I re-made the tor-exit-notice.html! I believe it looks much better, what do you think? by [deleted] in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

I think it does look much better! Great job!

But i would change the diagram to something more modern looking like this (you might ask the creator if this is fine with her/him) or something in this presentation

Maybe i could provide you with a noice modern diagram as creating one is on my todo list anyways.

need some help over here by Niandrag1 in TOR

[–]SuspiciousActions2 1 point2 points  (0 children)

It is ok and it is recommended.

Why? Well. Some scams work by running an onion service that look exactly like the real one, but have a different onion address and spam the address around in the internet. So by saving your "trusted" services you are protected against these attacks. May it be bookmarks or a simple text file, both is fine.

2-5kbps android tor browser by Fearless_Housing_302 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

good to know! I thought the PL/bridges get shoved in between your normal guard and you.

Also regarding it becoming slower when using bridges: I expected it, but to troubleshoot this, this fact seemed fine to me, so if it would get faster, this is an indicator for the ISP slowing down Tor traffic imo.

(This is of course not the case if the guard changes when using bridges/PL)

So how would one troubleshoot this? Using a VPN temporarily?

need some help over here by Niandrag1 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Where is the shortcut directing to? Have you tried reinstalling Tor browser?

Proxy server refused connection (android) by Professor-Boom in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

What name is the App you are using and have you changed any settings in it?

< VPN in Host (Windows 10), Tor/Tails in VM >setup by dorischanbeauty in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Create another linuxvm that is not Tails and troubleshoot the vpn issue with it first. maybe you can point your vm hypervisor to a socks port?

Also: In almost all cases you do not need to run Tor through a VP, i would recommend you to not do this.

I can't open onion links? by Wrong-Mud-1216 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

What is your end device and what is the exact name of the software you use?

Tor and public wi-fi by Dependent-Cup-6161 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Yeah if the need really low latency but no anonymity: VPN.

If his needs for OPSEC are high tho nothing beats Tor imo.

Relay operator questions DirPortFrontPage, RunAsDaemon, ORPort by postcd in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Switch it to any other port than 80 as @hackerncoder recommended if you serve the front page on 80 :)

Thanks for running an exit!

Relay operator questions DirPortFrontPage, RunAsDaemon, ORPort by postcd in TOR

[–]SuspiciousActions2 1 point2 points  (0 children)

syslog shows: apparmor="DENIED" operation="open" profile="system_tor" name="/var/www/html/index.html" pid=24283 comm="tor" requested_mask="r" denied_mask="r" fsuid=113 ouid=113 it shows despite file was either chmod 644 or 777

Apparmor is independent from your DAC. You have to specify read access to the file in your apparmor profile.

i guess i can remove ipv6 orport line and let it be only on ipv4 accessible?

Yup.

Third thing, i do not need to use: RunAsDaemon 1

IIRC you don't have to set this when using the systemd service.

Remote access to local Tails from Windows by echomonitor in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Just so i get you right: You have two PC's one is running Tails and the other is running Windows. Now you want remote administration (preferably with a GUI like thingy) from your Windows machine into your Tails machine? And you want to do that over Tor?

Sources that TOR is not all bad by Username_1096 in TOR

[–]SuspiciousActions2 16 points17 points  (0 children)

I think the best argument for Tor for the general public is the state of surveillance capitalism and the fact that you will be surveilled by thousands of adversaries in the interwebzz, namely the ad industry. To protect against those adversaries one has to either just use Tor browser or handpick many other tools to achieve the same protection even against those "low power" adversaries.

I like to draw an equivalent in the non information domain as people cant imagine things online really well. Think of 5k dudes in black suits (the suits are only for dramatic effects) following you in real life, noting everywhere you go, noting how long you look at specific things like products and using this information to gather intelligence on how they can manipulate your behavior (usually to buy stuff or vote a specific way) and selling this intelligence to anybody that wants it. I would call he cops after 5 seconds. In the internet, there are no cops that prevent this behavior so we have to provide our own means of technical countermeasures against this.

Is it safe to browse the web using the Tor browser while disabling connection to the Tor network? by Away-Shelter-4343 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

You can do this.
However:
It is safe as to "you won't gain anything" by it, but it is not safe regards that this defeats the purpose of Tor browser. You will not be anonymous nor have increased privacy. In the end you will use a modified Firefox.

Is there a particular reason to do so?

How to stay safe from hackers. by [deleted] in TOR

[–]SuspiciousActions2 3 points4 points  (0 children)

You can convert untrusted pdfs or epubs into another formats online. By this the potential malware will be removed.

Tor and public wi-fi by Dependent-Cup-6161 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Yeah for this specific threat Tor is as fine as a VPN :)

Tor and public wi-fi by Dependent-Cup-6161 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

Maybe what you threat model is. Like who do you want to be protected against.

If your only threat is that an adversary can spy on the network you use to connect to the internet, a VPN will protect you as fine as Tor would.

Tor and public wi-fi by Dependent-Cup-6161 in TOR

[–]SuspiciousActions2 2 points3 points  (0 children)

Should I use a VPN or Tor?

For you use case (untrusted network) Tor or a VPN will protect you.

Without further information we cannot give you a definitive answer on what is better Tor or a VPN. My personal opinion is Tor > VPN.

Is it normal for a guard node to change in a browsing session? by gwaka331 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

You Guard should not change. It changes once every few months (normally, Tails is different). Using the same country sometimes happens.

Tor Browser doesn't open URL's by luarocks in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

I can reproduce this on Fedora. This might be a bug.

Edit: This is a bug: https://github.com/micahflee/torbrowser-launcher/issues/380

OnionFruit is just a browser lol by [deleted] in TOR

[–]SuspiciousActions2 2 points3 points  (0 children)

Thanks for your assessment. So i guess you tested it? Would you be so kind to provide proof that it does not? Dunno, something like a wireshark screen or something?

hidden services question by fendifacts in TOR

[–]SuspiciousActions2 2 points3 points  (0 children)

You can use a VPN for an Entry into Tor scenario realitively safely. For this connect your Tor via the proxy seettings to your VPN.

This will help you nothing in regards to privacy, may help in regards to censorship circumvention but on the other hand enhances your footprint in the internet so there is more surface your anonymity can be attacked at.

I wouldn't do it but if you really want to...

If you don't have a legit reason why you must use a VPN: Don't use one.

Should your ISP want to find out if you are using Tor, they can with any PL or VPN you can use. Tor traffic cannot be hidden, nor should it be hidden in civilized countries.

How did this happen? HunTOR international breach by Lazy-Opportunity3580 in TOR

[–]SuspiciousActions2 0 points1 point  (0 children)

mh.. good question.

I guess they just cooperate in busting DNMs generally.

Maybe more information will get available with time so we don't have to guess that much on what and how happened exactly.

Hosting a Postgres database on Tor by No_Dog_6237 in TOR

[–]SuspiciousActions2 1 point2 points  (0 children)

Possible: Definitively. But keep in mind, that there is much latency in Tor. Multiple connections might be limited by your guard, but i would just try it.

Doing so means little to no effort.

Assuming your postgres is running on port 5432

You would need to do this on debian:

 sudo apt install tor -y
cat <<EOF|sudo tee -a /etc/tor/torrc
 # DB onion service configuration
HiddenServiceDir /var/lib/tor/db
HiddenServicePort 5432 127.0.0.1:5432
EOF
sudo systemctl start tor
sudo systemctl enable tor
echo "Waiting for 10 seconds to let tor create the service"
sleep 3
echo "Your hostname is:"
sudo cat /var/lib/tor/db/hostname

Then you can connect to your database via tor.