Is TOR Still Anonymous? and How Were People Caught Using TOR?

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ส.ค. 2019
  • PIA Internet Access Affiliates Link
    www.privateinternetaccess.com...
    Parrot Security Linux Anon Surf Mode Using TOR
    • Parrot Security Linux ...
    The Tor Project
    www.torproject.org/
    Darknet Diaries Operation Bayonet
    darknetdiaries.com/episode/24/
    DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught
    • DEF CON 22 - Adrian Cr...
    www.defcon.org/images/defcon-...
    Adrian Crenshaws Site
    www.irongeek.com/
    Connecting With Us
    ---------------------------------------------------
    + Hire Us For A Project: lawrencesystems.com/hire-us/
    + Tom Twitter 🐦 / tomlawrencetech
    + Our Web Site www.lawrencesystems.com/
    + Our Forums forums.lawrencesystems.com/
    + Instagram / lawrencesystems
    + Facebook / lawrencesystems
    + GitHub github.com/lawrencesystems/
    + Discord / discord
    Lawrence Systems Shirts and Swag
    ---------------------------------------------------
    ►👕 lawrence.video/swag
    AFFILIATES & REFERRAL LINKS
    ---------------------------------------------------
    Amazon Affiliate Store
    🛒 www.amazon.com/shop/lawrences...
    UniFi Affiliate Link
    🛒 store.ui.com?a_aid=LTS
    All Of Our Affiliates that help us out and can get you discounts!
    🛒 lawrencesystems.com/partners-...
    Gear we use on Kit
    🛒 kit.co/lawrencesystems
    Use OfferCode LTSERVICES to get 5% off your order at
    🛒 lawrence.video/techsupplydirect
    Digital Ocean Offer Code
    🛒 m.do.co/c/85de8d181725
    HostiFi UniFi Cloud Hosting Service
    🛒 hostifi.net/?via=lawrencesystems
    Protect you privacy with a VPN from Private Internet Access
    🛒 www.privateinternetaccess.com...
    Patreon
    💰 / lawrencesystems
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 836

  • @TILR
    @TILR 4 ปีที่แล้ว +650

    You can have as many locks on your front doors as you want, but the moment you forget to lock them is the moment someone can take advantage of.

    • @TILR
      @TILR 3 ปีที่แล้ว +3

      @Ni ck also very true

    • @zeorjvistr6245
      @zeorjvistr6245 3 ปีที่แล้ว +1

      @Ni ck I don't even have ventilation now just with an oxygen pump

    • @jeannieh3661
      @jeannieh3661 3 ปีที่แล้ว +10

      I dont have windows or doors I live in a cave within a cave with a single 6mile long LAN line coming in.

    • @blair5475
      @blair5475 3 ปีที่แล้ว +7

      @@jeannieh3661 The FBI just need only to follow your LAN line to get to you.

    • @TILR
      @TILR 2 ปีที่แล้ว +6

      @Jon Doe but they said they had a REALLY COOL lookin' wooden horse to give me

  • @Ejohns1004
    @Ejohns1004 4 ปีที่แล้ว +1132

    So basically, you're only as secure as your patience allows you to be.

    • @AleksandarGrozdanoski
      @AleksandarGrozdanoski 4 ปีที่แล้ว +20

      Always

    • @chriscontact5857
      @chriscontact5857 4 ปีที่แล้ว +73

      @@alaskansummertime you know that mega data center the government built that turned out to be the tip of the iceberg with a few more sprinkled here and there? They have video of you buying all that burner shit at Walmart. Pay a prostitute to get it for you if you want it from walmart.

    • @-----REDACTED-----
      @-----REDACTED----- 4 ปีที่แล้ว +16

      Well, security and comfort of use usually are opposed to each other, so in general you are correct.

    • @alaskansummertime
      @alaskansummertime 4 ปีที่แล้ว +15

      @@chriscontact5857 Way ahead of you my man. Don't forget to wear a hat in case they pull sat footage.

    • @alaskansummertime
      @alaskansummertime 4 ปีที่แล้ว +9

      @@chriscontact5857 That I believe is how they caught a guy years ago using pre paid phone cards to call people on pay phones and harass them at McDonalds.

  • @holyravioli5795
    @holyravioli5795 4 ปีที่แล้ว +1333

    So in short, TOR is plenty secure as long as your not stupid.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 ปีที่แล้ว +184

      Yup!

    • @holyravioli5795
      @holyravioli5795 4 ปีที่แล้ว +80

      @xOr Excessive question marks is excessive. Also vpn is secure sometimes depending on how lenient your vpn provider is regarding logs. Alot of the big vpn names like NORDvpn will happily give your logs to any federal agency with a warrant.

    • @lauralil6886
      @lauralil6886 4 ปีที่แล้ว +46

      @PricklyTrees do you need a hug?

    • @isaackarjala7916
      @isaackarjala7916 4 ปีที่แล้ว +2

      @xOr i2p and Tor are both low latency encrypted mixnets.... But Tor is intended as an out-proxy, with in-proxying (hidden servers, .onion) being more or less an afterthought, while i2p is meant to be an in-proxy with little support for out-proxying.

    • @shockbladezed2352
      @shockbladezed2352 4 ปีที่แล้ว +9

      You're*

  • @Yoshi4d
    @Yoshi4d 4 ปีที่แล้ว +501

    this video is in everyone's watch history so you're already compromised

    • @andrescabrera6097
      @andrescabrera6097 3 ปีที่แล้ว +8

      Lol

    • @woodenhoe
      @woodenhoe 3 ปีที่แล้ว +10

      incognito mode:

    • @micsss_
      @micsss_ 3 ปีที่แล้ว +94

      actually use of tor is legal and so is surfing the dark web unless ur doing some shady shit

    • @lamka6978
      @lamka6978 3 ปีที่แล้ว

      Yosua Mokalu no VPN

    • @ooSHINIES
      @ooSHINIES 3 ปีที่แล้ว +23

      @@woodenhoe incognito only doesnt show your history to you specifically. Feds can still see it

  • @liondovegm
    @liondovegm 3 ปีที่แล้ว +49

    "I cite my sources."
    Subbed. Too few people do.

  • @ThouguohT
    @ThouguohT 4 ปีที่แล้ว +241

    Moral of the story: use Tor, don’t do illlegal shit on Tor

    • @parkv4861
      @parkv4861 4 ปีที่แล้ว +11

      A' Le that’s the only way to use tor effectively lmao

    • @shreyash366
      @shreyash366 3 ปีที่แล้ว +2

      @@nofood1 exactly the place is messed up bro

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว +11

      @Amazigh AFRICA Either it will load the content or won't. I doubt anything happens to you personally unless you uniquely identified yourself but I doubt it

    • @evanrichley7506
      @evanrichley7506 3 ปีที่แล้ว +6

      So i can watch shit on pornhub?

    • @sleepisirrelevant1067
      @sleepisirrelevant1067 3 ปีที่แล้ว +3

      But shit like downloading books and music is illegal?

  • @-----REDACTED-----
    @-----REDACTED----- 4 ปีที่แล้ว +190

    The downfall usually comes as soon as one cuts corners on OPSEC...and thus it is as with most vulnerabilities in cyber security: the user is likely the weakest link, not the system.

