TOR

>created and funded by the US Government (fact)
why do idiots trust Tor?
restoreprivacy.com/tor/

Remember when the FBI let 200 pedos walk because the FBI refused to tell the court how it got the information on the pedos? yes, that actually happened.

Attached: 1545109992216.jpg (841x604, 113K)

Other urls found in this thread:

web.archive.org/web/20170824104237/https://password.kaspersky.com/
metrics.torproject.org/rs.html
libreboot.org/faq.html#amd
reuters.com/article/us-usa-security-nsa-rsa/exclusive-nsa-infiltrated-rsa-security-more-deeply-than-thought-study-idUSBREA2U0TY20140331
media.ccc.de/v/35c3-9926-the_year_in_post-quantum_crypto
twitter.com/SFWRedditGifs

>be in middle of amazon forest, north//south pole
>still spied by satellites

There is no escape

total escape is not the point, but knowing what data you're leaking and when, is very important

I've seen this elsewhere, and it pisses me off. It's the idea that intelligence agencies like the NSA have some form of "magical" capability to instantly crack every encryption scheme known to man because 'you don't know what they're capable of'
Yes I do. I know quite well what they're capable of, and what they're capable of is nowhere near what you claim, simply because of how cryptography and computers work.
Let's look at the cryptography side of things. Any textbook on information security will tell you that secrecy in the true nature of cryptographic algorithms doesn't work. However, wikipedia explains that the history of this goes farther back than one would think.
>It was finally explicitly recognized in the 19th century that secrecy of a cipher's algorithm is not a sensible nor practical safeguard of message security; in fact, it was further realized that any adequate cryptographic scheme (including ciphers) should remain secure even if the adversary fully understands the cipher algorithm itself.
In short, hiding any sort of meta-information about cryptography would be foolish. Cryptography is the ultimate open source, because it requires and benefits from the eyes of everyone.
it also says with regards to modern computer encryption algorithms
>breaking it requires an effort many orders of magnitude larger, and vastly larger than that required for any classical cipher, making cryptanalysis so inefficient and impractical as to be effectively impossible.
In short, no they didn't find some super secret special way to instabreak AES, SHA-512, RSA, or ECC. If you truly believe they did, show some damn evidence.

Attached: 6542455-magic-images.jpg (1131x707, 92K)

On the computer side, I think people overestimate the how powerful computers are in terms of password and general cryptography breaking, and even more so how powerful the NSA's computers are. Below is a link to an earlier version of the Kaspersky password checker that estimates how long it would take for different types of computers to crack a password, everything from a ZX Spectrum to the TOP500 supercomputer Tianhe-2. Obviously don't type in your real password, but play around with this. You'll find that if your password is even remotely competent and in keeping with industry best practices (20+ characters, atleast 1 lower, upper, number, special char), it would take good ole Tianhe way longer than the average human lifespan to crack it.
web.archive.org/web/20170824104237/https://password.kaspersky.com/
To believe that the NSA can get it done as fast as you claim, you would have to believe that they have computers that would be TOP500-tier. I seriously doubt that.

Attached: kaspersky.png (762x701, 383K)

The theory I remember hearing that made sense to me was that the NSA had helped the FBI our with a TOR exploit, then the FBI nabbed some people, and then in court the FBI refused to disclose vulnerability, presumably at the direction of the NSA, becuase if it was revealed in court it would then become public information and get patched by TOR developers and then the NSA would no longer have a very useful vulnerability to deanonymize people. So essentially national security interests of the NSA took precedence over the FBI operation and the successful prosecution of the pedos. iirc the judge instructed that the FBI had to disclose how they caught people to the defence lawyers or the charges would be dropped. Can’t convict people with unreasonable doubt if you don’t even know how they were caught to begin with.

Nevergonnagiveyouupnevergonnaletyoudown

>1000plus centuries

I'm safe

>magical
the US government funded and created TOR

Tor was hijacked by the Alphabet Agencies, they didn't make it. Nothing the government made themselves ever actually works.

>made themselves
they hired people for it, did you read the link you idiot?

>classical physics, discovered by Sir Isaac Newton, a British man
why do idiots trust classical physics?

It's a good enough model for the macroscopic world. No need to suck kike cock all the time.

