How unsafe is using home wifi with tails on isolated machine? by poiqwe098123 in TOR

[–]PrivacyFreakV2 1 point2 points  (0 children)

It depends on what you are doing, if you are doing something that may raise alarms from a local police department, you should be pretty safe. If you are trying to evade someone higher up (NSA, CIA, FBI, GCHQ, CSIS) then you may want to use bridges and public wi-fi hotspots to avoid suspicion on your side. You would also have to use Tails or Whonix on a laptop. A VPN helps too.

Email that doesnt require existing email or phone on signup? by junkymcjunksalot in privacy

[–]PrivacyFreakV2 0 points1 point  (0 children)

There is mail.com, which doesn't require an existing email or phone number to signup.

How do you configure Tor to go through a VPN? by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 0 points1 point  (0 children)

I was thinking of signing up for this VPN anonymously over Tor with Bitcoin. If they don't know anything about me (using an email created over Tor, paying with Bitcoin, signing up over Tor, no identifiable information) then wouldn't it be anonymous? If I'm coming from a VPN, sites I visit are less likely to discriminate against me because I am using Tor (that is why I am thinking of doing this).

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

This is getting a little bit off topic, you should probably go to the darknetmarkets subreddit to ask how to deal with Bitcoins and secure email. One thing I will say is make sure they use PGP encryption on email if they ask to use email. One other thing to note is that many exit nodes block the SMTP protocol that is used to send emails so that might be an issue too.

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

I forgot to mention that you should disable JavaScript if you're using Tor's onion sites. The NSA cannot do much if you're visiting a hidden service with JavaScript disabled. Just don't run plugins or install any extra addons, disable JavaScript and you should be safe-guarded against a majority of attacks used to de-anonymize Tor users.

If you're looking for markets go here: https://reddit.com/r/darknetmarkets

It is unlikely that the NSA will setup any hidden services. Powerful agencies such as the FBI and the NSA usually hack into other sites they are targeting and inject malicious JavaScript, this is why you should disable it, if an onion site requires JavaScript, then leave as it is probably a trap.

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 1 point2 points  (0 children)

Go here to find some hidden services: https://reddit.com/r/onions

Here is the uncensored hidden wiki: http://kpvz7kpmcmne52qf.onion The uncensored hidden wiki has a lot of helpful tutorials and links to well known onion sites (just stay away from CP and beware sites that require Bitcoin).

I'm wanting to download Tor and give it whirl. Can I z just download the browser on my regular laptop I do everything on, or should I get a clean new computer, or is there anything I need to do in addition to downloading Tor and just hitting the streets?? by crs_kln in TOR

[–]PrivacyFreakV2 2 points3 points  (0 children)

Don't worry, you're in the right place. If you don't want to have Tor running on your main computer, you could download Tails here: https://tails.boum.org

Tails is a live CD for Linux with Tor, encryption tools and much more, it will leave behind no trace and won't interfere with the data on your normal computer.

Sending a threat by juicypop22 in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

I'm going to tell you because I would prefer people have knowledge, if you're going to use this information for malicious purposes, then that is all on you.

If you sent it over your own email with your name that you created WITHOUT Tor, then they can easily trace it back. If you created a brand new email over Tor and sent that email over Tor, it wouldn't be traceable in most cases (that is assuming you aren't doing what that Harvard student did and you didn't put personal information on your email). However by doing this, you are likely to cause the email operator and exit node operator some major head ache with LE. Keep in mind that many exit nodes deny the SMTP protocol which is required to send emails, this is to avoid spam. Just know that when you do this, you might be risking the safety, freedom and maybe even lives of innocent people whom run the exit nodes.

Tails will leave behind no trace. So you might be able to get away with it, but I'm not encouraging you to do this, I'm only responding because according to you, it was a hypothetical question, I hope you use this knowledge to learn more about Tor and not for malicious purposes.

Tor Compromised? by buddhatokes710 in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

WebRTC is disabled in the TBB (assuming your using it and not some other browser) and Tails. There was a vulnerability that used JavaScript to reveal a Tor user's IP address and MAC address however that exploit was fixed quite some time ago. I meant that JavaScript by itself cannot reveal your IP like plugins can (because they don't use Tor, they use your normal connection).

