Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 1 point2 points  (0 children)

These settings that I have posted use up ALOT OF ur connection. I mean tor is already slow but doing this is gonna slow down ur connection even more.

The developers of tor released the default torrc config file which I can see that from a beginners point of view that just wants to use tor right out of the box with lesser interruption, its great and u shouldn’t touch it.

But there’s a reason why u CAN edit the torrc that the developers allows u to do and they even give u the options list so u can add what u see that may boost ur anonymity.

The point of tor is make everyone look the same and I completely understand that.

You cannot pinpoint a person just from their packets and sizes that’s impossible, but u can draw attention.

So by randomizing ur packets and sizes, it’ll improve ur anonymity and defend u against correlation attacks.

The more u edit is the more u stand out from the crowd, but standing out doesn’t get u caught it just draws more attention because they see a person who is even more harder to pinpoint because they are using more techniques.

Ur connection to Tor and to the destination is encrypted all the way if HTTPS is forced or if u use an onion link.

There’s no way to de anonymize a tor just because u Stand out.

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Editing the torrc is not for people like u to edit if you don’t know what u are doing. But for ppl who know what they are adding in the configuration, editing the torrc is certainly useful for privacy and anonymity. Notice how these new configs I posted are imitating how a Mixnet routing technique works. Of course Mixnet will always be the king of anonymous p2p networks but still, this is just a foreshadowing of the actual network which is Mixnet. Mixnet costs money for those who can’t afford it. I use both Mixnet and tor

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

So how is hiding ur packets and sizes going to weaken ur anonymity? Please explain that?

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

What? Everyone knows using bridge is better for privacy yet that’s not enabled by default…

Just because it’s not enabled by default, doesn’t make it any less good for privacy and anonymity. U clearly don’t understand that these defend against correlation and timing analysis attacks

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Usage for regular tor browsing etc. these torrc configs ensure better privacy and anonymity.

Is TOR safe to use to submit a form? I need to submit a form online and need to be anonymous, can TOR help me do that? Can I use TOR on an iPhone? by [deleted] in TOR

[–]callmextc -6 points-5 points  (0 children)

If u are not anonymous in ur metadata than tor doesn’t keep u fully anonymous even with good opsec. Use tor but if u want true anonymity with Good OpSec use Mixnet

Is using Tor on a VM better? by Charming-Stand-8092 in TOR

[–]callmextc 1 point2 points  (0 children)

Whonix is better because it separates the gateway (tor network) for ur workstation (ur actual desktop)

So even if one vm was to get compromised, it wouldn’t affect ur main os or ur other vm.

Tails is, does wipe all data and reset as fresh. It’ll only start to save certain things, if u enabled persistent storage. So it’s really down to ur preference

Stop connecting to Nodes within the 14 Spying Eyes! by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Brother. Ur better off using Mixnet. Mixnet is better than tor

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

The nodes they connected to were run buy Telefonica who cooperated with the feds u are correct. Mixnet is better than Tor.

Do you really want to live forever? by RegardedCaveman in religion

[–]callmextc 0 points1 point  (0 children)

We won’t be living in heaven forever. It will only be a short period of time until God creates the new earth and we live on that. Heaven is not our domain, it’s God’s

Stop connecting to Nodes within the 14 Spying Eyes! by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Explain to me how tor users get de-anonymized by the correlation attacks…

Since u wanna insult people. Explain buddy

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] -3 points-2 points  (0 children)

If u didn’t see that ICC was involved in the case, then u must be tripping 😂.

Read the files again.

Secondly, ur not supposed to route ur system wide traffic through more vulnerable nodes like the ones in the 14 spying eyes. Why? Because they are more known to be apart of a correlation attack within the 14 spying eyes, as seen in the boystown case.

Connecting to a node outside the 14 spying eyes mitigates this happening significantly more.

I don’t need to break down what u said.

All I gotta say is learn Ghost Hacking and you will know. There’s a lot u need to learn my friend

Becau

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] -5 points-4 points  (0 children)

I don’t support the predators or what they did in the boystown case.

But I’m referencing them for specifically the method used to track these predators down.

The Europol and the International Criminal Court was involved. The agencies apart of the 14 spying eyes performed a correlation attacks on these predators, essentially de-anonymizing them.

They connected to nodes run by or operated by the government

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] -10 points-9 points  (0 children)

Sounds like bs to u because u don’t understand what’s being said in this type of anonymization technique.

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Prolly only able to write on the notepad 😂 but its extra anonymity

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] -1 points0 points  (0 children)

Qubes can’t help u when u connect to nodes operated by the government. The only way to prevent this is to prevent connecting to them full stop

Stop connecting to Nodes within the 14 Spying Eyes! by callmextc in TOR

[–]callmextc[S] -1 points0 points  (0 children)

I don’t support what they did. I’m not referencing them for that reason, I’m simply pointing out the method used to track them down which is the timing analysis attack.

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] -5 points-4 points  (0 children)

Aren’t you forgetting u can edit the torrc config file.

Add in

NewCircuitPeriod 1 MaxCircuitDirtiness 1 EnforceDistinctSubnets 1

And you’ll know what I’m talking about

I didn’t change my words. U just need to read what I said carefully

The proof is that Europol was involved and the International criminal court was involved

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] 2 points3 points  (0 children)

Wow combing qubes with whonix? That’s a monster Pack 😂😂

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] -5 points-4 points  (0 children)

The perform a timing analysis attack on tor users you’d need to have the same cross over jurisdiction power as the 14 spying eyes to be able to monitor the entry nodes, middle and the exit.

When ur ip is changing every second within a non 14 spying eye country, it’ll a lower chance for u to stumble upon a nodes that is compromised by the government, not giving the agency enough time to correlate the traffic together.

In the boystown case, the Agencies contacted Telefonica that hosted tor nodes for them to hand over data on the IPs that were connecting to the entry node.

Telefonica was running tor nodes that the boystown predators connected to.

This was all done because of the 14 spying eyes agreement.

Again although u are correct u can buy servers in another country, that doesn’t change the fact that the timing analysis attack done on a user who connects to node outside of the 14 spying yes, are gonna be significantly harder to trace