    • @livebythews
      @livebythews 4 ปีที่แล้ว +16

      The 8th layer of the OSI model 😏🤣🤣

    • @chriscontact5857
      @chriscontact5857 4 ปีที่แล้ว +23

      I was at a computer show in the nineties talking to a guy about the next Intel chip coming out. I said I was hopeful they would finally use all the extra features built into the chip with them getting so fast. I said I was tired of paying the high prices for chips and them not being leveraged. The guy took me aside and said those features are there for the government to hack you.
      It was kinda like how the Chinese were putting a rice size chip in boards coming to the US. In this case the insecurity was built into the processor, bus and architecture in general. All this and we were paying absurd prices for processor chips. We pay high prices for the government to have access to any intellectual property or advanced knowledge of our business deals. We actually pay the government to hack us.

    • @-----REDACTED-----
      @-----REDACTED----- 4 ปีที่แล้ว +3

      Brendon Patrick that would be the extended OSI model... 😂

    • @chriscontact5857
      @chriscontact5857 4 ปีที่แล้ว +6

      @N e g r i t o [tenfold] thank you for noticing. I put what i believe to be the same comment under the general comments to the video. The Lawrence Sys account replied saying none of it was true. I responded with the following:
      @Lawrence Systems / PC Pickup really? www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Classy response BTW.
      What about the German hacker groups back in the nineties that cracked Nice Try and exposed the unknown keys for windows nt. The two keys started with the letters NSA and MS. Microsoft egnowledged the MS key, but they wouldn't even respond about the NSA key. Those German hacker groups have now been outlawed and over the years multiples of their members have been maliciously prosacuted, silenced, killed, and disappeared. It was nice when they were being prosecuted, for crimes they committed before the laws were on the books.
      Your really going to tell me the computer companies use all the features they build into their processors? In the nineties they were using less then 10% in some cases.
      What did you think when it came out, with pictures, that Cisco routers were being sent to an NSA facility and had their own chips added? Then China outlawed cisco and ibm from much of their infrastructure. We have tried to remove china from much of or infrastructor. After that came out cisco tried for a while to unload Linksys.
      What are you a government paid counter intelligence officer? If not get your head out of your...

    • @chriscontact5857
      @chriscontact5857 4 ปีที่แล้ว +14

      @Pxsseiidon your screwed. The tech companies are part of the military industrial complex. If you dont like that term just say the tech companies are in bed with the government. The government can get your information whenever they want. As an extra bonus your system will never be truly secure or stable.
      I got really paranoid a few years back when Intel announced they were adding special features into the processor and chipset/buses that would give them wifi capacity. Never noticed my wifi improving. I did notice fifteen or so years ago where some devices seemed to connect to the internet through secure wifi and get some rudimentary information exchange as long as you didn't try to open a browser or something.

  • @adrianzolla9737
    @adrianzolla9737 4 ปีที่แล้ว +217

    I stopped watching to eat chilli and you randomly said my first name at 2:52 and I got paranoid

    • @eirinsynnvefrydenborg5909
      @eirinsynnvefrydenborg5909 4 ปีที่แล้ว +24

      Adrian Zolla Hahah the way he says it makes it more hilarious “Uhhhh... Adrian?”

    • @adrianzolla9737
      @adrianzolla9737 4 ปีที่แล้ว +25

      @@eirinsynnvefrydenborg5909 it tripped me tf out, I'm watching a video about TOR and then my screen is talking to me

    • @krinka1458
      @krinka1458 4 ปีที่แล้ว +11

      i just ate chilli too. coincidence? i think not!

    • @theflowerhead
      @theflowerhead 4 ปีที่แล้ว +2

      What timing. 😅

    • @ithaca2076
      @ithaca2076 3 ปีที่แล้ว

      @@adrianzolla9737 😂😂

  • @uiopuiop3472
    @uiopuiop3472 2 ปีที่แล้ว +20

    I wish IT companies were this cool and knowledgeable in my country, these videos are on a different level education-wise

  • @erinmayo5170
    @erinmayo5170 4 ปีที่แล้ว +257

    I have tape over my phone camera rn

    • @josephsmith6777
      @josephsmith6777 4 ปีที่แล้ว +26

      I use cheap cellphones and throw away laptops

    • @datitsdapussy4283
      @datitsdapussy4283 4 ปีที่แล้ว +66

      @@josephsmith6777 😂😂😂😂😂 what are you even doing ??????????ß

    • @philipmoore449
      @philipmoore449 4 ปีที่แล้ว +4

      carson mayo yeah I put one over my laptop camera. #nofacenocase

    • @RichardsWorld
      @RichardsWorld 4 ปีที่แล้ว +3

      We don''t want to see you in your underwear.

    • @princess200783
      @princess200783 4 ปีที่แล้ว +5

      @@datitsdapussy4283 "Datits Dapussy" O_O

  • @boro057
    @boro057 4 ปีที่แล้ว +12

    +1 for Darknet Diaries, great podcast. Casefile ep 76 also did an incredible breakdown of Silk Road which heavily ties into tor.

  • @sethwilliamson
    @sethwilliamson 4 ปีที่แล้ว +223

    TOR is one of those things that I enthusiastically cheer for, yet will not use personally.
    Why? Well, I approach it using torrent etiquette. I only feel right using it if I'm providing as much or more bandwidth to other users as I'm consuming. That means running a TOR node. Knowing the kinds of traffic some users turn to TOR to hide, I don't need that coming back to my IP. Sure, plausible deniability, but I'll leave it to others to be the brave social justice warriors and present that case in court. I don't need that in my life.
    Again, I wholeheartedly endorse the project, their pursuit of privacy, and the people that provide the nodes.

    • @jimbobbrowning35
      @jimbobbrowning35 4 ปีที่แล้ว +18

      as long as you're not running an exit node you won't have the problem. Run an onion router.

    • @sethwilliamson
      @sethwilliamson 4 ปีที่แล้ว +13

      @@jimbobbrowning35 -- Naw. Not good enough for me. I'm still taking pennies from the penny tray (using exit node bandwidth) and if everyone did that and only provided onion routers, the system collapses. I'm specifically talking about providing as much or more exit node bandwidth as I consume.
      I'd consider your suggestion if I was only using TOR to connect to TOR sites. In that case, it'd be a great suggestion. However, much of TOR usage serves as a sort of mesh VPN, used merely to connect to sites on the Internet through a privacy layer. That's about all I'd use it for as well, hence my personal compulsion to provide that same exit node bandwidth to others and not be a leech.

    • @darkhunter3232
      @darkhunter3232 4 ปีที่แล้ว +4

      @@sethwilliamson wait what? you torrent over tor? or did i misunderstand something?

    • @sethwilliamson
      @sethwilliamson 4 ปีที่แล้ว +18

      ​@@darkhunter3232 No, no no. :) That was an analogy.
      The same etiquette applies to me since what both share in common the penny jar kind of thing. If everyone leeches and nobody seeds torrents, torrenting just doesn't work. You have to have at least as much seeding as leeching. That leads to etiquette like minimum 1:1 seeding ratios. As in, if you download a torrent, seed it to the next people at least 1:1. Pretty widely accepted etiquette to keep it alive and healthy.
      I look at using TOR exit nodes like seeding/leeching. If all you had was a bunch of users wanting to traverse the TOR network and out exit nodes, but none of them were providing exit nodes, that doesn't work. The network is only healthy as long as there is as much or more exit-node bandwidth available as there is demand for it. Thus, I don't feel right using exit-node bandwidth unless I'm providing as much or more in return.
      I get that this seems bizarre to people, especially in consideration of the public entities out there providing big exit nodes. I guess that's analogous to some universities or other agencies seeding your favorite Linux distro's torrent. Regardless, I'll still seed that Linux distro ISO a minimum 1:1 or I feel like a leech, and I'll still feel the same compulsion to provide the TOR exit node 1:1 as well, which I am not comfortable doing for the reasons stated in my OP.
      Hope that clears it up. :)
      Oh, BTW. I'm not preaching or trying to push my view of it on others. No judgment at all on how others approach it. Just explaining my personal hangups here.

