Is this the only way to browse the interwebs with any ounce of privacy?

Is this the only way to browse the interwebs with any ounce of privacy?

Attached: 1200px-Tor-logo-2011-flat.svg.png (1200x725, 74K)

Other urls found in this thread:

github.com/Valve/fingerprintjs2/blob/master/fingerprint2.js
twitter.com/SFWRedditVideos

i2p is probably better

nu-Jow Forums says it's a US gov honeypot, so yea its good.
like this faggot repeating memes like a underage retard

>nu-Jow Forums
Are you retarded? Its weaknesses have been widely publicized in the past 5 years. Just because you haven't kept up to date (or more likely didn't know what Tor was back then) doesn't mean it's a meme.

You realize TrueCrypt was compromised too, right? Do you know what TrueCrypt was?

>Its weaknesses have been widely publicized in the past 5 years
link me senpai fake news faggot

Not for web browsing but for hidden sites yes

install a operating system that respects your privacy, get a decent vpn service and learn the basic concepts of opsec. tor is compromised, don't use it unless you have to, for whatever reasons.

Its not bulletproof but it's the best there is. Use it with whonix and de-anonymization becomes even more difficult. Whonix can't leak your IP because it doesn't even know your real IP. An attack would have to compromise both Tor and then escape a VM.

Attached: snap2.gif (575x420, 54K)

lol I can already tell you're an idiot stoner who uses Tor on Android for questionable porn searches.

I'm not going to go through the history of Tor exploits with you. they're easy to find in Google. Tor's fundamental structure means privacy can be compromised if the 3 letter agencies control a high percentage of exit nodes (they do). Burn your phone.

kek i dont use it desu, but i've read enough about it and their core team is pretty good and among the best in cryptography and cyber security. its free software and i'd trust it over any VPN private shit. btw, since you cant prove your assumption thats just enough proof for me to spot the newfag repeating fake news. go to Jow Forums you gonna have more fun its fit for your kind. piss off

Yeah but Russia and China may have they're fair share of exit nodes as well. In fact that latest router botnet that fancy bear had set up was using Tor. It tells me something when a nation state cyber unit like Fancy Bear (APT28) uses Tor. They must have some degree of confidence in it. There's also the famous Snowden leaked PowerPoint slide from the NSA saying "Tor sucks". That was years ago however and I'm sure three letter agencies are working as hard as they can to exploit Tor.

the exit nodes are already useless, hidden services are where it's at

That's where i2p shines. I2p does hidden services and file sharing much much better than Tor. Tor is better for doing things over the clearnet though.

He said exit nodes you idiot. You lack the basic knowledge of how network operates.

I'm seeing a theme of claims I2P is better than Tor for hidden services. What features does I2P have over For that makes it better?

Yes. it is the most secure way to hide your ip

Yes, it's the only decent thing we have. Al VPNs are botnets. Tor is the only solution.

>i2p is probably better
You can easily get tracked when only three people use the service. Just saying.

>TrueCrypt was compromised
You are retarded. It has even been audited. Have been found some issues, but nothing that would compromise you if you use it with care.

>Its weaknesses have been widely publicized in the past 5 years
There are many dumb things you can do to expoze yourself within the Tor network. That doesn't mean Tor is not safe to use.

You can't even post here using Tor. What's the point?

According to American law using TOR forfeits your right to privacy and they can seize your computer without a warrant.

>internet
>privacy
Just live in the woods at this point.

Didn't they have a talk at the last defcon detailing how they were beefing up Tor or am I imagining things?

Tor is basically useless for browsing the clearnet because without JS you'll just get white pages and cloudflare captchas you can't solve. You enable JS and you may as well just not use Tor.

no, you can leave ESP on someone's network with solar battaries and run VPN server on it. everybody who runs an exit node in Tor can packet sniff.

Literally CIA botnet used as the FBI's most trustedd honeypot
Ofcourse not good goyim!

Jesus Christ I don't like polacks either but you're retarded and obviously underage

Attached: 1527081435371-g.jpg (900x900, 110K)

GNUnet

Truecrypt got audited when it was already abandonware and not major vulnerability was found.
Get your facts straight Mr. faggot NSA shill.

t.NSA shill

Attached: 1511300945298.jpg (623x735, 238K)

Great argument, faggot.

So is it actually worth using? The browser is retarded slow and I don't want to put up with that if it's a meme

do not use the Tor browser, Tor can be used as a daemon and can be accessed as a SOCKS5 proxy by your apps like a modern version of chrome or firefox using some proxy addon or even using the browser config. You can tor to execute anonymous nmap or curl commands. It can just work as a proxy whenever you want to use it with anything

>So is it actually worth using?
Yes.

>The browser is retarded slow
What is slow? The internet speed? The rendering? If it's the later, expect an update soon, based on Firefox 60. If it's the first, you can mend it, at the cost of some privacy, by blacklisting shit countries far from you.

Attached: tor_speed.png (1287x705, 55K)

Tor is for browsing clearnet, that means the web for you noob faggots.
I2P is the better choice for what it is, a darknet, its own separate part of the Internet so to speak for you, but can't access the regular Internet.
GNUnet is the future, can replace the entire protocol the Internet is based on and with privacy and security in mind. Is stupidly only used for filesharing atm, but is so difficult to trace what you share that comes with all its downs too.

