Is it compromised?

Is it compromised?
I'm bored. any cool onions to visit?

Attached: 1550159932132.png (1200x725, 74K)

Other urls found in this thread:

darkweburls.com/
restoreprivacy.com/tor/
dailymail.co.uk/news/article-3771474/Clinton-email-server-hit-dark-web-tools-Hillary-worried-hacked-getting-send-link-porn.html
gizmodo.com/hackers-who-shut-down-psn-and-xbox-live-now-attacking-t-1675331908
lists.torproject.org/pipermail/tor-consensus-health/2014-December/005381.html
whonix.org
dark.fail/
mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf&
twitter.com/SFWRedditGifs

Nothing is 100% safe, don't no if that sums it up for you

I gotchu user:
darkweburls.com/

It's good, just follow the rabbit hole user, go deeper and deeper until you find weird stuff.
Report back

Make sure JavaScript is disabled and don't log in to anything and you should be fine

>i'm bored
Yes, we can tell, please fuck off or share your onions

>linking to dark web URLs publicly on the regular web
doesn't this defeat the purpose? I assumed these things were shared privately between people

Attached: image.jpg (141x141, 5K)

Go with I2P if your situation allows for it. Make sure that you're using monero and that you understand how to use PGP or you could find yourself in a world of hurt.

This...

go tour dixondale farms and purchase some of their variety selection of onions

Attached: onion-farm.jpg (1601x671, 438K)

Why arent they listing cp sites? They dont even mention tor is full of cp

No.
Tor was never supposed to be a secret club. You shouldn't rely on obscurity of urls in either clear or dark net.
Tor is for anonymity, use VPN for private communication/data exchange.

Also don't reuse clearnet nicks, do not download anything until you are sure, never run anything executable, do not enable flash or any of this shit. Preferably use vm with Tor preconfigured.
Checkout uncensored wiki for real content.

Sup Jow Forums. I know we like to joke that TOR might be compromised and all that, but has anyone who actually knows how it works done a critical analysis of if its safe? e.g., if 50% of the network was compromised, could users be theoretically monitored?

It's the largest honeypot in history
restoreprivacy.com/tor/

Wanna know how I know TOR is safe? The guy that hacked hillarys email used TOR and they never found out who it was.

Just imagine for a second how high profile that hacking is. If law enforcement doesnt have the resources to track him, then how the FUCK are they going to track you?

dailymail.co.uk/news/article-3771474/Clinton-email-server-hit-dark-web-tools-Hillary-worried-hacked-getting-send-link-porn.html

PS: Most of the theoretical 'attacks' on TOR require specific conditions that are realistically impossible.

It's a P2P network, if one person with 1000 nodes joins the network, it could be possible for him to track people using TOR through comparison of the packets. That's what LizardSquad did back in their glory days by the way, I wouldn't be surprised if they still had some active nodes.

(((Uncensored))) wiki, no links to 8ch or Daily Stormer onion, but it's full of anarcho-retards blogs and CP

What's the address of infinity chan in the deep web?

Sauce for the other post above:
gizmodo.com/hackers-who-shut-down-psn-and-xbox-live-now-attacking-t-1675331908
lists.torproject.org/pipermail/tor-consensus-health/2014-December/005381.html

Obviously they used a shitty botnet with zombie computers that probably didn't have a connection better than your average home internet, but any large ISP or a government agency can easily use this method to spy on TOR users, just agg a node or two every few hours for a month and there you have it, hundreds of spying nodes that nobody will notice.

dark.fail

>5 years ago

>Lizard squad
You will immediately cease and not continue to access the site if you are under the age of 18.

Turn security settings to safest, never enable JavaScript and don't post anything that could compromise you (obviously).

The Guardian Project actively works with The U.S. Govt. who uses Tor to keep their assets safe in the field. They want as many people using Tor as reasonable to mask their transmissions. Tor is constantly under attack because the NSA and FBI are racketing sploits and patches with each other. I’d say it’s safe but the more you use it the stronger you make it. It is already being used as a weapon.

Retard. Even I know it was Seth Rich. Tor isn't the reason they "didn't find out".

>TOR
you can start by reading it's documentation

You will immediately kill yourself if you can't understand the theory behind the attack.

Yes and? you think the TOR protocol has changed at all? anyone can host a node, even your little sister with her smartphone.

Tor has stood the test of time, strangely enough.
However, it's a dumb pipe. If you scream your real name and address down an anonymous pipe then tor can't save you.

Just search it on ahmia.fi

Tor is constantly being updating nigger

i'm not sure mr glows-in-the-dark
never used it

Someone can locate you if they happen to own all the nodes on path from your computer to the hidden service/exit node. It's just that, controlling higher % of the network just increases chances for successful attack.

However people get caught just from doing stupid shit like not using VPN before you enter Tor.

Then add them.

That's obviously not necessary, stop spreading lies nigger. Just the entry node and the an after-exit clearnet sniffer is likely enough.

if you use Tor or anything else for any crime, you're on your own, otherwise nothing is wrong with it

I just hope My adderall delivery comes thru in a few days.