    • @darkhunter3232
      @darkhunter3232 4 ปีที่แล้ว +11

      ​@@sethwilliamson Okay, now I got it. You could run a middle relay, because they never get abuse reports and running some relay (even if it isn't an exit relay) still helps the network.

  • @youssefwolfx
    @youssefwolfx 8 หลายเดือนก่อน +1

    WOW you did deep research and your information is solid
    keep the hard work 🔥

  • @franciscruz1309
    @franciscruz1309 4 ปีที่แล้ว +55

    i personally drive 20 miles to an open wifi set up an aws instance running kali linux than i spin up a 2 vms through that instance whonix gateway and whonix workstation and after all that i brows cute cat videos.

    • @theillegalseagull6838
      @theillegalseagull6838 2 ปีที่แล้ว +3

      Please tell me this is a joke lol

    • @lp812leo
      @lp812leo 2 ปีที่แล้ว

      Nice

    • @salmandekkari5523
      @salmandekkari5523 2 ปีที่แล้ว

      you mean silly cute cat videos that are probably illegal 🤔🤔

  • @sharedknowledge6640
    @sharedknowledge6640 4 ปีที่แล้ว +15

    Another great video. I’m a long time fan of TOR and the more credible privacy oriented VPNs. And you’re absolutely correct the devil is in the details. Those who 100% follow best practices are likely to remain anonymous while those who are lazy and take a 95% anonymity is good enough approach probably shouldn’t even bother as they’re likely leaving an obvious trail nearly anyone could follow despite their half assed effort at privacy. Just like it takes just one unwanted pic on social media to ruin a politicians life it also takes just one lapse in anonymity to undo years of trying to be anonymous.

  • @theflowerhead
    @theflowerhead 4 ปีที่แล้ว +5

    Thank you, I'm pretty new to this.

  • @nathanjones704
    @nathanjones704 ปีที่แล้ว

    Informative no waffle and very funny dude you insight and research is appreciated 🥰

  • @AwesomeNickGaming
    @AwesomeNickGaming 4 ปีที่แล้ว +14

    Donating directly to the tor project is great and all but if you really want to help the Tor network, the best way is to run a Relay/Bridge/Exit Node to add more servers to the Tor network, I've been running an exit node for a few months or so

    • @ergpopler413
      @ergpopler413 4 ปีที่แล้ว

      Don't be tracking!

    • @sealifett8395
      @sealifett8395 4 ปีที่แล้ว +2

      Can you do that from a home connection?What are the requirements?

    • @AwesomeNickGaming
      @AwesomeNickGaming 4 ปีที่แล้ว +1

      @@sealifett8395 you can do it from a home connection but it's not recommended, I'd recommend to use a VPS or other server, the only requirements are being able to open a port and have Tor installed

    • @gigi8584
      @gigi8584 2 ปีที่แล้ว +1

      What is a bridge

    • @AwesomeNickGaming
      @AwesomeNickGaming 2 ปีที่แล้ว

      @@gigi8584 A bridge is pretty much a Tor relay which is not part of the Tor directory, and it is meant to be used by people in countries such as China where the government censors Tor. The idea is that since bridges are not published with the list of public Tor relays, governments can not block them by IP address. Many bridges also use pluggable transport like obfs4 in order to obfuscate the traffic so that the Great Firewall does not detect it as Tor traffic and block it

  • @NinoM4sterChannel
    @NinoM4sterChannel 4 ปีที่แล้ว +78

    Computerphile also made awesome videos explaining Tor hidden services and how Onion Routing works. really worth watching!

    • @Reth_Hard
      @Reth_Hard 4 ปีที่แล้ว +3

      If you are using Tor, always make sure javascript is not disabled, that's very important...
      :D

    • @johnnyaingel5753
      @johnnyaingel5753 4 ปีที่แล้ว

      @@Reth_Hard thank you for sharing

    • @Reth_Hard
      @Reth_Hard 4 ปีที่แล้ว

      @@johnnyaingel5753
      No problem, hehehe >:D

    • @whenshtf4155
      @whenshtf4155 3 ปีที่แล้ว +2

      ​@@Reth_Hard Yeah very important, to keep JavaScript enabled, you will lose so many wonderful features of a website if you disable JS.
      lmao

    • @DrAdityaReddy
      @DrAdityaReddy 3 ปีที่แล้ว +5

      @@Reth_Hard are you joking or are you serious? JavaScript should be disabled

  • @strange6973
    @strange6973 4 ปีที่แล้ว +1

    Thanks, this is a great talk! Some nice links and readings!

  • @godhateseveryonewhodoesntr5977
    @godhateseveryonewhodoesntr5977 3 ปีที่แล้ว +79

    I just installed it. I use it to exceed my free download limit and converting limits of ebooks. I hope the government doesn't find me, lol.

    • @justinconnor3721
      @justinconnor3721 3 ปีที่แล้ว +3

      Audible free trial?

    • @thepardigon178
      @thepardigon178 3 ปีที่แล้ว +16

      the government doesn't care about that lol

    • @godhateseveryonewhodoesntr5977
      @godhateseveryonewhodoesntr5977 3 ปีที่แล้ว +26

      @@thepardigon178
      Haha, I know. I was just joking 😅

    • @craig-ilesbagels2950
      @craig-ilesbagels2950 3 ปีที่แล้ว +6

      i use it for watching youtube videos my goverment has blocked instead of paying for a vpn

    • @floydloonie4880
      @floydloonie4880 3 ปีที่แล้ว +3

      Good luck hiding from God dude! You better stay in school and learn to read... The end clock is running down.

  • @Palaciosyt
    @Palaciosyt 4 ปีที่แล้ว +1

    Great explanation, thank you!

  • @NumbaOneBuddhaSmoka
    @NumbaOneBuddhaSmoka 4 ปีที่แล้ว +3

    Great Video, most informative I've found on this thanks!

  • @thenew77
    @thenew77 4 ปีที่แล้ว +6

    One key point with Tor that I didn't hear in this video is the fact that whoever controls the exit node(3rd hop,this is where your encrypted traffic hits the internet) is the one in control. Whoever has control over an exit node can abuse this to monitor traffic, among other things, just be careful, TOR is great, but its not 100% secure if you don't know what you're doing.

    • @ronnyondasticks9379
      @ronnyondasticks9379 2 ปีที่แล้ว +2

      What would you use instead

    • @xCwieCHRISx
      @xCwieCHRISx 9 หลายเดือนก่อน +2

      yes TOR-Exit-Nodes are perfect to perform Man-in-the-middle-attacks. But if you use a good up to date encryption protocol to communicate with the server like TLS1.3 or TLS1.2 with secure cypher suites. Everything should fine.

