It's almost 2019. What's your excuse for not running a hidden service? There aren't any risks associated with it unless you have complete shit opsec and it costs little to nothing.
It's almost 2019. What's your excuse for not running a hidden service...
how should i start?
Hey I run an exit node in Ukraine (: I used to run two, but the PSU failed on one of the PCs, or at least that's what I think it failed. Don't have time to check lately.
Theres also no risk if you dont do anything illegal like a retard.
Thanks for doing that. I would run an exit too but in my country I'd get my doors knocked down by the feds and accused of doing a bunch of illegal shit, so it's just a relay for me.
I have no services to provide. Aren't they just sites for drugs or whatever?
hidden services are behind 6 relays and if you configure things properly, the only way you can get pwned is by shit opsec.
>run tor
>get shot
>run i2p
>torrent freely
You are aware that there are RCE 0days for every kernel in existence and that all your hardware is compromised... yeah? OPSEC is a meme. Nothing more. Nothing less. There's no OPSEC in the 21st century. There are satellites and insect drones tracking your every movement. 4G connected mini microphones recording your every word. Advanced "AI" combing through all that gathered data forming a profile on you. You're not safe. You will not be safe unless you literally leave the planet or go deep, deep underground.
No thanks. Iam not pedo.
hidden services are a niche and no one cares about them people just want free internet proxy. even the old junker that is i2p btfo of tor's onion services wrt to functionality.
until you accept this nothing will change.
...
he's not wrong you know
>running a US Navy botnet
>in my rig
fun way to run a server from a strictive nat like some 3g networks
I do OP; in fact, my hidden service runs without the secret key on the machine!
What kinds of hidden services could I run?
Walking ad
>free
>open source
>used to transmit military secrets
>botnet
YOU ARE A PEDO FILE
Yeah good try, US Navy.
>FOSS
Whatever. The system is compromised.
absolutely anything, just like a normal webiste.
ok so
why would I run a normal website in the first place, hidden or otherwise?
it's almost 2019 and you have nothing to put out there to the world? user...
I'm only 21
I have nudes and that's it
What's opsec ?
pic no related
dont know anymore who talks the truth , everybody chilling for there own , nobody gives conclusions on how to be safe.
fuck all those honeypots.
(((trusted))) nodes
*scam your data*
am so stupid that i truly believe the government has the best for me and protects me.
not much you?
this
operations security.
>what is https
Tor's pretty neat, but as I understand it, you can't log into any online account unless you've signed-up for them while using Tor, or else you'll compromise you identity. Is that right?
Also, many sites outright ban Tor connections and Google will captcha the fuck out of you.
>you can't log into any online account unless you've signed-up for them while using Tor, or else you'll compromise you identity
for good opsec, yes, but for most people it doesn't matter.
>Also, many sites outright ban Tor connections and Google will captcha the fuck out of you.
exit nodes are forced to go through cloudfare or captcha on some sites, yes, but it's not that big of a deal. captcha is only difficult because of one command in tor's config, called resistfingerprinting. it takes two seconds to temporarily disable it in about:config.
I ran an exit node once, for shits and giggles. And had tcpdump running in the background.
A couple of hours later I'm going through the pcap file and I see some asshole going on various IRC servers asking underage girls for sex.
I think I spent the next two weeks waiting for someone to bust my door down.
>torrent throughi2p
>Oh boy, I can't wait to watch this movie in a month!
When using the Tor browser, you're not supposed to modify the browser in anyway that can give it a unique fingerprint, right? Is there a recommend resource to learn about what aspects of the browser are canvased? This stuff's pretty neat
>Implying underage girls use IRC
While you're not wrong, would the feds blow a 0day (or more) so they can pwn some random autist downloading cp?
Their pimps do, though
And neither is he right. Of course, there is technology allowing US special units (and a selected few other countries') to find anyone in the world. But that can only happen if they really focus on that one specific person.
Take Bin Laden as an example - it took a decade to find and kill him. Granted, he had lots of money, influence, and people ready to die for him - but same could be said about the entire fucking US military and three-lettered agencies. Nobody cares about some user masturbating to cheesy pizza. In fact, it is quite common for those in charge of executing the law are affiliated with much more murky business than your torrent seedbox. The worst that can happen is that you can unwillingly become part of their investigation to find someone more important. Everyone is connected.
What I think everyone should consider is:
- no human or organization can currently control, let alone read all the data circulating on the web. But we may soon have AI designed just for that task.
- it can neither be proven nor denied that companies such as Alphabet are logging exobytes of internet activity history. I wouldn't be surprised if they were logging it all with the goal of having AI capable of browsing it in next 10 years.
- in the next 20 years all current activity of all Internet users might be easily accessible for the Alphabet. And knowledge is power.
>want to learn about the Tor browser and network
>thread descends into the X-Files fanfiction
I only have myself to blame
Ask away
what are some non pedo related hidden services that Jow Forums uses?
I don't use Tor but you might like the hidden wiki. A little trivia, the most popular hidden service on Tor is actually Facebook. (Yes they have an official onion address)
for ideal opsec you wouldn't want to make permanent changes to the config. a temporary change to one command is irrelevant.
What's the poin of using the onion address for logging into facebook?
nope, they're too specific and expensive. i can only think of a couple instances where tor users were pwned due to 0days.
If your country censors it
Would a VPN be enough?
Perhaps. It depends. Also, Tor is free and VPN provider would know where you're going to. VPN might be blocked as well. Tor has a proxy system you can turn on to make it extremely difficult to block. *Cough* China
Unfortunately those proxies are very unreliable
How about using that one button in tor to reset the relay?
sure, but a bridge would be better.
torproject.org
meek-azure works in china.
entry nodes are public and networks generally block all of them.
