PDA

View Full Version : do anonymity



shadowlands
October 27th, 2009, 01:33 AM
programs work?

spadewarrior
October 27th, 2009, 01:43 AM
Do you mean like tor / privoxy? I've only got limited experience with them, both maybe this will help:

https://help.ubuntu.com/community/TOR

stlsaint
October 27th, 2009, 01:44 AM
yes they do work but use at your own risk!

shadowlands
October 27th, 2009, 01:51 AM
Why at own risk?

shadowlands
October 27th, 2009, 01:56 AM
do you think they will have Tor for 9.10?

nwadams
October 27th, 2009, 01:56 AM
because they aren't perfect. if someone has enough money (and time) they can find who is doing what on the internet regardless of things like privoxy.

HermanAB
October 27th, 2009, 01:57 AM
Chances are good that they don't quite work.

Online anonymity is more difficult to achieve than secrecy, since computer traffic is two way and some data packets always have to be able to find their way back to you.

shadowlands
October 27th, 2009, 01:58 AM
Why do people use them if there is a risk to using them?

sliketymo
October 27th, 2009, 02:02 AM
WHy do people use them if there is a risk to using them?

:popcorn:Probably trying to cover there tracks from the illegal activity that there trying to participate in.

stlsaint
October 27th, 2009, 02:05 AM
WHy do people use them if there is a risk to using them?

name something that involves you being on the internet but has absolutely NO risk involed! its a chance people are willing to take just like we all are by being on the internet at all!

shadowlands
October 27th, 2009, 02:16 AM
Good point. But why sale the software? There has to be a real need if the software is sold.
:popcorn:Probably trying to cover there tracks from the illegal activity that there trying to participate in.

sliketymo
October 27th, 2009, 02:22 AM
Good point. But why sale the software? There has to be a real need if the software is sold.

$$$$:popcorn:

cariboo
October 27th, 2009, 02:25 AM
This really isn't a support question. Moved to the Cafe.

shadowlands
October 27th, 2009, 02:29 AM
I wanted to find out what works in ubuntu to hide my IP Addy. but I will move.
This really isn't a support question. Moved to the Cafe.

handy
October 27th, 2009, 02:33 AM
U.S. military intelligence is a part of the history of Tor.

Tor works really well except in the circumstances where you are a target for surveillance. Under those circumstances you will be traced. Using a usually paid for off shore proxy account can make that more difficult.

Tor slows down your surfing speed.

Privoxy helps protect your privacy, as well as filtering out most adds; as does using Scroogle when you search.

Privoxy noticeably slows internet access down, but I have found that running it from an IPCop firewall router, does not slow the internet down. Though I don't understand why?

shadowlands
October 27th, 2009, 02:42 AM
Will talking on message boards make you a target?What makes one a target?
U.S. military intelligence is a part of the history of Tor.

Tor works really well except in the circumstances where you are a target for surveillance. Under those circumstances you will be traced. Using a usually paid for off shore proxy account can make that more difficult.

Tor slows down your surfing speed.

Privoxy helps protect your privacy, as well as filtering out most adds; as does using Scroogle when you search.

Privoxy noticeably slows internet access down, but I have found that running it from an IPCop firewall router, does not slow the internet down. Though I don't understand why?

jmszr
October 27th, 2009, 02:45 AM
shadowlands,

I noticed this today, perhaps it will be of some use to you:http://www.techsupportalert.com/best-free-anonymous-surfing-service.htm

shadowlands
October 27th, 2009, 02:49 AM
Thanks this covers a lot of the things I was thinking about. I am away from home a lot. My son is entertained with it a lot. :KS:KS:KS
shadowlands,

I noticed this today, perhaps it will be of some use to you:http://www.techsupportalert.com/best-free-anonymous-surfing-service.htm

Xbehave
October 27th, 2009, 02:53 AM
anonymity programs are tools, id depends how you use them.
If your a node of tor/i2p nobody can tell what you are posting (without controlling a lot of the network, which you can assume they do not), they can however tell that you are using tor/i2p
If your not a node, then the connection to the entry point can be monitored (unless you use https to get there)
If you use https (without tor), then nobody can see what you are sending to www.mysite.com but they can see you are connected to mysite
If you use https (with tor), then they cannot see you are connecting to www.mysite.com but they can see you are connected to tor

If you upload files/info that are traceable to you (e.g metadata in files,ets ) none of this matters
If the website your connecting to wants to track you, they can get a lot of information, e.g your browser/os/history/(put not your IP, unless there is an exploit out for your browser).