>FBI let 200 pedos
Were the pedos under american jurisdiction? If not, it is understandable why they would refuse to give out the information.

jesus fucking christ, why do you faggots never actually read the fucking article before you ask something?

>misconfigure the Tor browser
>use wangblows
>use jewtel processors
>be surprised when the feds caught you downloading CP

They made AES too (or at least approved it). Do you not trust that?
They made SHA-512 too. Do you not trust that?
They approve of ECC too. Do you not trust that?

again mongoloid, read the article, especially the case with the FBI letting tor pedos go

This has been known for many years now. The US government owns most of the Tor network nodes and has some of the most trafficed ones as well. Tor was a honeytrap for retards that thoughtit was illegal crime.

I heard some guy working for the NSA ordered Dominos yesterday. Do you not trust that?

how much do you want to bet that those people were all ones who left JavaScript enabled while using the Tor browser? as is the default, in the name of usability over security?

The problem with this type of checker is that they assume NSA's computer will brute force by trying all possible combinations of passwords. But if I were NSA I would only check for passwords that are made up from words (like in ). That way is significantly faster.

t. CIA nigger trying to damage control TOR being compromised

These anons get it.

ayymd is not any better when it comes to hardware backdoor

If I remember correctly, the FBI took over that particular site and made some announcement to get the users to fuck up their Tor configuration.

>left JavaScript enabled
why the fuck is it even on by default
it pisses me off so much
why is javascript engine even included in the tor browser? take it out.

mutts should understand that most of those who benefit from Tor aren't criminals but those who live in dictatorships and 3rd world shitholes, those countries ban many necessary websites and Tor is the most effective and hard to detect way to go around it


t. lives in a 3rd world shithole

Yes that's called a dictionary attack, but if you use a bunch completely random words (ie dice tier), even if someone knows you use words from their list, it would take decades to crack a 7 word password
Even more if you change a letter with a number here or there
All you need is a pass like that, a password manager, and then just create 64 letter/number/symbol passwords and see if anyone will ever manage to guess a password you have

>they didn't make it
Tor was literally invented by DARPA and the US Navy, what are you even talking about.

>they hired people for it

Well, yes. Every government in the world has to hire people to do work. So far no government has been shown to do work by itself.

yeah it is, rabbi

What do you need tor to access, friend? Greetings from the west.

As in the most competent private corporations that compete against other competent and incompetent private corporations retard

thisssssssssssssssssssssssssssssss

tor project is made to make people compromised while giving the spooks a large number of users to hide between

Yes that’s the whole reason it exists and is still funded by the U.S. government.

mongoloid. read the article also

Not him but I can instantly name 100 without living in a commie shithole

Is that so? Got a good list of US government owned node nicks/fingerprints or are you full of speculative bullshit?
metrics.torproject.org/rs.html

hurr durr it was not the government it was someone working for the government

I'm reading it right now, you mongoloid. So far I see nothing wrong.
>Tor is made by da gubmint!
No fucking shit. Again, lots of things we know and use every day are made by intelligence agencies. Assumption of foul play without evidence does not a strong argument make.
>It's funded by them!
See above.
>They use it!
Just like they use all the other shit they make. You're not exactly presenting a compelling argument here.
>The devs cooperate with agencies!
Like this hasn't happened before. See AES. That was made as part of a government competition to see who could make the best algorithm. They also work with RedHat on SELinux. Nothing new.
>b-but muh nodes
as I understand it, in order for this to be a threat, you would have to have compromised all three nodes used by the person you want to target, all at the same time. Keep in mind this isn't just all three have to be compromised. This is all three need to be compromised BY THE SAME PERSON/GROUP. If it's true that a lot of people are trying to do this shit, you would still have to have it match up 1 2 3.
>b-but muh nodes again
this is getting repetitive.
Oh, and I have used Tor, and my computer is free of malware, thank you very much.

>not finished reading yet already many posts talking absolute nonsense
you're such a faggot, if you were a glow in the dark trying to shit up the thread, I'd say you're good at it

cont.
>FBI said a thing!
Misleading. The spooky headline thrown in there makes it sound like, once again, they have some magical master key to rule them all and spy on everyone's Tor traffic. In reality, it just means that if your opsec is shit and they manage to be able to read your communications... they can read your communications.
How is this any different from what's usually going on? It's not like they wouldn't do this anyway with regular internet traffic or VPN traffic.
>IP leaks
Okay this is the most legitimate one of all. It's true that a software flaw could fuck you in the ass, and Tor Browser Bundle has had such problems in the past. I don't know the details, but I imagine that the flaw got patched really fast, and people who got caught just forgot to update. Again, that's like every software ever.
And as far as the Windows issues, why the fuck are you still using Windows? Probably outdated Windows on top of that.