  • @davinalex
    @davinalex 4 ปีที่แล้ว

    great job on tor guide/info

  • @radicaledwards3449
    @radicaledwards3449 4 ปีที่แล้ว +13

    but how do the nodes know if they never knode the other nodes?

    • @acidbath3226
      @acidbath3226 3 ปีที่แล้ว +5

      trust me, you'd node.

    • @egg3288
      @egg3288 3 ปีที่แล้ว +1

      @@acidbath3226 please stop

  • @anteconfig5391
    @anteconfig5391 4 ปีที่แล้ว +165

    Sorry, my tin foil hat is practically welded on.

    • @Mheprai
      @Mheprai 4 ปีที่แล้ว +2

      Yeah, that little jab at the end threw a wrench in the spokes.

    • @zaktripper4908
      @zaktripper4908 3 ปีที่แล้ว

      Would that allow 5-G bandwidth to toast your noodle quicker, or spare your noodle from a 5-G toasting?

    • @crappyaccount
      @crappyaccount 3 ปีที่แล้ว

      😂😂

  • @robertthompson5568
    @robertthompson5568 3 ปีที่แล้ว +5

    I had heard about the use of Tor to...procure, so I just Googled "what is Tor" and since I don't speak Computer Guru.....I'm actually more confused...lol! 😆

  • @a.j.5108
    @a.j.5108 4 ปีที่แล้ว +2

    That video you referenced is 5 years old. It's theoretically possible to deanon tor by controlling the majority of the exit nodes with a bot net. It would need to be a targeted attack opposed to mass surveillance, but it could happen by a nation state.

    • @a.j.5108
      @a.j.5108 4 ปีที่แล้ว +1

      I think its being done right now. I think the gov't is parallel constructing other evidence.

  • @Replicant2600
    @Replicant2600 3 ปีที่แล้ว +9

    It’s hard to anonymize behavior. You almost need another application with an entropy source that takes you input and randomizes your behavior, securely, on the other side :).

    • @AB-ot3bm
      @AB-ot3bm 2 ปีที่แล้ว +3

      If you’re paying for your own ISP or cell phone and they ask for ID/Name/Address, you’re basically trackable - it’s just how many phone calls the authorities feel like making to track you down.

    • @MoraKingdom
      @MoraKingdom 2 ปีที่แล้ว +11

      @@AB-ot3bm If you wan't to have a secure phone, you have to open it ur self, remove GPS tracking thing, disable microphone and use a case that covers the camera, so you can use it, but people can't see shit if its hacked. And you need headphones plugged in to talk. You shouldn't have a Sim card or have an illegal one and take it out after use.
      Use Graphene OS, use public Wi-Fi.
      Put your phone in a Metal Box before entering home.
      Let a friend buy the phone and report it to the police for stolen.
      That should be pretty safe :)

    • @xero8865
      @xero8865 2 ปีที่แล้ว +1

      @@MoraKingdom You seem experienced😂

  • @ckilr01
    @ckilr01 4 ปีที่แล้ว +2

    You run TOR on a computer. If the IP can be compromised they can poke in through ports. one way is by getting movies to send out the IP address, or by using social information. I was reaearching how the US Government was busting TOR's used by criminals.

  • @MrNaporowski
    @MrNaporowski 3 ปีที่แล้ว +5

    My problem with Tor is that it doesn't seem to do much fingerprint spoofing, other than resolution... so, when you log in to the same website, your fingerprint will be pretty much the same, even though you changed your identity. Now, if the website is not very popular, they might easily figure out that it's the same person that has all those accounts...

    • @prsence5921
      @prsence5921 2 ปีที่แล้ว

      Just use virtual machine for resolution

    • @ennuiiunne5319
      @ennuiiunne5319 ปีที่แล้ว

      I know right? And popular sites will just block all of tor in contrast ergo it's useless.

    • @rootcanal7188
      @rootcanal7188 7 หลายเดือนก่อน

      Doesn't WHONIX claim to be better with fingerprinting than TAILS? There is a detailed discussion of that on the Whonix site.

  • @sebastiantello6966
    @sebastiantello6966 4 ปีที่แล้ว +3

    So, as i understod from this video, tor is still secure? During the last months I worked in this new informatic congress in my law school, and i learn how much information we give to Google and other companies.
    If you need to compare between tor and Mozila for private web browsing (like searching for PDFs, news, social networks), which one would be better?

    • @DA-jh9sr
      @DA-jh9sr 4 ปีที่แล้ว

      can you please elaborate on the information we give to google and other companies? I really want to know what type of information they get about me.

    • @blair5475
      @blair5475 4 ปีที่แล้ว

      D A They get everything.

  • @koilen
    @koilen 3 ปีที่แล้ว +10

    So, is it Good or is it Bad?
    I cant seem to get a clear response to that- what are some things i should avoid doing?

    • @mfour
      @mfour 3 ปีที่แล้ว

      avoid doing: illegal things plain and simple

    • @EnergyWRLD
      @EnergyWRLD 2 ปีที่แล้ว

      @@mfour Except guns and the 2A is gonna help you out.

  • @wompastompa3692
    @wompastompa3692 3 ปีที่แล้ว

    "Correlation attacks are a bitch."
    -Adrian Crenshaw.
    He's how I got introduced to all of this.

  • @INFERNO-bt1hz
    @INFERNO-bt1hz 2 ปีที่แล้ว +1

    I'm just still confused ..how do I simply make my device n network private?

  • @ssgpro1686
    @ssgpro1686 4 ปีที่แล้ว

    moi il me mes se message ? """ Tor Browser is already running, but is not responding. The old Tor Browser process must be closed to open a new window. """" ?? pourquoi

  • @SlingbladeJim
    @SlingbladeJim 4 ปีที่แล้ว

    Thank you sir.

  • @chrisatx6303
    @chrisatx6303 2 ปีที่แล้ว

    I started an ecomm service and need a website for customers to place orders and for payment. I need this website to be untraceable for tax purposes. Will this tor work for what I’m trying to do.

  • @longnamedude3947
    @longnamedude3947 4 ปีที่แล้ว +7

    Can you install Anon Surf on other distros?
    Also, TOR, like any other security method, is only as good as the weakest link, and like you say, often that weakest link is the person operating the device rather than the device itself, not always true, but it applies to most situations.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 ปีที่แล้ว +1

      It's all open source so with the right amount of coding I am sure it could work with other distros.

    • @longnamedude3947
      @longnamedude3947 4 ปีที่แล้ว

      @@LAWRENCESYSTEMS I assume you could just build it from source for another distribution? Or is it more tightly inter-connected with the distribution than that?

