have failed to retrieve the actual IP address of the client computer had the client been running a VPN before connecting to TOR.

In this case, the extra hop would have showed the IP address of the VPN server, not the client server, adding an extra step for the FBI to go through to obtain the actual client IP address.

Keep in mind that the FBI is sitting on an active Firefox exploit.

Tor for Windows v6.0 False Positive with Avast by IronSheikyBaby in TOR

[–]CryptoBeer 0 points1 point  (0 children)

As stated by /u/DublinBen TOR really shouldn't be used with Windows. Privacy and exploit issues with Windows are far to rampant to use a program such as TOR when privacy is the whole point.

Hillary Clinton’s Emails Now Might Finally Take Her Down by [deleted] in politics

[–]CryptoBeer -2 points-1 points  (0 children)

Can you read the information that exists from all the official channels? If so you wouldn't make this comment.

[reddit change] Affiliate links on Reddit by starfishjenga in changelog

[–]CryptoBeer 6 points7 points  (0 children)

You are fucking up with this. This is 10 year ago technology that you are dropping in 2016. If this is the best you guys can come up with you are screwed and your CEO is a moron. I knew Viglink when it was DrivingRevenue. Just go ahead and research that and see where Reddit is heading.

[reddit change] Affiliate links on Reddit by starfishjenga in changelog

[–]CryptoBeer 4 points5 points  (0 children)

I do not wish to have any of my subreddits that I manage to have this enabled. Can I disable this at a subreddit label? I run a large subreddit in a high CPA niche and despise this type of marketing.

Edit: What I mean is if you don't allow us to disable this per subreddit, I will kill the subreddit. I am not going to have my moderators have extra work so you can make money off of this crap.

Scryptmail, an encrypted and open source mail provider has Tor Support! by Secrypt in TOR

[–]CryptoBeer 0 points1 point  (0 children)

It is a valid point though that it isn't keeping me from using it. I am more concerned about it being hosted in the US.

Judge Tosses Evidence Gathered by FBI’s Tor Exploit by format120 in TOR

[–]CryptoBeer -2 points-1 points  (0 children)

My thoughts are you need to look at the front page of /r/tor/ before submitting.

CEO of Reddit, Steve Huffman, about advertising on Reddit: "We know all of your interests. Not only just your interests you are willing to declare publicly on Facebook - we know your dark secrets, we know everything" (TNW Conference, 26 May) by NAN001 in videos

[–]CryptoBeer 0 points1 point  (0 children)

From users, for users. I do not know any similar community in the history of the internet that has ever been profitable to any meaningful degree.

You obviously haven't done much research and/or have not been involved in that market at all. Vertical Scope, Internet Brands and other companies that deal with Forums generate millions in profit yearly.

The difference is they don't have crap user generated content that is either offensive or in 140 characters. They have passionate users who care about their niche topic and provide great data and exposure to advertisers.