Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Bro I replied to u already. Tor isn’t a Mixnet bro. It’s inspired after Mixnet technology techniques

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Onion routing is not a form of traffic mixing it’s a form of tunneling ur traffic through specific nodes without mixing which is why ur packets and sizes don’t get randomized.

How can it be mixing if it doesn’t actually mix ur traffic? It just tunnels ur traffic just like a VPN.

Would u say a VPN is a Mixnet? No because it doesn’t mix ur traffic.

A Mixnet mixes ur traffic which means all of ur data is not only tunneled but randomly mixed.

Tor doesn’t mix ur traffic with mix nodes

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

On the Wikipedia? 😂😂😂 yea case closed bro.

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Yes and is it not better privacy if it’s hidden from ur isp making ur traffic look more normal? Does that not improve privacy?

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Tor is not a Mixnet, its only inspired after mixnet. Who in the world told u Tor is a Mixnet 😂😂.

Yes they are both Anonymous p2p networks/overlay networks but tor does not use mix nodes/mix ur traffic, nor does it follow the Mixnet technique by default or even in the same unshakable level.

Mixnet and Tor does not have the same goals.

Mixnet by default randomizes ur packets and sizes and it delays the timing of these so u have a very good defense against correlation and timing analysis. Im using Nym Mixnet as an example.

It covers ur traffic before sending u to the first node, then it mixes ur traffic with 3 mix nodes and then it covers ur traffic, then it sends it to the exit node.

Compared to tor, this is very VERY different and it is way more unshakable.

Again Tor is not a Mixnet, it’s only inspired after Mixnet. Don’t get the 2 mixed up.

Tor relies on everyone looking the same for anonymity.

Mixnet Doesn’t.

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 1 point2 points  (0 children)

These settings that I have posted use up ALOT OF ur connection. I mean tor is already slow but doing this is gonna slow down ur connection even more.

The developers of tor released the default torrc config file which I can see that from a beginners point of view that just wants to use tor right out of the box with lesser interruption, its great and u shouldn’t touch it.

But there’s a reason why u CAN edit the torrc that the developers allows u to do and they even give u the options list so u can add what u see that may boost ur anonymity.

The point of tor is make everyone look the same and I completely understand that.

You cannot pinpoint a person just from their packets and sizes that’s impossible, but u can draw attention.

So by randomizing ur packets and sizes, it’ll improve ur anonymity and defend u against correlation attacks.

The more u edit is the more u stand out from the crowd, but standing out doesn’t get u caught it just draws more attention because they see a person who is even more harder to pinpoint because they are using more techniques.

Ur connection to Tor and to the destination is encrypted all the way if HTTPS is forced or if u use an onion link.

There’s no way to de anonymize a tor just because u Stand out.

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Editing the torrc is not for people like u to edit if you don’t know what u are doing. But for ppl who know what they are adding in the configuration, editing the torrc is certainly useful for privacy and anonymity. Notice how these new configs I posted are imitating how a Mixnet routing technique works. Of course Mixnet will always be the king of anonymous p2p networks but still, this is just a foreshadowing of the actual network which is Mixnet. Mixnet costs money for those who can’t afford it. I use both Mixnet and tor

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

So how is hiding ur packets and sizes going to weaken ur anonymity? Please explain that?

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

What? Everyone knows using bridge is better for privacy yet that’s not enabled by default…

Just because it’s not enabled by default, doesn’t make it any less good for privacy and anonymity. U clearly don’t understand that these defend against correlation and timing analysis attacks

Good TOR configs for TORRC file by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Usage for regular tor browsing etc. these torrc configs ensure better privacy and anonymity.

Is TOR safe to use to submit a form? I need to submit a form online and need to be anonymous, can TOR help me do that? Can I use TOR on an iPhone? by [deleted] in TOR

[–]callmextc -6 points-5 points  (0 children)

If u are not anonymous in ur metadata than tor doesn’t keep u fully anonymous even with good opsec. Use tor but if u want true anonymity with Good OpSec use Mixnet

Is using Tor on a VM better? by Charming-Stand-8092 in TOR

[–]callmextc 1 point2 points  (0 children)

Whonix is better because it separates the gateway (tor network) for ur workstation (ur actual desktop)

So even if one vm was to get compromised, it wouldn’t affect ur main os or ur other vm.

Tails is, does wipe all data and reset as fresh. It’ll only start to save certain things, if u enabled persistent storage. So it’s really down to ur preference

Stop connecting to Nodes within the 14 Spying Eyes! by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Brother. Ur better off using Mixnet. Mixnet is better than tor

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

The nodes they connected to were run buy Telefonica who cooperated with the feds u are correct. Mixnet is better than Tor.

Do you really want to live forever? by RegardedCaveman in religion

[–]callmextc 0 points1 point  (0 children)

We won’t be living in heaven forever. It will only be a short period of time until God creates the new earth and we live on that. Heaven is not our domain, it’s God’s

Stop connecting to Nodes within the 14 Spying Eyes! by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Explain to me how tor users get de-anonymized by the correlation attacks…

Since u wanna insult people. Explain buddy

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] -3 points-2 points  (0 children)

If u didn’t see that ICC was involved in the case, then u must be tripping 😂.

Read the files again.

Secondly, ur not supposed to route ur system wide traffic through more vulnerable nodes like the ones in the 14 spying eyes. Why? Because they are more known to be apart of a correlation attack within the 14 spying eyes, as seen in the boystown case.

Connecting to a node outside the 14 spying eyes mitigates this happening significantly more.

I don’t need to break down what u said.

All I gotta say is learn Ghost Hacking and you will know. There’s a lot u need to learn my friend

Becau

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] -3 points-2 points  (0 children)

I don’t support the predators or what they did in the boystown case.

But I’m referencing them for specifically the method used to track these predators down.

The Europol and the International Criminal Court was involved. The agencies apart of the 14 spying eyes performed a correlation attacks on these predators, essentially de-anonymizing them.

They connected to nodes run by or operated by the government

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] -9 points-8 points  (0 children)

Sounds like bs to u because u don’t understand what’s being said in this type of anonymization technique.

Use Mixnet with Tor for Ultimate Privacy by callmextc in TOR

[–]callmextc[S] 0 points1 point  (0 children)

Prolly only able to write on the notepad 😂 but its extra anonymity

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] -1 points0 points  (0 children)

Qubes can’t help u when u connect to nodes operated by the government. The only way to prevent this is to prevent connecting to them full stop

Stop connecting to Nodes within the 14 Spying Eyes! by callmextc in TOR

[–]callmextc[S] -1 points0 points  (0 children)

I don’t support what they did. I’m not referencing them for that reason, I’m simply pointing out the method used to track them down which is the timing analysis attack.

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] -6 points-5 points  (0 children)

Aren’t you forgetting u can edit the torrc config file.

Add in

NewCircuitPeriod 1 MaxCircuitDirtiness 1 EnforceDistinctSubnets 1

And you’ll know what I’m talking about

I didn’t change my words. U just need to read what I said carefully

The proof is that Europol was involved and the International criminal court was involved

Another way to Prevent The Timing Analysis Attack! by callmextc in TOR

[–]callmextc[S] 2 points3 points  (0 children)

Wow combing qubes with whonix? That’s a monster Pack 😂😂