All of the above is as a general rule and short of there being usable attacks against tor/i2p/tls/etc

shadowlands
October 27th, 2009, 02:57 AM
What is a node of tor/i2p?
anonymity programs are tools, id depends how you use them.
If your a node of tor/i2p nobody can tell what you are posting (without controlling a lot of the network, which you can assume they do not), they can however tell that you are using tor/i2p
If your not a node, then the connection to the entry point can be monitored (unless you use https to get there)
If you use https (without tor), then nobody can see what you are sending to www.mysite.com but they can see you are connected to mysite
If you use https (with tor), then they cannot see you are connecting to www.mysite.com but they can see you are connected to tor

If you upload files/info that are traceable to you (e.g metadata in files,ets ) none of this matters
If the website your connecting to wants to track you, they can get a lot of information, e.g your browser/os/history/(put not your IP, unless there is an exploit out for your browser).

All of the above is as a general rule and short of there being usable attacks against tor/i2p/tls/etc

shadowlands
October 27th, 2009, 02:58 AM
How do u start a new thread here?

Can pics be stolen from your computer?

shadowlands
October 27th, 2009, 03:00 AM
fetish sites illegal?

Xbehave
October 27th, 2009, 03:12 AM
What is a node of tor/i2p?
tor (http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29) & i2p (http://en.wikipedia.org/wiki/I2p) are anonymity networks, nodes (as i meant it in the above reply) are computers that are part of the network and allow traffic to pass through them.

what kind of anonymity tools where you talking about?

shadowlands
October 27th, 2009, 03:30 AM
just for the computers at my home. We travel a lot an use a lot of hot spots for work. So we need something that will work in various locations
tor (http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29) & i2p (http://en.wikipedia.org/wiki/I2p) are anonymity networks, nodes (as i meant it in the above reply) are computers that are part of the network and allow traffic to pass through them.

what kind of anonymity tools where you talking about?

shadowlands
October 27th, 2009, 03:39 AM
bump
just for the computers at my home. We travel a lot an use a lot of hot spots for work. So we need something that will work in various locations

handy
October 27th, 2009, 03:46 AM
You really shouldn't bump a thread after only a matter of minutes. It is not considered to be polite netiquette.

People in general will bump a day after receiving no response which is usually considered to be more polite.

Being pushy, can cause a person to be ignored.

The above is just some friendly advise. :)

dmizer
October 27th, 2009, 03:47 AM
bump

Please don't bump unless you haven't gotten a reply in over 24 hours.

Thank you.

shadowlands
October 27th, 2009, 03:54 AM
Sorry and thanks for the tip. Have you seen "Without a Trace"? Was that kid using a proxy server?
You really shouldn't bump a thread after only a matter of minutes. It is not considered to be polite netiquette.

People in general will bump a day after receiving no response which is usually considered to be more polite.

Being pushy, can cause a person to be ignored.

The above is just some friendly advise. :)

handy
October 27th, 2009, 07:13 AM
As I mentioned when replying to your PM, the following site is probably your best bet, as there are people there that like to wear the black hat:

http://www.criticalsecurity.net/

You will need to join their forum.

gnomeuser
October 27th, 2009, 09:01 AM
Why at own risk?

Some security experts have set up tor exit nodes to check what data goes through. People seem to think that Tor will automatically encrypt data to the end point which is not the case, the exit node holders can read everything that is sent through. They can't, always, determine who set it but in a recent report they found amongst other things embassy mails in their exit node.

Use Tor but use it wisely, use it with encrypted traffic and definitely never sent cleartext personal information or passwords over a Tor connection.

handy
October 27th, 2009, 11:27 AM
& it is not appreciated by the Tor users if people use it for P2P.