>with the help of HACKING TOOLS ON COMPUTERS IN....
Read the article dipshits, the computers these pedos connected to were basically traps. I'm assuming they were confiscated machines loaded with payloads that would call back to the authorities once they were off the Tor network. This has nothing to do with Tor being compromised.

>To believe that the NSA can get it done as fast as you claim, you would have to believe that they have computers that would be TOP500-tier

I used to sell supercomputers. They have at least a dozen in the top 10 that are classified.

>Remember when the FBI let 200 pedos walk because the FBI refused to tell the court how it got the information on the pedos?
The nature of the law is that if the information was obtained illegally, it's not admissible in a court of law. It would not benefit the FBI to have to admit that it illegally spied on a bunch of pedos, since they'd walk free either way.

Trust me, my dad works at Nintendo

just go underground :^)

FUCKING THIS

I'm studying computer forensics stuff, and a point that gets hammered into you hard and fast is that the laws are very strict on data acquisition, and if you do not follow the law/the warrant to the fucking letter, your evidence, however damning, will not be admissible in a court of law. Everything has to be done as methodically as possible, otherwise you risk the admissibility of your evidence.

>trusting the opinion of a website that lists Firefox as "secure" and Brave as "privacy-respecting"
Go away. You and the rest of the brainless niggers on this board are just latching onto one authority figure after another because you're incapable of taking anything with a grain of salt.

Attached: autism meter.gif (728x426, 128K)

Indeed. In particular, you need to seek out a warrant from a court BEFORE you go about spying on people. Of course, if you do have a warrant, it's perfectly legitimate to outright put malware on a guy's machine to tell you every website he visits, every file he opens (and for how long that file is open), and no amount of VPN use or Tor can help you.

Hoooly shit this site is shilling NordVPN! Didn't they get caught recently for logging shit about their users?

Attached: NORD?.png (829x261, 57K)

Wait a dozen in the top 10? That’s pretty impressive.

>Didn't they get caught recently for logging shit about their users?
not as far as I know, but some shill vpn provider did try to fuck with them

The rabbit hole goes deeper. Ok first off, I love that even though OP is sperging out about 'Tor's compromised and this article proves it' or whatever, the actual article just ends on 'ehh, it's all up to interpretation.'
But that link goes to their other article about VPNs. NUMBER 3 is Nord!
This is getting spicy

Attached: keepaskingquestions.png (828x566, 96K)

>a dozen in the top 10
A larpers dozen.

Nothing wrong with being a pedo

Attached: Screenshot_20170520145748.jpg (858x773, 264K)

It had something to do with advertisement, I can't find it anymore.

Oh dear
>When you buy items through links on our site, we may earn a small commission (at no additional cost to you).
So they're banking off of people getting scared of Tor and buying a VPN service through their gay site.

Attached: shill-central.png (705x29, 8K)

this is why i only use huawei phones now

It's also funded by """open source""" analytics. It doesn't matter how much they want to whitewash analytics -- analytics IS by definition not private. It's a collection of individually characterizable information that can be packaged up for "consumption" later.

Attached: 1.png (817x197, 22K)

read this (if you can), nigger
libreboot.org/faq.html#amd

On the VPN article, they give the usual talk about 5/9/14 eyes.
Number one pick's Jurisdiction? "British"
O O F
Okay I know it's the British Virgin Islands, so it's not the same, but I don't know about how much influence the tea-drinkers have over them, or will have over them at some point. Seems slightly fucky
based and dragonlolipilled

>I'm assuming
okay

retard

It's a pretty logical assumption, considering it's pretty much the method they used on Freenet.

Tor is not hard to detect. They acknowledge that on their main page.

Good catch.
Please try.

>Don't ask why

Then I won't bother explaining why you're wrong.

Dude it's so secure you can even silk road on it.

Well I didn't change VPN over it so it must have been something minor.

>babby's first time at critical thinking
The web is littered with sites like these, claiming to be "helpful" and making money being dishonest as fuck. Only boomers and zoomers fall for this level of transparent jewry.

