We've Moved! Visit our NEW FORUM to join the latest discussions. This is an archive of our previous conversations...

You can find the login page for the old forum here.
CHATPRIVACYDONATELOGINREGISTER
DMT-Nexus
FAQWIKIHEALTH & SAFETYARTATTITUDEACTIVE TOPICS
Data visibility with Tor and https protocol Options
 
Shaolin
#1 Posted : 10/24/2012 2:58:37 PM

Stiletto Stoner

Moderator

Posts: 1132
Joined: 18-Nov-2008
Last visit: 15-Mar-2015
Location: Blazin'
Cute and informative diagram (yet not directly linkable):

https://www.eff.org/pages/tor-and-https

Bonus tip - If you use obfsproxy (alpha stage at the moment) you will "hide" that you are using Tor.
Got GVG ? Mhm. Got DMT ?

Pandora wrote:
Nexus enjoys cutting edge and ongoing superior programming skills of the owner of this site (The Traveler), including recent switching to the .me domain name.


I'm still, I'm still Jenny from the block

Simon Jester wrote:
"WTF n00b, buy the $100 vapor pipe or GTFO"


Ignorance of the law does not protect you from prosecution
 

Explore our global analysis service for precise testing of your extracts and other substances.
 
cyb
#2 Posted : 10/24/2012 3:06:46 PM

DMT-Nexus member

Moderator | Skills: Digi-Art, DTP, Optical tester, Mechanic, CarpenterSenior Member | Skills: Digi-Art, DTP, Optical tester, Mechanic, Carpenter

Posts: 3574
Joined: 18-Apr-2012
Last visit: 05-Feb-2024
Interesting...so https isn't so bad after all...

Good because Tor is ridiculously Slooooww..Crying or very sad
Please do not PM tek related questions
Reserve the right to change your mind at any given moment.
 
โ™ฏ
#3 Posted : 11/29/2012 8:31:43 PM

DMT-Nexus member


Posts: 10
Joined: 26-Jul-2011
Last visit: 24-Mar-2015
Location: South
Definitely use HTTPS in conjunction with TOR (if you're going to use it). Like that diagram shows, the exit nodes on Tor networks suffer from a vulnerability by design. That exit node may be able to dump RAM and see anything passing through it.

Also, props on obfsproxy. If you're that paranoid about NSA/ISP dumping your info, running obfsproxy should mitigate the DPI(Deep packet inspection) techniques these guys use to determine TOR protocols. That's not to say the math geeks in the NSA labs aren't already working out how to determine what TOR traffic has been obfuscated. Big grin

Regards to TOR being slow, if you look in TOR's connection info, you should be able to drop the bottleneck routers (i.e. the ones with low throughput)
Love, Light, Peace

The elves have found a new way to say 'hooray'
 
 
Users browsing this forum
Guest

DMT-Nexus theme created by The Traveler
This page was generated in 0.009 seconds.