Attached: gnunet.png (1280x1057, 528K)

Is there a guide on how exactly I can do that? The site only points towards the tor browser download.

How effective is using Tor with a VPN?

This retard over here.

Attached: 1512283645054[1].png (300x300, 9K)

>"hide" you on the internet
>blocked on Jow Forums

How does this work?

this guy gets it

Attached: 52592491gnunet.png (2000x1909, 222K)

Jow Forums is compromised
Go to 8cuck for a better chan

what OS do you use?

I use archlinux, so it's pretty easy there
sudo pacman -S tor #install tor
sudo systemctl start tor.service #start the service
sudo systemctl enable tor.service # do this to make it load automatically in startup so you don't need to start it everytime you need tor


and then in your browser settings or using some proxy addon like foxyproxy add the SOCKS5 proxy 127.0.0.1:9050


that's the basic thing, you don't need this outdated tor browser shit, you can use tor with any browser or any other application you want

fpbp
>You can easily get tracked when only three people use the service. Just saying.
t. fag who hasn't even tried it.

Thanks.

Why not use proxychains to open the program? Proxychains use Tor by default.

Isn't this risky? The applications themselves might have security risks that exposes/leaks data.

of course you can, it's useful when used with command line like nmap or something, but with browsers, you just need to add 127.0.01:9050 in your SOCKS proxies

I'd say that modern versions are generally more secure than old versions used by Tor browser, you just need to enable default privacy settings like WebRTC ip leak protection which is available in ublock, also old browsers can break your browsing experience if the website uses features that aren't implemented by that old firefox version (52 currently, right?)


tor browser is a fast solution for those who don't understand anything about tech (journalists, activists, etc...) but need a anonymous solution that just works

just use whonix or tails, the browsers are hardened and won't leak

I can’t believe what I’m reading here. Tor Browser literally has changes to protect your privacy that you can’t just willy nilly go into about:config on your standard Firefox release and modify.

Using Tor for your basic clearnet browsing is going to be better because the Tor browser shares the same fingerprint with every other Tor Browser, provided you don’t install any other addons. Allowing you to blend in the crowd.

If you just connect to Tor and use the same browser with your million and one addons, the only difference will be they’ll see a completely foreign IP, but that same unique to you browser fingerprint will be all over every website you’ve been to now and then.

browser fingerprint is not a big issue, having a unique fingerprint is not a vulnerability, also it can simply solved by just spoofing your user agent so your fingerprint hash changes periodically and you cannot be tracked if you're too paranoid

What a dumb retard holy hell

refute my argument and prove that I am a retard

you can be fingerprinted in many ways, installed fonts, gpu drivers, local storage, etc

Yes, if you're a dumbass who doesn't know how to implement your own encryption.

the fingerprint is a hash that combine the values of all these values

see an implementation yourself github.com/Valve/fingerprintjs2/blob/master/fingerprint2.js

and stop calling others retards without even trying to understand the subject

why hide from these random statistics bots?

Snap is cringe itself

that doesnt consider changes :S

that' what I was talking about you retard, if you spoof your user agent periodically, the overall hash will be changed

The exit nodes are compromised.

Attached: yes.jpg (1600x1200, 286K)

what if they arent using that hm why dont they just track ips

that's a naive implementation of a fingerprint, i guarantee the big boys will save everything and statistically relate them with a confidence interval

ITT: government agents misdirecting people

still, spoofing any parameter that's measured will compute a completely different hash

did you learn what a hash is today, because hashes have nothing to do with this, why would someone wanting to track you throw significant bits away with a hash

>exercising your right to privacy forfeits your right to privacy
explain

what are you talking about? I really don't get what you mean

You can go to browserleaks.com and run the simple tests that are available to see how simply just spoofing your user agent isn’t enough. There’s a million and one other ways you can be tracked.

The point of the Tor browser is you don’t have to worry about changing any of this shit for yourself, you just run it and blend in with the millions of other people with the same browser as yourself.

brb making super tracker

like I said before and refute my point if you see me wrong, if you have a rare fingreprint/hash, that's not a vulnerability itself, it can be a weakness if it produces the same value again and again, then trackers will link the hash to your activity across the different websites

>Its weaknesses have been widely publicized in the past 5 years
ITS FUCKING OPEN-SOURCE YOU RETARD, ITS WEAKNESSES ARE PUBLIC ALL THE TIME

>Tor's fundamental structure means privacy can be compromised if the 3 letter agencies control a high percentage of exit nodes (they do).
Thats why you avoid using unencrypted connections such as http or e2e
Its not hard to not be a brainlet in regards to exit nodes

>tor is compromised, don't use it unless you have to, for whatever reasons.
Source?

Jow Forums already has a lot of cp posters dumping shit on their normal IPs, if they allowed them to hide it, they would just have to block every single tor IP eventually
Or they could sake a similar apporach like (18/3)chan ans only allow text posts via tor, but good luck trying to convice hiro of that

>DON'T USE TOR!!!1ONEONE
>recommends vpn
sometimes I feel like there are only datamining bots here now and no humans, or most threads are some encrypted bilderberg meetings or some shit, i don't know
inb4 no response, nothing
yeah, I knew that, BOTS...