    • @pwn3d_d1rt
      @pwn3d_d1rt 4 ปีที่แล้ว +1

      There are several ports of anonsurf and some similar and IMO better scripts a Google search will return lots of results mostly from GitHub

    • @longnamedude3947
      @longnamedude3947 4 ปีที่แล้ว +1

      @@pwn3d_d1rt Any, 'Key Words' that may help narrow down my search area? I use multiple search engines so I have no doubt I'll find alternatives, I'm really after something that works with Arch and/or Arch based Distros

    • @pwn3d_d1rt
      @pwn3d_d1rt 4 ปีที่แล้ว

      @@longnamedude3947 yeah "anonsurf Kali"
      Will give some results, I use anonym8 but it's old and needs to be tweeked to get it to work properly now but it's the best if you're comfortable with that

  • @Theferg1
    @Theferg1 3 ปีที่แล้ว +1

    Thank you for the information and your time and resources definitely do appreciate that I’m just now learning and going down the Rabbit hole I would like to ask everyone a question I have been trying to find information on how to learn about PGP and how to get it all set up? Is there anyone out there that can possibly help me and point me in the right direction? Thanks!!💯👍

  • @trikkerman1
    @trikkerman1 2 ปีที่แล้ว

    I need help.
    I'm having trouble logging in using Tor. I put the info in but it just
    keeps saying, log in. Does anyone know how to fix that? Does anyone know
    if there is another browser out there like Tor?

  • @shaneintegra
    @shaneintegra 4 ปีที่แล้ว +4

    You should talk about Tails

  • @darkhunter3232
    @darkhunter3232 4 ปีที่แล้ว

    Great Video! :D

  • @cansadrigamerd9584
    @cansadrigamerd9584 4 ปีที่แล้ว

    I really wonder what was that email blackmail on the google bar ??

  • @freedomisdead9638
    @freedomisdead9638 2 ปีที่แล้ว +10

    Long story short, you are anonymous and safe from casual attackers but not against government Hackers! 😆

  • @spacetimejourney3471
    @spacetimejourney3471 3 ปีที่แล้ว +7

    There are multiple vectors of attack to de-anonymize someone. Using tor is pointless if your pc is not secure.

    • @MoraKingdom
      @MoraKingdom 2 ปีที่แล้ว

      nah just use empty pc with. tails

  • @2Sor2Fig
    @2Sor2Fig ปีที่แล้ว

    Glad to know all this, finally downloaded it today (as an atheist living in a christian household, I'm tired of the subtle hints that my browsing history isn't appreciated).

  • @billsmith9249
    @billsmith9249 4 ปีที่แล้ว +2

    what about using TOR while on a paid VPN too? I don't do anything bad but sometimes I just dont want to be tracked. I NEVER use login accounts and only use TOR. I have read some articles that say that you should not use TOR in full screen mode but no one has told me why. :/

    • @billsmith9249
      @billsmith9249 4 ปีที่แล้ว

      @Red Rain i'll look that reddit up, and thanks for the call on the resizing.

    • @waterspray5743
      @waterspray5743 ปีที่แล้ว +1

      By going full screen, you are basically telling the server your monitor resolution. They can puzzle out your identity by comparing data between clearnet and deepnet.

  • @everblu
    @everblu 4 ปีที่แล้ว +2

    Awesome video👍🏼

  • @AleksandarGrozdanoski
    @AleksandarGrozdanoski 4 ปีที่แล้ว +28

    Hmm, perhaps the ideal solution is to subscribe to two different VPN's and use Tor in the middle 😄

    • @adrianzolla9737
      @adrianzolla9737 4 ปีที่แล้ว +13

      That's what I do, I couldn't trust just one

    • @AleksandarGrozdanoski
      @AleksandarGrozdanoski 4 ปีที่แล้ว +2

      @@adrianzolla9737 😂😂😂😂😂

    • @mr.rockout7959
      @mr.rockout7959 4 ปีที่แล้ว

      Which one are those vpns I don’t know any good ones ?

    • @RIPOBJ
      @RIPOBJ 4 ปีที่แล้ว +17

      @@adrianzolla9737 someone's doing illegal shit 😂😂

    • @ergpopler413
      @ergpopler413 4 ปีที่แล้ว +5

      That's less secure then just TOR LMAO

  • @Avalanche2
    @Avalanche2 4 ปีที่แล้ว +10

    The large Tor exit nodes are mostly government owned, I thought people knew that.

    • @lechsiz1642
      @lechsiz1642 4 ปีที่แล้ว

      I think the fact that Tails forces users to first go to their website is a security risk (putting a target on one's own back). I am way wrong?

  • @adamspeek476
    @adamspeek476 4 ปีที่แล้ว

    hey...Why the new tor browser use duck duck go search engine to enter tor....is the tor browser's serches are monitored by duck duck go?????..... i think may be it is possible....please answer this question

  • @amoghnayak7867
    @amoghnayak7867 2 ปีที่แล้ว +1

    when this video started playing due to autoplay and i first heard your voice, i thought that you were jack rhysider for a moment

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  2 ปีที่แล้ว

      As Jack said at the end of E90: " Even though in the future everyone will have fifteen minutes of privacy" this is NOT Darknet Diaries but I do love that podcast.

  • @simonmartinez4433
    @simonmartinez4433 4 ปีที่แล้ว +2

    Hi Tom, I was trying Tor Browser last day. Since I was testing a geolocation feature that blocks ip's in selected countries on my office firewall. It was able to determinate my location, it blocks me but how could it be that the firewall could find out my location. Not that I´m not happy that the geolocation features works but it makes me doubt about anonymity using Tor.

    • @eldrago19
      @eldrago19 2 ปีที่แล้ว +1

      Either it just blocks all Tor connections or your Tor entry node was in a banned country.

  • @karlklaus3177
    @karlklaus3177 4 ปีที่แล้ว +8

    How about supposedly most nodes, specially exit notes are run by government agencies etc? Wouldn’t this be a problem if most of the nodes are compromised?

    • @ruthlessbanditz2961
      @ruthlessbanditz2961 4 ปีที่แล้ว

      @NubsWithGuns So in theory, the only benefit of using a VPN then Tor, is the small chance all of the nodes are compromised?

    • @ruthlessbanditz2961
      @ruthlessbanditz2961 4 ปีที่แล้ว +1

      @NubsWithGuns I have read it, but i think they're wrong, VPN is your last line off defense, and if they really don't keep logs and they're outside the Five eyes country's, you should be good even if you connect to all 3 of their nodes.

  • @Plastik13
    @Plastik13 ปีที่แล้ว

    Nothing better than the old good methods : trade goods with your personal friends at your home, goods given hand to hand (nothing digital, nothing electronic).

  • @pkkigathi
    @pkkigathi 3 ปีที่แล้ว +2

    Just don't slip up. Be consistent when using tor

  • @williammelvin6371
    @williammelvin6371 4 ปีที่แล้ว +27

    I seriously doubt TOR is anonymous. Once the General Public catches on, the powers that be ruin it anyway they can.

    • @TheBoostedDoge
      @TheBoostedDoge 4 ปีที่แล้ว +11

      Still better than VPNs fucking honeypots

    • @darkridr25
      @darkridr25 4 ปีที่แล้ว +6

      @@TheBoostedDoge Personally I consider both TOR and VPNs to be honeypots....

    • @lething1237
      @lething1237 4 ปีที่แล้ว +1

      @@darkridr25 Why do you think Tor is a honeypot lmfao

    • @darkridr25
      @darkridr25 4 ปีที่แล้ว

      @@lething1237 Why do you think VPNs are honeypots? Whatever answer you give applies to TOR as well.

    • @lething1237
      @lething1237 4 ปีที่แล้ว +2

      @@darkridr25 No It doesn't, because VPN's are centralized, while Tor is decentralized. By the way, It's Tor & Not TOR.

  • @TheRandomTecLad
    @TheRandomTecLad 4 ปีที่แล้ว

    Just subed

  • @Witcherworks
    @Witcherworks 4 ปีที่แล้ว +2

    What is your opinion on signal?

