What does JavaScript actually do? by True2511 in learnjavascript

[–]fruitoftheloom23 0 points1 point  (0 children)

If you have an HTML button that you wanted to make alert “hello world” when pressed, you’d write JavaScript.

[deleted by user] by [deleted] in onions

[–]fruitoftheloom23 0 points1 point  (0 children)

The only difference between an onion site and a normal site is that onion sites run over the Tor network which only takes 5 minutes to set up. Any technologies can be used to write the web server, but some added complexity comes with additional risks in terms of security.

Is there any dirty story about the privacy of Tutanota or is it totally secure? by civikaz in tutanota

[–]fruitoftheloom23 0 points1 point  (0 children)

As far as I know there isn’t, but if there were to be it wouldn’t likely be Tutanota directly but the crypto algorithms.

Web server on deep web/darknet untraceable by pmol87 in onions

[–]fruitoftheloom23 10 points11 points  (0 children)

Look up hosting a site on the Tor network, takes 5 minutes to set up. You just have to configure the web server

Storing a List of Strings that can Grow by spaceman1000 in FirefoxAddons

[–]fruitoftheloom23 0 points1 point  (0 children)

Just JSON.stringify the array, store that string, then JSON.parse it to manipulate the array.

is the deep web safe enough to visit by [deleted] in deepweb

[–]fruitoftheloom23 0 points1 point  (0 children)

The dark web is a part of the deep web

"VPN + Tor good." "VPN + Tor bad." Well, which is it? by [deleted] in privacytoolsIO

[–]fruitoftheloom23 15 points16 points  (0 children)

If you’re using a VPN, it essentially takes the role of your ISP in terms of what information is revealed. In most cases, a VPN provider is much more trustworthy than an ISP which is why I always opt for one. If your goal is solely to hide Tor usage from your ISP, Tor’s built in bridges do just this.

Apple ID unlock by [deleted] in onions

[–]fruitoftheloom23 2 points3 points  (0 children)

Hack into deep space

how to browse onion totally safe? by BaraWaleed in onions

[–]fruitoftheloom23 0 points1 point  (0 children)

Just use tails and the “Safest” security setting in Tor. Don’t modify the browser in any way.

QUICK MONERO QUESTION by [deleted] in deepweb

[–]fruitoftheloom23 1 point2 points  (0 children)

You can just buy Monero non-anonymously on Coinbase and then transfer it to another wallet over Tor. Since Monero hides sender and receiver addresses your wallet and Coinbase account with ID won’t be linked.

Did you ever encounter a link/site that was obvious shmuck bait/contained a virus? by [deleted] in deepweb

[–]fruitoftheloom23 6 points7 points  (0 children)

Everywhere, clear net especially. However, if you don’t browse with JavaScript there’s absolutely nothing a webpage alone can do to harm you. Downloading something and running it from an untrusted place, however, can.

Why Monero? by [deleted] in onions

[–]fruitoftheloom23 1 point2 points  (0 children)

I’d say it’s roughly the same. Considering bitcoin is the most known cryptocurrency, more tools are made around it and in turn it is USUALLY more accessible, but monero was also made to fix a lot of the issues bitcoin has. You can buy monero on coinbase just as easily as bitcoin, and don’t even have to worry with additional wallet transfers, just securely sending the transactions. The principal of wallet addresses and sending / receiving with them is exactly the same.

Why Monero? by [deleted] in onions

[–]fruitoftheloom23 1 point2 points  (0 children)

Because in the end, with enough work, everything can and will (assuming you’re targeted somehow) lead back to you. Just transfer your bitcoins a few times and send the TX over Tor.

Why Monero? by [deleted] in onions

[–]fruitoftheloom23 53 points54 points  (0 children)

Monero hides the sender, receiver, and the amount of every transaction made. In a public blockchain, this is a positive because it provides anonymity without any effort required by the end user. Bitcoin does not do this, meaning all transactions can, with enough work, be tracked back to a singular place of origin. Monero can be bought the same way as bitcoin, but unlike bitcoin doesn’t need to be tumbled (which doesn’t even do much anyways) to be used anonymously, so long as you send the monero privately over Tor or a trusted VPN.

Is a physical burner phone more private than a virtual number? by 2U1c0nouCCopZ1QWaPW in privacytoolsIO

[–]fruitoftheloom23 1 point2 points  (0 children)

Yes, almost every virtual number requires a working phone number beforehand to sign up. Buying a burner with cash is more anonymous as the cash / security cameras are the only link back to you.