>Stop listening to people here. They're retards that don't know anything about TOR or how it works. TOR is supposed to be Tor, m8.
>The NSA doesn't have a super secret math formula to track users through the network. No, but they have tens of billions of dollars every year, and thousands of the best people working for them, and the cooperation of 4/5ths of the world, and the ability to hack and own the other 1/5th (which they do).
>Traffic correlation takes weeks at minimum How do you know this? More so, how do you know the NSA takes this long with it, and that an automated system isn't in place?
>and is rendered worthless if you never leave the onion network because they'll be no exit node. But what if you do leave the onion network, as 99.9% of Tor users specifically seek to do?
>It also gives a shitload of false positives and won't hold up in a court of law. False positives are easily weeded out in that the other 300 connections to a certain site at certain times will match still.
>Qubes as of course the most secure system out of the box but the least convent. I thought Qubes was convenient, though? Is it not easy enough for an average Windows user to use? What exactly is hard about it? I was looking forward to trying it, but that discourages me.
>Stop listing to the advice of smug morons on Jow Forums. Whonix, Tails , and Qubes all have great resources to teach you about Tor.
Am I wrong in assuming that using Whonix via VirtualBox in a Qubes VM would be more secure than using Qubes-Whonix (as packaged together), because an attacker would have to jump through VirtualBox in addition to KVM/Xen?
Thank you.
Daniel Martinez
> You should assume they have developed ways to fool the Tor relay finding algorithm in order that their spook controlled relays are chosen 1) Assuming something is always useful if you're going to be paranoid, and yes, you should not trust an outgoing node. 2) That's why you should use your own encryption on top of that. 3) If you talk about timing attacks, well... it's possible, but hard, considering it relies on the amount of data you sent through. That's why you shouldn't torrent over it, the more data, the easier timing attacks are.
Alexander Torres
This is mostly accurate. Lets not forget the idea that TOR was developed to be secure against state level actors like China and Russia, so it isn't like it can have a very easy NSA BACKDOOR ONLY DO NOT STEAL method to de-user or otherwise mess with TOR or it would mean putting people and info the US gov't would rather keep secret, vulnerable. Having something that requires one state level actor's abilities only means you need to consider other state level actors are also capable if around the same power level so to speak. No matter how great the US thinks it might be, there's nothing leaked or demonstrated that suggests they're so far ahead in capabilities of other top-tier tech powers like Russia and China, not to mention our allies like the EU and "allies" like Israel
Especially after all that is happened, leaks etc... the "we can be the only one with X exploit, or control the network or etc..." is NEVER a good choice. It would take monumental stupidity to try with that gameplan.
Andrew Powell
Just a daily reminder that Qubes is developed by a "girl"
> is NEVER a good choice. It would take monumental stupidity to try with that gameplan Or just recklessness. Remember when dh vulnerabilities in CIsco were patched. Or samba v1 vulnerabilities in WIndows, they had existed for a long time.
Luis Flores
TAKE THAT BACK.
JOANNA IS A QT AND SHE IS A REAL WOMAN, NOT A TRANS (SRS)
Anyway, why do you retards worry about the NSA? You aren't their target. Worry about Amazon, Cloudfront, Google, Facebook, and Microsoft. Tor will protect you from those fags.
Levi Gonzalez
just dont use it from your home connection or too close to your home if you are doing something that would get those after you.
James Garcia
>samba >Windows user...
Adrian Nelson
nah desu, his name is Jan Krzysztof Rutkowski, he has papers from back when he was studying in Warsaw University of Technology He also attended Black Hat a few times with his male name