CHATPRIVACYDONATELOGINREGISTER
DMT-Nexus
FAQWIKIHEALTH & SAFETYARTATTITUDEACTIVE TOPICS
Should We Recommend Users Access Via Proxies? Options
 
blacklist666
#1 Posted : 7/1/2011 4:47:20 PM

imagined clarity


Posts: 95
Joined: 27-Jun-2011
Last visit: 01-Jul-2017
Location: Paradise
I saw this thread: https://www.dmt-nexus.me...aspx?g=posts&t=21384

I understand IP addresses can be harvested by government's and ISP's can divulge records. Accessing this site could endanger the livelihoods of Nexians. http://www.proxyswitcher.com has a program that makes it so you can access this site without direct IP traffic pointing back to you, and it has a Firefox plugin. What are your thoughts about recommending users take precautions in order to assure their anonymity is better protected? Open to suggestions.

I suppose I'm just recommending another tool.

(Trying to be helpful) =)
I= SWIM = Not Me. The I AM I Does Not Exist, and is Referenced to SWIM Who Is Not A Friend I Never Met, Nor Hallucinated While Imagining The Is-ness of Suchness That Is SWIM Who Is Not Me, Myself, Nor I As The Expression Of Non Dual Aspect of Non-Dual Reality Subjectively Denied By Swim, or accompanying Me-Anti-ness'es. =) All Credit Goes To The ANTI-SWIM'ness of SWIM's cousin's room-mate's uncle's deceased cat's in-law's second removed nephew's aunt WHOM authored SWIM's 2000 Year Old Desert Scribblings from a drunk rabbit in the Serengeti desert found in an insane asylum under water, on Easter eggs, crucified by the on fire pagan music listening christian maniac from India running around believing he was Jesus repenting this bush he called the Acacia tree; So I Heard from a bum who claims to be SWIM, But I Forgot... And Again, "I" Refers To Someone Who Is Not Me.
 

Live plants. Sustainable, ethically sourced, native American owned.
 
a1pha
#2 Posted : 7/1/2011 4:54:06 PM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
That's pretty neat, but they want $25 for it. What are the benefits of proxyswitcher not found in a free Vidalia or I2P download? Both the TOR and I2P networks have a pretty solid reputation and cost nothing.
"Facts do not cease to exist because they are ignored." -A.Huxley
 
blacklist666
#3 Posted : 7/1/2011 6:44:24 PM

imagined clarity


Posts: 95
Joined: 27-Jun-2011
Last visit: 01-Jul-2017
Location: Paradise
Thank you a1pha, I didn't know that.

I read somewhere Tor was for government and law enforcement.

These articles raised an eyebrow for me.

http://arstechnica.com/t...users-on-tor-network.ars

http://www.zdnet.com/blo...o-nab-tor-pedophiles/114


I'll look more into this a little later. Thanks for the heads up! =)
I= SWIM = Not Me. The I AM I Does Not Exist, and is Referenced to SWIM Who Is Not A Friend I Never Met, Nor Hallucinated While Imagining The Is-ness of Suchness That Is SWIM Who Is Not Me, Myself, Nor I As The Expression Of Non Dual Aspect of Non-Dual Reality Subjectively Denied By Swim, or accompanying Me-Anti-ness'es. =) All Credit Goes To The ANTI-SWIM'ness of SWIM's cousin's room-mate's uncle's deceased cat's in-law's second removed nephew's aunt WHOM authored SWIM's 2000 Year Old Desert Scribblings from a drunk rabbit in the Serengeti desert found in an insane asylum under water, on Easter eggs, crucified by the on fire pagan music listening christian maniac from India running around believing he was Jesus repenting this bush he called the Acacia tree; So I Heard from a bum who claims to be SWIM, But I Forgot... And Again, "I" Refers To Someone Who Is Not Me.
 
a1pha
#4 Posted : 7/1/2011 7:26:51 PM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
TOR began as a US Navy project and is used by governments and law enforcement all over the world. Anyone who wishes to remain *mostly* anonymous can use it. To be anonymous, you need to hide amongst all other users - the more users the more anonymous you are.

blacklist666 wrote:
Is on there, I wonder how long Tor will remain truly safe?