    • @notreallyme425
      @notreallyme425 4 ปีที่แล้ว +3

      It’s good, except you have to register your real cell phone #.

  • @jacobmatt3532
    @jacobmatt3532 3 ปีที่แล้ว +1

    So..dont get lazy. Be careful and keep yourself safe

  • @Rama_Guru
    @Rama_Guru 4 ปีที่แล้ว +1

    what do you think about a very good VPN that routs to TOR or to 2 servers that are owned by the VPN in two different countries?

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      Tor and a VPN do nothing for your overall security in fact it draws more attention to yourself to third parties.

    • @Rama_Guru
      @Rama_Guru 4 ปีที่แล้ว

      @@Scorges1 the VPN keeps my ISP from selling my data and gets me content I would not see otherwise, I not much on TOR because its so slow.

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      @@Rama_Guru While that may be true don't use a VPN on Tor not really needed personally. Might be better to consider a bridge. Shitty your ISP sells your data. Are you in the US?

    • @Rama_Guru
      @Rama_Guru 4 ปีที่แล้ว

      @@Scorges1 the land of trump the corporat king, thats why a VPN

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      @@Rama_Guru Haha that sucks. Hell change your DNS settings to openDNS or cloudflare heard they don't keep your queries for more than 24 hours and won't sell your information or give it out unless law enforcement requests it

  • @LeonSteelpaw
    @LeonSteelpaw 4 ปีที่แล้ว

    Interesting, but does it like DSL?

  • @iliaschannel3646
    @iliaschannel3646 3 ปีที่แล้ว

    hello , wich is the best for full anonymity ,anonsurf , nipe or whonix ? or another tool that you know

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว +1

      Whonix. But due note no one is fully anonymous you can still be tracked but the chance of it happening is low unless you did something that uniquely identified yourself

    • @iliaschannel3646
      @iliaschannel3646 3 ปีที่แล้ว +1

      @@Scorges1 thanks bro for your answer

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      @@iliaschannel3646 No problem

    • @snekjuce
      @snekjuce 3 ปีที่แล้ว

      lmao full anonymity? are you stupid? or you joking? there is no such fucking thing. Unless...... but that's beyond 99.99999999% of computer users. fuck it. And seriously how silly is your question? "which third party software OWNED by a COMPANY/GROUP of INDIVIDUALS should I TRUST?" is what is really being asked....At the end of the day any service you go with, you are going with their service. ie on their servers n shite most likely. Obviously each has their own security measures taken from A-Z (at least supposedly)....but those are just SECURITY MEASURES....nothing is set in stone. Putting a lock on a door or 20 locks, does not mean that one cannot still get into that door.
      I mean no disrespect btw....enjoy and stay hydrated.

  • @satvindersihra9038
    @satvindersihra9038 2 ปีที่แล้ว

    @lawrence Systems Hi how do we cloak our entry and exit nodes?

    • @Scorges1
      @Scorges1 2 ปีที่แล้ว

      Click the onion when you connect to a website

  • @you_just
    @you_just 2 ปีที่แล้ว

    "how were people caught using tor?"
    opsec; it's always opsec

  • @jnorfleet3292
    @jnorfleet3292 4 ปีที่แล้ว

    Run a sniffer and pay attention to the packet data in tor. Easier to just hack Grandma Mildred's Wi-Fi down the street 😂

  • @lightalt5872
    @lightalt5872 2 ปีที่แล้ว

    I thought he was going to say "so I donated to the tor project, and all I got was this lousy t-shirt"

  • @brian2590
    @brian2590 4 ปีที่แล้ว +30

    Security has and always will be about the onion layers and even when those layers are tight one could still be swiss cheese and not even know it. It's a dynamic sort of thing that can change in a week a few days or even an hour. To think a single app can take care of all of this for you is kind of naive. An app wont fix your operating system, sloppy or lazy browsing habits or unpatched weakness in hardware no one will know about until 6 months from now. sure allot this stuff looks good on paper and works in some cases. I always cringe when people talk about the protocols behind secure messaging apps they have installed on cheap crap android phones where even the on screen keyboard could be compromised. protocols wont help you when the clear text you input is keylogged. There are probably hardware and software configurations where one can have some short term confidence but one app for all to have equal security is just a pipe dream. sure we can develop on our own clean systems what would work in theory but in the wild it's still just good on paper. If we all witnessed the horrors that went into device manufacturing and software development for devices meant for consumers to consume more shit we would throw it all out and not use it ever again.
    /end of drunken rant :D

  • @tasnubatahsin4504
    @tasnubatahsin4504 ปีที่แล้ว

    I have a question. Will it be dangerous if I accidentally use it without security VPN? And what will happen if I search a website in it and give my Email address?

    • @TasmanianTigerGrrr
      @TasmanianTigerGrrr 5 หลายเดือนก่อน

      I dont think you need a VPN for tor only for security

  • @ancapftw9113
    @ancapftw9113 4 ปีที่แล้ว +7

    Don't be the same person on the deepnet and the clearnet. Have a persona or character that you play when using TOR to do anything illegal or shady.
    If someone asks your name, location, etc., only the character's info is a valid answer. If you have to get things deaddrops could work, the UPS store.
    Yes, they might know who "ancapftw" is. But he isn't on TOR.

    • @maskedredstonerproz
      @maskedredstonerproz 3 ปีที่แล้ว +1

      Like my MaskedRedstonerProZ persona ?? it's got nothing to do with who I really am , aka my real name , although I should probably use a different persona if I do anything shady , which I probably won't

    • @jeffdaughertysdad6585
      @jeffdaughertysdad6585 2 ปีที่แล้ว

      Do you know what PGP encryption is? lol I can tell you have no idea what your talking about😂

    • @ancapftw9113
      @ancapftw9113 2 ปีที่แล้ว +1

      @@jeffdaughertysdad6585 do you not realize that all the encryption in the world can't do jack shit about fingerprinting and you telling people your real ID?
      Tell me, do you get confused about how Lex Luthor can still know Superman's real identity when he has the glasses on?

    • @jeffdaughertysdad6585
      @jeffdaughertysdad6585 2 ปีที่แล้ว

      @@ancapftw9113 when you buy something off the dark web. You use PGP encryption. The only 2 people that can read the messages are you and the vendor. The only way for the police to find you is if they got your laptop or the vendors laptop. Again I can tell you’ve never done this so go educate yourself

    • @ancapftw9113
      @ancapftw9113 2 ปีที่แล้ว

      @@jeffdaughertysdad6585 and you trust everyone you talk to and buy things from? No chance they are part of a sting? That they will get caught? That they will turn over their records or get hacked or have their records stolen?
      The whole point of the blockchain used in crypto is that you don't have to trust people.
      But sure, you should tell the person at the other end exactly who you are when you buy illegal stuff.
      Have fun in prison.

  • @topdog5252
    @topdog5252 2 ปีที่แล้ว

    Great video for a noob like me learning about Tor

    • @yourlogicalnightmare1014
      @yourlogicalnightmare1014 2 ปีที่แล้ว +1

      It's a heavenly place for criminals and pedos to do business

    • @sultanel-kalil7072
      @sultanel-kalil7072 2 ปีที่แล้ว +1

      @@yourlogicalnightmare1014 sucks that no matter how many sites get taken down, many more get developed

  • @tomatopuree2193
    @tomatopuree2193 3 ปีที่แล้ว +3

    So how can you make sure a link is not illegal or made to track you down?