>clear net nicks
What?

Don't use your steam username while posting cp on Tor forums.

He said wants to clear net nicks

Ah so pseudonyms. Thank you for clarifying

It is. Tor packets are encrypted in layered manner. Enter node doesn't know where the packet will exit, only the next node. Every node only know where did the packet come from and where will it go next, they don't know what they contain nor can they identify same packet after it goes through neutral node.
You can't track whole path of you don't control all the nodes on its way.

well you can, but you have to create a GUI interface in visual basic to track the node IP.

Use Whonix for maximum safety.
whonix.org

No, nigger, it's called correlation attack if I recall, and it's on the fucking TOR faq. It's easier if you sniff a large part of the network, whether it's tor nodes or not.

retard

>Someone can locate you if they happen to own all the nodes on path from your computer to the hidden service/exit node


Some things:

1) This only works when accessing clearnet websites. If you're accessing a .onion site then there is no exit node

2) There are thousands of users and traffic is always routed randomly. EVEN IF you had all those nodes, you'd get a lot of bogus traffic from other users and it would be impossible to make a conclusive analysis which traffic was from user X and which was just noise from other users

3) Even IF they could conclusively identify your connection, they wouldnt be able to decrypt your HTTPS connection.

is there a way to connect to the first node in a different country?

4) Even IF they had ideally compromised TOR just to monitor you, if you're doing light web browsing (just loading simple web pages), your traffic would look just like anyone elses. correlation attacks would require you to do something that makes your traffic obviously different in size, e.g. downloading a large file

this. use the alias of someone you hate.

5) Even IF they had that setup, they would only be able to get 1 sample of your traffic because your next connection would be routed elsewhere, thus this attack depends on nearly the entire fucking network being compromised

dont call me a retard, nigger

>2) There are thousands of users and traffic is always routed randomly. EVEN IF you had all those nodes, you'd get a lot of bogus traffic from other users and it would be impossible to make a conclusive analysis which traffic was from user X and which was just noise from other users
You know exactly what packets arrived and departed from your nodes.
Even if you have lot's of packets, just make like a hashmap received -> sent(hash) and it won't be hard to find route of any packet.

>all the people ITT mistakenly capitalizing "Tor"

Attached: 1552247567055.gif (657x527, 122K)

input node reports 1 reqest with 16kb traffic
output node reports thousands of requests ranging from 2-100kb
How you gonna know which one was which? Spoiler alert: the size wont match up perfectly

this is the best and most reliable index

dark.fail/

>"Is it compromised?"
no, but it's not a silver bullet either
citation needed. you don't even mention there's far more on the clearnet and hidden in plain sight, just browse various subreddits, discord servers and you'll find way more shit there
no hidden wiki is legit these days, use dark.fail or Jow Forumsonions

Tor inside of Tails. Spoof MAC address. Access public wifi (StarBucks) from outside where you can't be seen by cams or people or pets with petcams.

If someone controls your entry and exit nodes they can compare transfer sizes and times to identify you.

>forgot to mention to use bridges since regular tor traffic is an instant red flag
>doesnt realize going through all that trouble is going to attract so much unwanted attention that op may as well just use tor from home instead

So fags when are we getting a proper system level tool like Vidalia again instead of a shitty firefox fork that pretends anyone actually browses the web at 640x480

>open link in private window with Tor

Attached: downloadbrave.jpg (300x168, 7K)

although it is good to have defense in depth against state level adversarsies, you dont need to go to such lengths to use tor effectively.
Against the most common, and most pernicious kinds of surveillance — that done by private corporations — it is both convenient and effective to use tor at home, with no additional precautions.

in fact, by refusing to take additional precautions, for the innocent purpose of evading corporate datamining and ad targeting, you make tor safer to use for people who do have to worry about state level adversaries, by providing chaff tor traffic they may better hide themselves in.

Inb4 it's pressed methamphetamine pills

there will be a large amount of delay, the sizes will be off by 5-10%, and there will be a shitload of noise traffic.

furthermore, the next time you send data it will be routed elsewhere. you really wont have any conclusive data to correlate in-out traffic for a user unless they get routed through you over and over and over. even then, at best, you can just make a probability model.

Check out this paper mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf&
Although in this paper they have control over an internet exchange point instead of a large amount of tor nodes it shows that traffic analysis attacks can be done on Tor with high accuracy.
>In the controlled in-lab environment we had 100% success rate in determining the source of anonymous flows.
>When evaluating our attack with traffic going through the public Tor relay, we were able to detect the source in 81.4% cases.

See page 6

>Thus, to summarize, the attack proceeds through the following steps:
>1) Client downloads a file from the server that colludes with the adversary.

This is what allows them to identify the traffic so easily. The server must be compromised and you must download a specific file. This is not a realistic situation unless you are downloading from a legit clearnet honeypot

Oh shit
>boots up nord VPN
I'm goin in boys.

