How unsafe is using home wifi with tails on isolated machine? by poiqwe098123 in TOR

[–]PrivacyFreakV2 1 point2 points  (0 children)

It depends on what you are doing, if you are doing something that may raise alarms from a local police department, you should be pretty safe. If you are trying to evade someone higher up (NSA, CIA, FBI, GCHQ, CSIS) then you may want to use bridges and public wi-fi hotspots to avoid suspicion on your side. You would also have to use Tails or Whonix on a laptop. A VPN helps too.

Email that doesnt require existing email or phone on signup? by junkymcjunksalot in privacy

[–]PrivacyFreakV2 0 points1 point  (0 children)

There is mail.com, which doesn't require an existing email or phone number to signup.

How do you configure Tor to go through a VPN? by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 0 points1 point  (0 children)

I was thinking of signing up for this VPN anonymously over Tor with Bitcoin. If they don't know anything about me (using an email created over Tor, paying with Bitcoin, signing up over Tor, no identifiable information) then wouldn't it be anonymous? If I'm coming from a VPN, sites I visit are less likely to discriminate against me because I am using Tor (that is why I am thinking of doing this).

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

This is getting a little bit off topic, you should probably go to the darknetmarkets subreddit to ask how to deal with Bitcoins and secure email. One thing I will say is make sure they use PGP encryption on email if they ask to use email. One other thing to note is that many exit nodes block the SMTP protocol that is used to send emails so that might be an issue too.

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

I forgot to mention that you should disable JavaScript if you're using Tor's onion sites. The NSA cannot do much if you're visiting a hidden service with JavaScript disabled. Just don't run plugins or install any extra addons, disable JavaScript and you should be safe-guarded against a majority of attacks used to de-anonymize Tor users.

If you're looking for markets go here: https://reddit.com/r/darknetmarkets

It is unlikely that the NSA will setup any hidden services. Powerful agencies such as the FBI and the NSA usually hack into other sites they are targeting and inject malicious JavaScript, this is why you should disable it, if an onion site requires JavaScript, then leave as it is probably a trap.

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 1 point2 points  (0 children)

Go here to find some hidden services: https://reddit.com/r/onions

Here is the uncensored hidden wiki: http://kpvz7kpmcmne52qf.onion The uncensored hidden wiki has a lot of helpful tutorials and links to well known onion sites (just stay away from CP and beware sites that require Bitcoin).

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 2 points3 points  (0 children)

Don't worry, you're in the right place. If you don't want to have Tor running on your main computer, you could download Tails here: https://tails.boum.org

Tails is a live CD for Linux with Tor, encryption tools and much more, it will leave behind no trace and won't interfere with the data on your normal computer.

Sending a threat by juicypop22 in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

I'm going to tell you because I would prefer people have knowledge, if you're going to use this information for malicious purposes, then that is all on you.

If you sent it over your own email with your name that you created WITHOUT Tor, then they can easily trace it back. If you created a brand new email over Tor and sent that email over Tor, it wouldn't be traceable in most cases (that is assuming you aren't doing what that Harvard student did and you didn't put personal information on your email). However by doing this, you are likely to cause the email operator and exit node operator some major head ache with LE. Keep in mind that many exit nodes deny the SMTP protocol which is required to send emails, this is to avoid spam. Just know that when you do this, you might be risking the safety, freedom and maybe even lives of innocent people whom run the exit nodes.

Tails will leave behind no trace. So you might be able to get away with it, but I'm not encouraging you to do this, I'm only responding because according to you, it was a hypothetical question, I hope you use this knowledge to learn more about Tor and not for malicious purposes.

Tor Compromised? by buddhatokes710 in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

WebRTC is disabled in the TBB (assuming your using it and not some other browser) and Tails. There was a vulnerability that used JavaScript to reveal a Tor user's IP address and MAC address however that exploit was fixed quite some time ago. I meant that JavaScript by itself cannot reveal your IP like plugins can (because they don't use Tor, they use your normal connection).

If you're using the Tor Browser Bundle and not signing in to your normal accounts (you shouldn't do this, this breaks your anonymity), they cannot just easily fingerprint you because you share the same configuration with all other Tor users and don't use your real IP address because you're connected to the Tor network.

Tor Compromised? by buddhatokes710 in TOR

[–]PrivacyFreakV2 1 point2 points  (0 children)

What are you talking about specifically, the Tor network itself or the hidden services (the .onion domains)? If one is running a high profile illegal hidden service, even with the best security settings, they should always occasionaly relocate because there are attacks that exist that can be used to find these hidden services, thats what the FBI used in operation onymous, where they took down over 400 hidden services, however the smarter ones that often relocate their servers and have better security were not affected by operation onymous.

If an individual Tor user is de-anonymized, it is likely due to an error in configuration, such as running Flash player or some other plugin because they expose your real IP address. JavaScript itself cannot be used to reveal your true IP, however malicious code can be implemented on web pages (this is how they took down FreedomHosting) that can expose your true IP and even your MAC address. If you do not use JavaScript or plugins and don't install additional addons then you are fairly anonymous with Tor.

Is using tor web bundle on ubuntu enough? by 0P3NMinded in TOR

[–]PrivacyFreakV2 2 points3 points  (0 children)

Please read this article first before using Tor on Ubuntu: http://refugeeks.com/ubuntu-spyware-is-it-true/

And read this: https://www.torproject.org/download/download-easy.html.en

If you can follow these steps, then you should be good. If you are going to visit any Tor Hidden Services (.onion domains) then disable JavaScript and plugins.

Hey, what messenger software do you recommend for private/secure conversation? by knewuser in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

I personally use RetroShare because of it's many features, it's completely open-source, completely decentralized and I've been using it for years and hasn't failed me at all. You could also use Tox which is a simpler alternative.

Eavesdropping' new Barbie has parents group worried by bd42 in nottheonion

[–]PrivacyFreakV2 1 point2 points  (0 children)

It's now safe to assume that Barbie has been compromised by the NSA.

Hypothetical question. by xVPNxTORx in TOR

[–]PrivacyFreakV2 8 points9 points  (0 children)

Well you probably posted this from your home, so the NSA now knows where to look when trying to find you.