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว +1

      You honestly can't. If you do view something that is illegal, I doubt anything happens to you personally because the feds go after people who knowingly produce and distribute illegal material such as child exploitation material.

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      @De Te Hardly. They do arrest people for watching it, but it's rare and usually based off a tip in those cases. However they usually go after people who produce the material and distribute the material. Usually when they go after people who know the content is considered illegal and produce it and distribute it around the web.

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      @De Te Yes cause it happens quite a bit. Pornhub is an example they allowed teens but the depiction of the material they looked of age but they actually weren't. It's hard to track watching it. Easier to go after people who produce/distribute it cause sites will report the material and help FBI other law enforcement officials out by giving them IP of the user

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      So if you accidentally stumbled upon and watched ti don't lose sleep over it. Cause feds got bigger fish to fry and go after those who knowingly produce and distribute the material.

  • @uppermostking02
    @uppermostking02 4 ปีที่แล้ว +2

    How to be smart 101 obvious for anyone don't use your home internet connection for legal activity. Use a brand new computer that has never been given any of your personal data. This would be referred to as a burner computer. If the computer is penetrated with malicious malware what have you nothing on that brand new computer can lead back to you. you can just throw it away

  • @SyncroScales
    @SyncroScales 2 ปีที่แล้ว

    Good video.

  • @BreadMan434
    @BreadMan434 3 ปีที่แล้ว +2

    Let me get on this non-incriminating network and do some incriminating digital activity.
    Because I'm smart like that...*sniff*

  • @olivergoodston2997
    @olivergoodston2997 2 ปีที่แล้ว

    Basically it is developed by us military which means if it's out its old news with known vulnerabilities and it may give you some degree of privacy provided you are not actual target of some Intel agency with sufficient resources.
    Conceptually the internet is not privacy oriented therefore you can never really escape from that.

  • @granautismo786
    @granautismo786 4 ปีที่แล้ว +6

    Isn't Tor funded by the NSA? Is a bug rumor going around...

  • @andreibanu5927
    @andreibanu5927 ปีที่แล้ว +1

    Can someone explain me what means to connect tor with home ip? I mean isnt that obvious? I should hack my neighbour wifi to use tor for annonimity or what?

  • @titustide
    @titustide 4 ปีที่แล้ว +3

    omg he said opsec lmao, I never thought I would hear that phrase ever again

    • @haveaniceday7950
      @haveaniceday7950 4 ปีที่แล้ว

      Why?

    • @titustide
      @titustide 4 ปีที่แล้ว +3

      @@haveaniceday7950 it stands for operation security, the military uses it a lot and I just got out of the navy

    • @haveaniceday7950
      @haveaniceday7950 4 ปีที่แล้ว

      Titus Tide I see. I know what it means, I thought you were implying that there wasn't such a thing.😉

  • @stephenalexander7076
    @stephenalexander7076 4 ปีที่แล้ว

    So can I copy my bookmark from my safari to Tor browser and use Tor instead of Safari ?

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว +1

      Personally I wouldn't import bookmarks. You can whatever you feel like

    • @obitorasu1760
      @obitorasu1760 3 ปีที่แล้ว

      Dont that ties back to you being you

    • @snekjuce
      @snekjuce 3 ปีที่แล้ว

      you can do whatever the FUCK you wanna do steven alexander...dude thats not how you spell my name.

  • @Vamavid
    @Vamavid 4 ปีที่แล้ว

    Parallel construction

  • @jbwrist
    @jbwrist 4 ปีที่แล้ว +5

    Human error accounts for 90% of breaches.

  • @ssm840
    @ssm840 2 ปีที่แล้ว

    why would someone be caught for connecting to IRC?

  • @crazysquirrel9425
    @crazysquirrel9425 4 ปีที่แล้ว

    If you use Windows or Mac, not even TOR is sufficient protection.
    TOR now uses centralized exit nodes that you can no longer change.
    It is a very WEAK point in the system.
    The dangerous portion is the exit node.
    Once it hits there it is in the clearnet.

    • @crazysquirrel9425
      @crazysquirrel9425 4 ปีที่แล้ว

      @Salvador Luna Linux, BeOS.
      The term 'windows computers' is a bit of a misnomer.
      It refers to the operating system and not the hardware.

    • @crazysquirrel9425
      @crazysquirrel9425 4 ปีที่แล้ว +1

      @Red Rain Exit nodes are FIXED now so that you can not change them. You can only change the route TO the exit node.
      Once it reaches the exit node and is sent out onto the clearnet, that portion is vulnerable just as if you went directly somewhere.
      TOR is best to hide your location, not so much the content.
      I use TOR daily.

  • @A.C.71
    @A.C.71 4 ปีที่แล้ว +1

    What I found is Tor is secure, but you cant use it on any website you normally would frequent I.e yahoo, youtube etc. every time I try to go to popular websites I would normally visit it gives me some error similar to this "Our systems have detected unusual traffic from your computer network. Please try your request again later. Why did this happen?"

  • @derjagerhalt3281
    @derjagerhalt3281 4 ปีที่แล้ว +10

    but does it work in China?

    • @tubbalcain
      @tubbalcain 3 ปีที่แล้ว

      @NightsEdge 0.1 never use a VPN, while connecting to TOR. Al that does, is putting in a really vulnerable entry- and exit point to your connection. The VPN server can be a honeypot or have been seased. And it makes data correlation also so much easier.

  • @RinksRides
    @RinksRides 4 ปีที่แล้ว +6

    Use linux Tails and TOR inside? AT THE PUBIC LIBRARY? (yes that was intentional misspell)

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      @BEN 1891 Arrested for what using Tor? All Tor users have the same fingerprint and it's hard enough tracking people down on there. Yes you can prevent it from happening as long as you don't enter unique identifying information and take the right protections while browsing to websites.

    • @beyondspace4088
      @beyondspace4088 2 ปีที่แล้ว

      @@Scorges1 is there risk in downloading using tor? On phone, specifically.

    • @Scorges1
      @Scorges1 2 ปีที่แล้ว +1

      @@beyondspace4088 Not quite. It might take longer to download awhile using Tor

    • @beyondspace4088
      @beyondspace4088 2 ปีที่แล้ว

      @@Scorges1 thx

    • @Scorges1
      @Scorges1 2 ปีที่แล้ว

      @@beyondspace4088 You're welcome at most anyone will know someone used Tor to download a file.

  • @therealb888
    @therealb888 3 ปีที่แล้ว

    i2p>tor Change my mind!

  • @makatron
    @makatron 3 ปีที่แล้ว +4

    TOR cannot prevent errors in layer 8

  • @mronion597
    @mronion597 4 ปีที่แล้ว +3

    Why some people says u need to disable java script also???

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว +4

      Cause that can uniquely identify you

    • @obitorasu1760
      @obitorasu1760 3 ปีที่แล้ว +1

      Almost the entire online tracking and fingerprinting process is based off on js

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      @Lxka Well it can uniquely identify you but, don't be paranoid

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      @Lxka Well worst case scenario for your friend. Likely nothing will happen to him. .onions use Tor on Tor encryption and are not reachable by the normal browser and require Tor. Once the session is closed the data is dropped and connection is closed. Not even exit nodes can see .onion links they are hidden for a reason. Your friend will be fine in the long run. Feds would of gotten him by now and he would be in jail. They go after people who knowingly produce and distribute and download/receive that material with the criminal intent to reproduce and distribute it usually on a large scale.