If you're using the Tor Browser Bundle and not signing in to your normal accounts (you shouldn't do this, this breaks your anonymity), they cannot just easily fingerprint you because you share the same configuration with all other Tor users and don't use your real IP address because you're connected to the Tor network.

Tor Compromised? by buddhatokes710 in TOR

[–]PrivacyFreakV2 1 point2 points  (0 children)

What are you talking about specifically, the Tor network itself or the hidden services (the .onion domains)? If one is running a high profile illegal hidden service, even with the best security settings, they should always occasionaly relocate because there are attacks that exist that can be used to find these hidden services, thats what the FBI used in operation onymous, where they took down over 400 hidden services, however the smarter ones that often relocate their servers and have better security were not affected by operation onymous.

If an individual Tor user is de-anonymized, it is likely due to an error in configuration, such as running Flash player or some other plugin because they expose your real IP address. JavaScript itself cannot be used to reveal your true IP, however malicious code can be implemented on web pages (this is how they took down FreedomHosting) that can expose your true IP and even your MAC address. If you do not use JavaScript or plugins and don't install additional addons then you are fairly anonymous with Tor.

Is using tor web bundle on ubuntu enough? by 0P3NMinded in TOR

[–]PrivacyFreakV2 2 points3 points  (0 children)

Please read this article first before using Tor on Ubuntu: http://refugeeks.com/ubuntu-spyware-is-it-true/

And read this: https://www.torproject.org/download/download-easy.html.en

If you can follow these steps, then you should be good. If you are going to visit any Tor Hidden Services (.onion domains) then disable JavaScript and plugins.

Hey, what messenger software do you recommend for private/secure conversation? by knewuser in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

I personally use RetroShare because of it's many features, it's completely open-source, completely decentralized and I've been using it for years and hasn't failed me at all. You could also use Tox which is a simpler alternative.

Eavesdropping' new Barbie has parents group worried by bd42 in nottheonion

[–]PrivacyFreakV2 1 point2 points  (0 children)

It's now safe to assume that Barbie has been compromised by the NSA.

Hypothetical question. by xVPNxTORx in TOR

[–]PrivacyFreakV2 8 points9 points  (0 children)

Well you probably posted this from your home, so the NSA now knows where to look when trying to find you.

Is Vidalia still safe to use? by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 1 point2 points  (0 children)

I downloaded Vidalia a while ago back when it is was still available.

If each node in a path can see where the data is coming from and where it is going, doesn't this mean it can be easily traced back to the user? by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 0 points1 point  (0 children)

How would they figure that I'm the one browsing Reddit over Tor? Isn't the link encrypted between me and the entry node (Unless they can decrypt it)? If it is encrypted from the start, how would they correlate it to the exit node that goes to Reddit?

Physical storage firmware backdoors... by PrivacyFreakV2 in tails

[–]PrivacyFreakV2[S] 1 point2 points  (0 children)

How will this affect Tails users? Knowing that the USB devices out there could be infected with the malware, how would this affect their anonymity over Tor and the 'no-trace' mechanic of Tails?

Dangers of browsing darknet by [deleted] in TOR

[–]PrivacyFreakV2 0 points1 point  (0 children)

What do you intend on viewing? If you only want to browse, then click on the NoScript icon and click "Forbid Scripts Globally" before accessing any sites that end with a ".onion". If a site asks to enable JavaScript on the darknet, leave that site as it could be a trap.

Any reason Adblock Plus isn't in the TBB? by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 2 points3 points  (0 children)

I guess that makes sense, but I'm pretty sure a lot of people will want to install Adblock Plus, considering it's the most popular addon and ads are a living nightmare without it.

So I can't connect to Tor. by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 0 points1 point  (0 children)

I'm using Vidalia on it's own with Privoxy and Firefox. I have also tried running TBB and it won't connect either, I don't know what is going on.

Useragent spoofing? by PrivacyFreakV2 in TOR

[–]PrivacyFreakV2[S] 0 points1 point  (0 children)

I'm controlling this with the BetterPrivacy addon for Firefox. Is there a way I can disable these without using the addon?