Keep in mind the pedophiles do us anonymous folk some good in that most of society finds CP morally detestable - more so than just about anything else (even drugs). John Doe FBI agent has more PR to gain from taking down a CP ring than he does a few people buying and selling drugs (lets hope this isn't your intent, either). While sites like the one you mentioned are probably next on the list - you don't have much to worry about as long as CP exists on the network.

Sorry if I just left a pit in your stomach - it's difficult to talk about the underbelly of the internet without getting nauseous. Crying or very sad

EDIT: BTW, I should mention that it is *highly* likely governments such as the US have technology to locate TOR users. It's almost a given. That said, to prosecute a user they would need to go public with this technology - something I doubt they'll do for years.
"Facts do not cease to exist because they are ignored." -A.Huxley
 
blacklist666
#5 Posted : 7/1/2011 7:40:44 PM

imagined clarity


Posts: 95
Joined: 27-Jun-2011
Last visit: 01-Jul-2017
Location: Paradise
I understand and quite frankly if it weren't for pedophiles going an incentive for law enforcement and the hacker community at large a moral incentive to find back doors in proxy systems, then how else would we know they are safe? I will be more vigilant on researching this mater. The next time I post a proxy software I will be sure to do my research of every single one I can get a hold of first. Thank you again for more information. This forum collaboration stuff is cool. I will be also looking for a list of anonymous proxy server lists that have good ping times, etc. =)
I= SWIM = Not Me. The I AM I Does Not Exist, and is Referenced to SWIM Who Is Not A Friend I Never Met, Nor Hallucinated While Imagining The Is-ness of Suchness That Is SWIM Who Is Not Me, Myself, Nor I As The Expression Of Non Dual Aspect of Non-Dual Reality Subjectively Denied By Swim, or accompanying Me-Anti-ness'es. =) All Credit Goes To The ANTI-SWIM'ness of SWIM's cousin's room-mate's uncle's deceased cat's in-law's second removed nephew's aunt WHOM authored SWIM's 2000 Year Old Desert Scribblings from a drunk rabbit in the Serengeti desert found in an insane asylum under water, on Easter eggs, crucified by the on fire pagan music listening christian maniac from India running around believing he was Jesus repenting this bush he called the Acacia tree; So I Heard from a bum who claims to be SWIM, But I Forgot... And Again, "I" Refers To Someone Who Is Not Me.
 
a1pha
#6 Posted : 7/1/2011 7:44:00 PM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
blacklist666 wrote:
I will be also looking for a list of anonymous proxy server lists that have good ping times, etc. =)


http://proxy.org/cgi_proxies.shtml

Wink
"Facts do not cease to exist because they are ignored." -A.Huxley
 
blacklist666
#7 Posted : 7/1/2011 7:54:12 PM

imagined clarity


Posts: 95
Joined: 27-Jun-2011
Last visit: 01-Jul-2017
Location: Paradise
If I Theoretically ran either Vidalia or I2P, would that encrypt any browser on my computer, or just specific ones?
How do browsers integrate? Do you have to change proxy settings in the browser, or use an add-on? Or are these programs where I can make it browser specific. and the Vidalia program; does it encrypt bit torrent & httpd as well? or is it only one part of tor, and separate programs would have to be setup individually? I'm trying to weigh hassle setting up v.s. privacy. =)
I= SWIM = Not Me. The I AM I Does Not Exist, and is Referenced to SWIM Who Is Not A Friend I Never Met, Nor Hallucinated While Imagining The Is-ness of Suchness That Is SWIM Who Is Not Me, Myself, Nor I As The Expression Of Non Dual Aspect of Non-Dual Reality Subjectively Denied By Swim, or accompanying Me-Anti-ness'es. =) All Credit Goes To The ANTI-SWIM'ness of SWIM's cousin's room-mate's uncle's deceased cat's in-law's second removed nephew's aunt WHOM authored SWIM's 2000 Year Old Desert Scribblings from a drunk rabbit in the Serengeti desert found in an insane asylum under water, on Easter eggs, crucified by the on fire pagan music listening christian maniac from India running around believing he was Jesus repenting this bush he called the Acacia tree; So I Heard from a bum who claims to be SWIM, But I Forgot... And Again, "I" Refers To Someone Who Is Not Me.
 