Because you control all the nodes and you know where did the entry node sent the packet. The second know got the same packet, unwrapped it and you know where did it go next etc. Packets doesn't change on transfer between nodes, they only change inside nodes and if you control the nodes you can figure out the path.

roast em partway in the oven and then finish em off by frying at a medium heat

surprisingly good

throw in a bit of whatever sauce matches during the frying stage and you've got something you can sit whatever meat you put in to roast at the same time

you can have a nice delicious restaurant quality dinner for like a couple of bucks instead of sitting on here

I am a Christian.I live in a muslim country and there is no way for me to get out right now. I have a lot of christian photos on my computer i got via TOR, I need to look at them for about 45mins once a week. But NOBODY else may ever see them or my life will be ruined and i will be put in jail and everyone I know will hate me forever.

What is the best way to store these pictures so I can have easy access to them alone?

Attached: 8e4bc0e3e21f641fbeac523aa26bfe80.jpg (750x618, 80K)

not that kind of onion! AHAHAHAHAH EPIC POST

SO CLEVER AND FUNNY DONT KILL YOURSELF

Kys

>create a GUI interface in visual basic
how would that even help

if you're not the /ck/ type just grab a snack or go for a walk
trust me, you'll feel much better than you do just sitting on here

lol

why would you watch some funny dressed hypocrites cosplaying middle ages?

gib cunny

Attached: 156027638341.png (660x862, 397K)

>nord VPN
zoomer
>browse various subreddits, discord servers
zoomer
zoomer
always call yourself 312c

to become closer to christ user

If both the entry node and exit nodes are compromised, sure, your fucked.

Who gives a fuck about clearnet. This is about browsing hidden services

Why won't they just fuck off to tor?
Wouldn't all the problem be solved if it was brought up as a hidden service only?
- Much more difficult to DDOS than regular hosts. Only botnets with tor support can actually target it, not easy to do on shitty routers and whatnot
- Can afford more and better servers as no money is wasted on anti DDOS services
- In case of DDOS attacks, maintain a moving target. change onion url frequently. botnets usually take a few hours to adapt to the new address, but real users can flock in fast.
- SJWs can't bully the host to shut it down because they don't know where the servers are located
- Don't have to worry about dmca
- It can help get more users to use tor which promotes more people to set up internal relays thus strengthening tor network. makes the work of cia niggers harder.
- It can promote other websites to setup shop in tor

The only downsides I can see are:
- tor is shit slow.
See above. More people using tor and hosting relays can relieve this problem over time.
- Lots of spam as there is no good way of banning shitters
Just hire more jannies who do it for free.
- Less people will be inclined to download tor and use it to access the site.
Fuck normalfags anyway. If someone really wants in without using tor, they can just use a proxy service or whatever.

Attached: 1558350047333.png (1200x915, 53K)

This. Whonix can’t leak your real IP because it doesn’t know your real IP. Sill doesn’t work against a correlation attack though.

>It's easier if you sniff a large part of the network
In this context, to "sniff" what's going from A to B, you need to either be A or B. Good luck owning 50% of all nodes that exist.

>it's easy dude
>you just have to own 99% of the computers on the Internet man

Costumes and lip service do nothing to bring you closer to god

>implying your post is any better

I never said it was easy.
Some user few posts above claimed it is impossible to track packets even if you own all the nodes. It's obviously bullshit so I called him out on that.
Tor is pretty secure as long as no one have an absurd amount of nodes.

Everyone's god exists in their minds, and it's a projection of the self. You can become closer to your god doing literally anything you want to.

Isn’t that how they caught the Silk Road guy? They were completely in the dark and someone happened to notice him post on some clear net forum with the same handle as the one they knew him by

The original silk road guy was caught because the server hosting the hidden service was already compromised, but they didn't know who the owner was until he posted a part of the source code in a forum asking programming questions. (I think it was SO but not sure)

That’s what I meant, yeah. Some glow nigger just happened to recognize his SO (or whatever) handle from the anonymous guy they were looking for

>own a shitton of nodes on the network!
>best you can come up with is correlation attacks

morons.

hint: Tomer Ashur, Orr Dunkelman, Atul Luykx

Which is why like 3 people have been caught out of millions.

Most of the people who have been caught are at CIA black sites...

>>boots up nord VPN
>thinks he is safe now
absolute state of zoomerfags

The head admin of the playpen cp site only got busted because he started his posts/comments with a unique version of "Hiyas" They ended up finding a facebook in Austrailia that also used the same introduction and guess what? They found him. They later went on to implement the NIT (java exploit) that busted all those guys in operation pacifier that didnt update tor browser bundle or disable all Javascript

The are on tor (oxwugzccvk3dk6tj), but it takes literally 10 minutes to load if it does, and now i'm gust getting a gateway timeout.

It's down because they are upgrading servers
But it's meaningless if the server's ip is public knowledge

>botnet over botnet

Attached: 1564310371132.png (493x402, 8K)