    • @Scorges1
      @Scorges1 3 ปีที่แล้ว

      @Lxka Also the .onion dark web links know a connection is made but not exactly the end user at all. That's a completely encrypted connection even if they got your physical access to machine they couldn't sniff your IP address

  • @SWIFTO_SCYTHE
    @SWIFTO_SCYTHE 3 ปีที่แล้ว +17

    :( one slipup one login to facebook or TH-cam or email by mistake while Tor is up you done played yourself. And unlike you the person the government surveillance NEVER slips for a second.

    • @selenophile410
      @selenophile410 3 ปีที่แล้ว

      Wait if I login to youtube using tor, is it still trackable ?

    • @thebandit9982
      @thebandit9982 3 ปีที่แล้ว +3

      @@selenophile410 don't log into anything that requires you to input any information that leads back to the real you. And things like TH-cam and Google accounts/emails is all someone needs.

    • @dankhill_
      @dankhill_ 3 ปีที่แล้ว

      @@thebandit9982 so would i be able to make a throwaway account? or do i just NEVER log in into youtube on tor?

  • @chriscontact5857
    @chriscontact5857 4 ปีที่แล้ว +3

    I was at a computer show in the nineties talking to a guy about the next Intel chip coming out. I said I was hopeful they would finally use all the extra features built into the chip with them getting so fast. I said I was tired of paying the high prices for chips and them not being leveraged. The guy took me aside and said those features are there for the government to hack you.
    It was kinda like how the Chinese were putting a rice size chip in boards coming to the US. In this case the insecurity was built into the processor, bus and architecture in general. All this and we were paying absurd prices for processor chips. We pay high prices for the government to have access to any intellectual property or advanced knowledge of our business deals. We actually pay the government to hack us.

    • @LAWRENCESYSTEMS
      @LAWRENCESYSTEMS  4 ปีที่แล้ว +1

      LOL, please remove your tinfoil hat, none of what you said is true.

    • @chriscontact5857
      @chriscontact5857 4 ปีที่แล้ว +4

      @@LAWRENCESYSTEMS really? www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Classy response BTW.
      What about the German hacker groups back in the nineties that cracked Nice Try and exposed the unknown keys for windows nt. The two keys started with the letters NSA and MS. Microsoft egnowledged the MS key, but they wouldn't even respond about the NSA key. Those German hacker groups have now been outlawed and over the years multiples of their members have been maliciously prosacuted, silenced, killed, and disappeared. It was nice when they were being prosecuted, for crimes they committed before the laws were on the books.
      Your really going to tell me the computer companies use all the features they build into their processors? In the nineties they were using less then 10% in some cases.
      What did you think when it came out, with pictures, that Cisco routers were being sent to an NSA facility and had their own chips added? Then China outlawed cisco and ibm from much of their infrastructure. We have tried to remove china from much of or infrastructor. After that came out cisco tried for a while to unload Linksys.
      What are you a government paid counter intelligence officer? If not get your head out of your...

    • @chriscontact5857
      @chriscontact5857 4 ปีที่แล้ว +4

      @@LAWRENCESYSTEMS how come you never answered me to say I planted the Bloomberg story or just give me some other snarky remark?

    • @fluffyhamster550
      @fluffyhamster550 4 ปีที่แล้ว +2

      Chris Contact
      Because it’s the ruthless truth 🙈🙉🙊

  • @BadgerBotherer1
    @BadgerBotherer1 3 ปีที่แล้ว +1

    I have had two anonymous death threats that popped up on my tablet, both when I was using a certain app. Is there any way I can trace who sent them?

    • @w1z4rd9
      @w1z4rd9 3 ปีที่แล้ว

      BadgerBotherer1 HACK THE PLANET

    • @acidbath3226
      @acidbath3226 3 ปีที่แล้ว +1

      lol so dumb. probably autotxt generator

    • @everyonehatesme6564
      @everyonehatesme6564 3 ปีที่แล้ว +1

      Use wire shark to get the IP

  • @jamesbenedict6991
    @jamesbenedict6991 3 ปีที่แล้ว +3

    Your missing the bigger picture. Tor is great at what it does but they still have to comply with the government. There is ways of being impossible to trace. Tor and orbit work to cover up your crucial information. The key thing to do is not only cover up your ip and mac but to completely change it. On android(Linux) you can change your ip and mac by simply factory reset. Go get you a straight talk rebel phone and buy a phone card. Reset this phone everytime you plan on logging into your site. Another important thing that everyone seems to forget is that every phone has a gps in it. You can block the gps by taking apart the phone. You can use the phone to connect your computer to the internet as well. The last important thing to keep in mind is never be on or around any other networks while on your site. The feds can trace you from what's called maping your location. They look for routers and devices in your wifi range to locate you. So if its not obvious you need to be isolated away from everything. If you follow all these steps it will be impossible to trace you.
    I am personally working on the new silk road. It will come to light soon

    • @imdaddyjoe1039
      @imdaddyjoe1039 2 ปีที่แล้ว

      Teach me. I'm willing to learn

  • @AnaiBendai
    @AnaiBendai 4 ปีที่แล้ว +4

    The NSA basically focuses on all TOR users. No browser is totally anonymous.

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      Not entirely true. NSA goes after government leakers, whistleblowers, suspected homeland terrorists, and other government related shit. I wouldn't worry too much just don't enter anything that can uniquely identify yourself or take the right precautions when browsing.

    • @AnaiBendai
      @AnaiBendai 4 ปีที่แล้ว +1

      @@Scorges1 Exactly because your aforementioned subjects think using TOR keeps them anonymous when it doesn't. It makes them stick out like sore thumbs.

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      @@AnaiBendai Haha it happens pretty often someone thinks Tor is anonymous and they link their Bitcoin up to some .onion and uniquely identify themselves. Tor is pretty secure, but yes you'll stick out like a sore thumb if you enter unique identifying information across exit nodes especially on sites that use http and not https

  • @jesus.christis.lord.foreve899
    @jesus.christis.lord.foreve899 ปีที่แล้ว

    I see necessity for a battery of pc s
    1 tor only pc
    1 mediary (faraday room non internet) pc to de-infect files to use on
    1 reg. pc
    1 (also faraday room non internet connectible) px as archive

  • @marineandmotor9270
    @marineandmotor9270 3 ปีที่แล้ว

    Tor is not famous for its speed exacly. Ok but sometimes unstable connection.

  • @lucaslindgren3237
    @lucaslindgren3237 4 ปีที่แล้ว

    What is the best anonymized tool i can use?

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว +1

      Tor Whonix Tails

    • @holyshit1916
      @holyshit1916 4 ปีที่แล้ว

      Reclusion aren’t whonix and tails seperate?

    • @Scorges1
      @Scorges1 4 ปีที่แล้ว

      @@holyshit1916 Yes you can choose between Tails or Whonix both are pretty secure as is and don't need tweaking. Tor alone is also secure

    • @obitorasu1760
      @obitorasu1760 3 ปีที่แล้ว

      The best tool is not a single tool but chained ones the topic of chaining itself is a big deal.