SWIMfriend
#8 Posted : 7/1/2011 8:08:34 PM

DMT-Nexus member

Senior Member

Posts: 1695
Joined: 04-May-2009
Last visit: 11-Jul-2020
Location: US
The tor articles are interesting. But they're special cases, and they involve examining actual contents of transmission.

Although I'm probably one of the LEAST internet savvy people on the forum, I have been trying to learn a bit about this stuff. From my investigations I feel that most problems raised by those articles are easily overcome by 1) Using a VPN, which encrypts everything from you to them, 2) The https protocol on the Nexus, which should leave stuff exiting even the VPN encrypted until it gets to the Nexus.

If you have an honest VPN, and Nexus https is turned on, both the TARGET of your internet communication (the Nexus), and the CONTENT of your communication, should be safe from just about EVERYONE (including your ISP).

If you also take steps at home so that you can be SURE no record remains on your computer regarding your internet activity (a1pha has recommended the TAILS suite of programs for that), then, adding that to the VPN and Nexus https privacy, one should be VERY well protected against both generalized police searching, and SPECIFIC police activities concerning you personally. One example of what looks like a good VPN is here. I especially like them because they don't require the typical "subscription" requiring a credit card and identification. BTW, a great anonymous "credit card" that is totally untraceable, and can be used for such things, is the Vanilla Visa. In the US it's easily available in many places, such as 7-11 and Walgreens.
 
blacklist666
#9 Posted : 7/1/2011 8:13:13 PM

imagined clarity


Posts: 95
Joined: 27-Jun-2011
Last visit: 01-Jul-2017
Location: Paradise
I will save up for a VPN Enabled router immediately! Thank you both for your guidance and support!
I= SWIM = Not Me. The I AM I Does Not Exist, and is Referenced to SWIM Who Is Not A Friend I Never Met, Nor Hallucinated While Imagining The Is-ness of Suchness That Is SWIM Who Is Not Me, Myself, Nor I As The Expression Of Non Dual Aspect of Non-Dual Reality Subjectively Denied By Swim, or accompanying Me-Anti-ness'es. =) All Credit Goes To The ANTI-SWIM'ness of SWIM's cousin's room-mate's uncle's deceased cat's in-law's second removed nephew's aunt WHOM authored SWIM's 2000 Year Old Desert Scribblings from a drunk rabbit in the Serengeti desert found in an insane asylum under water, on Easter eggs, crucified by the on fire pagan music listening christian maniac from India running around believing he was Jesus repenting this bush he called the Acacia tree; So I Heard from a bum who claims to be SWIM, But I Forgot... And Again, "I" Refers To Someone Who Is Not Me.
 
a1pha
#10 Posted : 7/1/2011 8:24:40 PM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
blacklist666 wrote:
If I Theoretically ran either Vidalia or I2P, would that encrypt any browser on my computer, or just specific ones?

Keep in mind there's a difference between anonymous and encrypted. Your first step is probably to research the difference between these two.

blacklist666 wrote:
How do browsers integrate? Do you have to change proxy settings in the browser, or use an add-on? Or are these programs where I can make it browser specific.

Configuring this is almost an art. Older versions of Firefox work best for your basic Vidalia/TORbutton setup. Ideally, you should have a fresh OS install, older firefox with scripts disabled, another browser for 'normal' browsing, etc etc etc

blacklist666 wrote:
and the Vidalia program; does it encrypt bit torrent & httpd as well? or is it only one part of tor, and separate programs would have to be setup individually?

