Tor is not safe

Tipping off the glow in the darks of security vulns before disclosing. Remember how before TOR was so slow, almost 56k like speeds, and now it's much much faster? Is this because of government infiltration or because of a rise in popularity after Ed Snowden leaks?

surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties

Attached: AfricanGlowInTheDarkHoneyPot.png (1200x725, 74K)

Other urls found in this thread:

propublica.org/article/heres-one-way-to-land-on-the-nsas-watch-list
daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
twitter.com/SFWRedditGifs

>Is this because of government infiltration or because of a rise in popularity after Ed Snowden leaks?
No, I forget what they did exactly, but they updated the code, m8.

That's the problem with things becoming popular, normie fags wo find this shit out via (((MSM))) are the first to fkd ou shit up. Tors been pwnd for years dude, the goberment even admits thateverybody who downloads Tor is put on a watchlist. Along with the discovery of hardspyware in processors we are officially fkd. Just make your own PC download Linux or use a memepad with libreboot and Linux, hope for the future.

>the goberment even admits thateverybody who downloads Tor is put on a watchlist
sauce?

Using linux probably puts you on a watch list too anyway. Snowden leaks revealed they spy on people who read the Linux journal, using anything that isn't backdoored makes them target you.

propublica.org/article/heres-one-way-to-land-on-the-nsas-watch-list
This is true

I mean if you want to trust something openly funded by US government agencies, be my guest.

oh no a watch list
what am i going to do, that sounds so scary. I better connect to the web through traditional means and give identifiable data away for free

>probably
>probably
>probably

I probably fucked your mom last night

It's safe if used properly. Get a separate laptop and don't use it for anything other than Tor, this prevents identification through hardware information. Buy it with cash. Obviously cover webcam and microphone or even better open up the laptop and remove them. Never use your home network, an exploit could get MAC address of router. Keep JavaScript disabled. You can throw in a VPN paid for anonymously to disguise the fact that you're using Tor.

Can confirm, been known for a long time

tor is open source and governments around the world use it to conduct top secret business. if it wasn't safe, everyone would know by now.

I can now watch porn without being afraid of my dad or isp finding out at peace I don't care about glowies

>Get a separate laptop and don't use it for anything other than Tor

What do you guys think would be a reasonably good set-up for privacy?

Something like this?
>old laptop or micro single-board PC
>boot up with Tails
>only connect to web over TOR
>only save data on fully encrypted microSD
>(optional) nuke the device completely every few weeks or so

Is there a particular device you'd recommend? I heard Tails doesn't run on ARM type devices?

Attached: 1540347309187.jpg (682x1024, 56K)

>old thinkpad
>remove microphone
>remove camera
>remove drive
>libreboot
>tails on usb
done

Your hardware info and by extention browser finger print can only be revealed through JS. Keep is disabled and that covers most of it, then the way the Tor browser is configured deals with the rest. A VPN can be good but also adds another point of vulnrebility. For a start any VPN worth it's salt needs to be paid for, so your best bet is buying bitcoin (which requires a photo ID) and tumbling them, which still only obsqures rather than hides, although easily to the required extent if you're not doing anything crazy illegal. Furthermore though obviously they're a centralized server that may or may not keep logs and may or may not bend to government demands.
That being said, there is a way to do VPN's right and they would increase your privacy (adds another level someone has to go through to trace you back too) but if you're staying in the onion network and never going through an exit node, they're not super useful.
What's this about exploiting a routers mac address though?

For a long time, it's been known i2p is the best option, even if it sadly uses US tech like Java. Do people still use Freenet or GNUnet?

Here's the non-biased source.
daserste.ndr.de/panorama/aktuell/nsa230_page-1.html
Fucking Jow Forumsfags not even knowing how to cite properly.

>ITT: retards being paranoid

i2p isn't currently better than tor. freenet is shit.

Freenet and gnunet is just cp and useless shit