>noding CP through my network
Nope. Declined
If I one day needed to use TOR for anything, I'd rather quit using internet at all
This is exactly why judges in America were letting people who were charged with possession of CP go free because the FBI refused to disclose how they caught them. From what I read there was much speculation they had help from the NSA and didnt want to expose an exploit that was probably being used for national security type stuff.
Everyone already should be. See above. Just think what Alphabet might be able to do with all your interenet activity in the future. It might not seem like a big deal now, but there's no predicting what could happen with all the information all the social networking services and Google spy services will do with all the data that people willingly give them in the future.
A hidden service is not a relay. The only traffic that goes to it to whoever navigates to Tor onion address. Read about Tor before you pretend to understand.
This, Tor isn't about breaking the law. You'd think that users of Jow Forums of all places would understand the positives of being anonymous.
Not a bad thing. You have to be put on trial against your accusor regardless if it's a computer program or not. Otherwise how can you defend yourself or know that they even did lawfully catch you. If the courts didn't keep the government accountable, there would no longer be fair trials. Police invasion of privacy would be based on just someone's hunch.
>being this new
Can you explain in simple words how hardware can be compromised? Does it just run things that are beyond the OS control? How can hardware run code that is not an actual executable? Or does it mean that for example the RNGs are predictable?
The spy agencies put their malware in the device firmware. There's also the infamous Intel Management Engine in any modern CPU, and AMD has their own version of this as well. There's a good video showing how PGP keys can be caught from a Tails OS live usb session on YouTube somewhere showing what can be done with a little bios hacking. I'll try to find it.
Here we are:
thx
it has been a while since I last used it, what's the hidden wiki link? or was it replaced by another page?
It's slow as fuck. I'm living in a country where we pay premium for subpar internet.
>walking through office
>notice a draw ajar
>shimmy over to the cabinet
>sneak a peeky inside
>CP! CP EVERYWHERE!!! OMFGAWD!
You have just entered. The Pedo Files.
>Cue shitty theremin music from the 1950's
I've never found this personally in my country. I've gotten up to 500kbs, which was so fast I actually wondered if I had some sort of compromised browser or something. I always find it really slow in Whonix though, and I've also noticed the relays are always a lot different in Whonix as well but I don't know why.
Anybody interested there's a billion golang Tor relay tools on github you can use to run a hidden service just for the sole reasons of self-hosting files as a free way to run a 'cloud' server for your own personal reasons. I used to update Android that way, I kept the source on my home server, then anytime I wanted to install an Android security update it'd compile a new image for me and it'd just grab it from my own self-hosted Tor directory while walking around.
i've heard somewhere that if you use the tor network you automatically get put on a watchlist. same with some websites (like Jow Forums) and vpns
Jow Forums no, but Snowden docs you were 'tasked' if you landed on the Tor or Tails homepage. Use of a bridge helps avoid a lot of this meta identification
I wonder wtf "tasked" means anyway
>Take Bin Laden as an example - it took a decade to find and kill him. Granted, he had lots of money, influence, and people ready to die for him
that's because he was hiding in pakistan.
There are way too many cameras in the developed and not so developed (China) world for that to be possible.
nsa can spy on each and every node in the network in real time, why would they need to manually operate nodes? timing analysis is only used on high priority targets anyways and all known failures of tor onion services has been due to shitty opsec on both the hs operator's and hs user's side. if you disable js and dont use wangblows/fagOS then the chances of you being caught browsing illegal shit is virtually zero
Just means you go on a list, but the NSA can't keep that list or data of Americans for more than 30 days....not that it stops them, or 5 eyes
chan no
but this page in particular, maybe
>bin Laden
but he was sponsored by fbi...
Question:
Can connections be viewed from the side by the eyes? If I connect to Tor for instance, can the connection path be estimated by looking, seeing me connect to the node, the node connect to the exit node, and the exit node connect to the server, based on the time I connected and the exit node connecting correlating more strongly than others?
Tor has three nodes not two so it would be:
You >> Guard node >> Node >> Exit node >> Server
Keeping logs for every tor connection ever would be too hard and expensive to ever pull off.
I know that it has three nodes, I was just simplifying it.
Also I think you're underestimating them, you could probably make an AI that checks the blanket collecting for correlating connections.
Anyways, how about with a VPN?
If I am downloading something while using a VPN while also doing something like playing a game on steam or whapping on exhentai, can they tie that traffic together and identify me as the downloader?
How torrent through i2p?
Yes, these sorts of timing attacks are possible on Tor if the adversary controls/monitors both the entry guard and the exit node. A low-latency anonymity network can't defend against a global passive adversary that can monitor all internet traffic. If multiple nation states coordinate to deanonymize you then they most likely will.
Yeah, but what does "control" mean exactly and how much network control does an adversary need to "monitor all internet traffic" and deanonymize you?
Like, am I basically fucked if any of my traffic goes through Hawaii or California? Or am I alright if I bounce through a few other countries and the NSA doesn't control my guard node?
Thoughts on Tails?
I use tor and I do not:
look at illegal stuff
buy illegal stuff
I do trust my government (USA).
I do NOT trust many corporations.
I believe most of the government does.
I use tor because I don't trust corporations.
CP is morally and ethically wrong.
And for those people afraid of government:
Participate in it! Be a part of your democracy/republic if you have one.
>There aren't any risks associated with it
Unless you live in This Country. It's against the law here.