It doesn't encrypt anything. Joining the TOR network only makes you anonymous. Encrypting the data is in your hands.

blacklist666 wrote:
I'm trying to weigh hassle setting up v.s. privacy. =)

If you're asking this question then jumping through all the hoops necessary to be completely hidden is probably not for you. That doesn't mean you can't be proactive on what information you give to others, e.g. installing anti-script plugins, scanning often for virus/malware, stop telling the world your every last move on FB (or, tell them carefully - keeping as clean an image possible), ....
"Facts do not cease to exist because they are ignored." -A.Huxley
 
ragabr
#11 Posted : 7/1/2011 10:50:19 PM

DMT-Nexus member


Posts: 2354
Joined: 24-Jan-2010
Last visit: 21-Jun-2012
Location: Massachusetts
Setting up TOR with Chrome is also exceptionally easy, using the "Proxy Switchy!" extension.
PK Dick is to LSD as HP Lovecraft is to Mushrooms
 
SWIMfriend
#12 Posted : 7/2/2011 1:09:36 AM

DMT-Nexus member

Senior Member

Posts: 1695
Joined: 04-May-2009
Last visit: 11-Jul-2020
Location: US
All right. Correct me if I am wrong: I believe I've found convincing info that if you connect through tor then your data IS encrypted between you and tor (but not beyond the tor exit node), AND the URL of your end site is NOT available to your ISP.

I mention this because the two things I would most like to avoid (in consideration of the legal implications) are:

1) Law enforcement getting info about the sites I have visited from my ISP
2) Law enforcement getting info about the searches I have made on google (via my IP address that they got from my ISP).**

It seems now that if one uses tor, then those two items are off the list--neither my ISP or google knows anything about what I'm up to. Anybody wish to confirm or deny that?

With that being true, the only remaining issue (and knowing that the secure communication with the Nexus protects me at exit from tor) is WHAT IS STORED ON MY COMPUTER. I'm sure I don't need to remind people that Windows (especially) writes ALL KINDS OF CRAP all over the place; and even if you deliberately over-write all empty space on your drives, you still can have loads of stuff in window's files that records internet sessions.

**EDIT: Of course, this raises cookie issues, as well. For almost all other concerns besides items 1 and 2, it seems that "TAILS" would work well. Problem is you have to boot your computer with it when you want to use it.
 
a1pha
#13 Posted : 7/2/2011 3:41:03 AM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
SWIMfriend wrote:
It seems now that if one uses tor, then those two items are off the list--neither my ISP or google knows anything about what I'm up to. Anybody wish to confirm or deny that?

That's correct. You essentially connect yourself through the TOR network to the internet instead of through the ISP. While you still use the ISPs connection, you are essentially bypassing their routers and instead using the TOR network. This is one reason connections are slow. Always remember, the faster the connection, the less anonymous.

Also, anonymous is not encrypted. I can have an anonymous connection which is not encrypted. I can have an encrypted connection which is not anonymous.

Ideally, the connection is both encrypted and anonymous.

This should more or less protect you from the outside world seeing what's going on. As to info stored on your computer, this all depends on how sensitive your info is. I'm considering spending some time in the wiki this weekend writing up something on various levels of security. More to come...
"Facts do not cease to exist because they are ignored." -A.Huxley
 
a1pha
#14 Posted : 7/2/2011 3:48:32 AM


Moderator | Skills: Master hacker!

Posts: 3830
Joined: 12-Feb-2009
Last visit: 08-Feb-2024
ragabr wrote:
Setting up TOR with Chrome is also exceptionally easy, using the "Proxy Switchy!" extension.

Ehh, be careful. While I use Chrome for my every-day browsing (and love it), Google has a nasty habit of collecting browsing habits of users. Firefox is proven 'safe' with versions under 3.6 (windows).

Ideally, you'd just use TAILS at a library. Really nothing better.
"Facts do not cease to exist because they are ignored." -A.Huxley
 
 
Users browsing this forum
Guest (3)

DMT-Nexus theme created by The Traveler
This page was generated in 0.069 seconds.