Attached: tank shell.gif (461x352, 950K)

>try to brute force into a file
>file is destroyed after a certain amount of failed attempts

Well clearly OP didn't catch on.

>he doesn't know about the honeypot and the feds running it

>attempts
Dumb nigger. Do you think any state-level actors interested in breaking your keepass/phone/hdd are going to brute force anything against the original?
Remember how FBI cried bitch tears about how Apple refused to unlock someone's phone for them? Remember how they successfully brute-forced it anyway? They image the entire thing over multiple copies before brute forcing it all in parallel.

VPN to TOR is actually less safe then just using TOR. I don’t know why people keep recommending VPN’s for privacy or anonymity, they are useless for that and arguably worse then nothing at all.

How would you determine its validity?
Why would they give it away for free?

>VPN to TOR is actually less safe then just using TOR
citation needed

>I don’t know why people keep recommending VPN’s for privacy or anonymity
Because those sites are paid to shill for them, combined with the VPN providers' creative legalese interpretation of what "private" and "no logs" mean. Torrentfreak is the biggest offender in that regard.
Think of privacy journalism as gaming journalism. Take nothing at face value, assume that all sites are shills unless proven innocent. Any for-profit sites' opinions should be viewed through the "who benefits from this article?" lens.

Attached: fuck off birds.gif (400x209, 491K)

Speculative bullshit it is then.

Not magical
>crafty, money, power

reuters.com/article/us-usa-security-nsa-rsa/exclusive-nsa-infiltrated-rsa-security-more-deeply-than-thought-study-idUSBREA2U0TY20140331

I probably should have said CAN be less safe. It depends on how much you trust a random VPN provider vs your ISP, and how you obtained the VPN service (ie anonymously with proper opsec).

Don't most of these people get caught because they improperly configured their browser, or didn't update on time?

Yes.

>RSA is suspicious
What are you gonna use instead, then? Some garbage cooked up by a lolbertarian startup cutting corners to win some fame? Or a behemoth backdoored from the ground-up made by a defense contractor who'd rather be selling more overpriced jets?
media.ccc.de/v/35c3-9926-the_year_in_post-quantum_crypto

I love how americans think their agencies have literally scifi level equipment.

they let 8guys with tiny knives kill 3000 of you and make ya country waste trillions of dollars.

I don't think they have any skill.

>why do idiots trust Tor?
It's the only way for me to "pirate" things with USB modem in Russia.

They didn't "let 8 guys with tiny knives do something bad", they did it themselves. American intelligence agencies have equipment and skills beyond comprehension. The CIA controls all foreign matters and the NSA the internal. Together they can destroy or make any nation in matter of days, they have access to every bit of information ever made known to the world, and much more.
Their social engineering is one of the world's most well done. Russia, China, and the like? Fucking CIA controlled opposition.

Probably not scifi, but they did have essentially terabyte sized comparable to modern usb drives back in the cold war era.

Good chance they still have some stuff like that. Several classified technologies were developed by the allied nations before the private sector. Notably several very famous encryption....

>Why would they give it away for free?
this one's actually easy -- it's really easy to determine who's who if there's very little traffic, which defeats the whole purpose
the US government uses TOR to hide their own activities, so they need other activity on the network to be able to mask it

there's also the really fun shit like enabling JS in the bundled browser by default, so you don't even need to compromise your own protocol (since an adversary would be able to take advantage of that -- remember, the government uses TOR for itself) just to catch random idiots selling drugs and looking for CP

>magical capability to instantly crack every encryption scheme known to man
It's called Intel ME and AMD PSP.

>I'm safe

If only you hadn't entered your password online

:|

Attached: literallygod.jpg (407x608, 55K)

>>file is destroyed after a certain amount of failed attempts
How do you think that is supposed to work?

like half of tor traffic is retards torrenting and visiting porn tubes

Is powerpc backdoored? Are processors without backdoors being made in this day and age?

Half is cp, other half is drugs. And 0.001% is stallman using Google

The NSA is good, I love the NSA

>t. NSA employee

I don't think they are backdoored, else details would already have come out. It's very likely to have one added at some point in time, considering the full processor spec, schematics and source code aren't all out in the open.

>details would already have come out
It is not as popular as x64, so why would it come out