Is TOR compomised?

Luke Price
Luke Price

recently i have been having trouble confirming the PGP key for TOR; every-time it comes back as a negative match. is anybody else having this issue?

Attached: index.jpg (5.85 KB, 318x159)

Other urls found in this thread:

null-byte.wonderhowto.com/forum/encrypt-your-browser-sessions-linux-0164227/
linuxandubuntu.com/home/how-to-encrypt-dns-traffic-in-linux-using-dnscrypt/
thesecuritybuddy.com/encryption/what-is-tcpcrypt/
restoreprivacy.com/tor/
web.archive.org/web/20070415135835/http://jadeserpent.i2p.tin0.de/tor-dc-nodes-2.txt
dailymail.co.uk/wires/ap/article-2789314/Deferred-prosecution-sought-Harvard-student.html
yro.slashdot.org/story/17/03/05/2345245/fbi-dismisses-child-porn-case-rather-than-reveal-their-tor-browser-exploit
twitter.com/isislovecruft
2019.www.torproject.org/docs/signing-keys.html.en
quora.com/Are-there-any-alternatives-to-Tor
zdnet.com/article/hornet-tor-alternative-for-high-speed-anonymous-browsing-revealed/
archive.is/vLKOL
archive.is/NuZ0y

Julian Cook
Julian Cook

The tbb in the AUR is all you need :^)

Parker Parker
Parker Parker

Tor was created by the CIANIGGERS in the first place. It was never not compromised.

Gavin Garcia
Gavin Garcia

no problem for me.
what specifically are you doing and what output are you getting?

Attached: 0f8eba06a6f444025a8f1e998c64739b35c7ae4c.jpg (14.11 KB, 250x255)

Adrian Bell
Adrian Bell

TOR was made by the US Navy and therefore is compromised
Almost all cyphers included in the OpenSSL suite were oriignally made by the NSA and are therefore compromised
The Von Neuuman Architecture was originally made at the RAND Corp and is therefore compromised
The ARPANET was made via a grant by the US (D)ARPA and therefore the Internet is compromised

END THIS MEME

Henry Foster
Henry Foster

Tor has been compromised for nearly a decade OP

Henry Robinson
Henry Robinson

Isis Agora Lovecruft is a kike. I swear I'm not making this up.

Ayden Phillips
Ayden Phillips

The redesign is utter crap, not only did it lose the colours and nice 3d look but everything that used to be accessible under the tor button is now split into 3 (!) different buttons.

Andrew Barnes
Andrew Barnes

implying not all things are botnet
On a more serious note, Tor makes questionable decisions, for example centralized routing through persistent Guard nodes, not allowing you to get a new identity without closing all tabs, not making it easy to run a system wide proxy, being against torrenting through Tor, and not making it easy to run a relay to avoid correlation attacks by saturating the connection at all times, randomizing packet timing with a configurable delay, giving you the option of sending junk data at least to the first node, and giving obfuscation options that look like voice or file sharing data rather than looking like nothing identifiable like obfs4.
And that's just shit I've thought about by using it, I haven't even looked at the protocol to see in which other ways the glowniggers compromised it.

Caleb Nguyen
Caleb Nguyen

Here are some alternatives to Tor I've been researching.

null-byte.wonderhowto.com/forum/encrypt-your-browser-sessions-linux-0164227/

linuxandubuntu.com/home/how-to-encrypt-dns-traffic-in-linux-using-dnscrypt/

thesecuritybuddy.com/encryption/what-is-tcpcrypt/

Parker Wilson
Parker Wilson

not allowing you to get a new identity without closing all tabs
it's called a limitation.
not making it easy to run a system wide proxy
for u
being against torrenting through Tor
it would be extremely painful
and not making it easy to run a relay to avoid correlation attacks by saturating the connection at all times, randomizing packet timing with a configurable delay,
install i2p or a real overnet. Tor is a bandaid to browse the clearnet anonymously.

Colton Campbell
Colton Campbell

it's called a limitation.
Maybe it's limited on purpose.
for u
Nah, UI-wise they only pay attention to the browser, there used to be Vidalia but they shut it down. It makes no sense to configure stuff like bridges through a fucking browser extension.
it would be extremely painful
Nah, it works very well, you just need to manually set up the few http(s) trackers that don't block it.
install i2p or a real overnet. Tor is a bandaid to browse the clearnet anonymously.
Those have even less eyeballs on it than Tor. Plus I don't need to connect to any old network, I specifically need to connect to arbitrary TCP servers. Ideally it would do UDP, be able to accept incoming connections and not publish the list of exit nodes.

Elijah Hall
Elijah Hall

Consider the following:
restoreprivacy.com/tor/
web.archive.org/web/20070415135835/http://jadeserpent.i2p.tin0.de/tor-dc-nodes-2.txt
dailymail.co.uk/wires/ap/article-2789314/Deferred-prosecution-sought-Harvard-student.html
yro.slashdot.org/story/17/03/05/2345245/fbi-dismisses-child-porn-case-rather-than-reveal-their-tor-browser-exploit

Chase Collins
Chase Collins

Is TOR compromised? Yes. Lets count the ways.

First off lets look at the exit nodes. Who could possibly run one? TBs of the most rotguy kiddie porn, crime of every sort they make laws for, terrorists, etc. Somebody is running fat pipes and just giving that bandwidth away. Who could it possibly be?

When Daily Stormer was depending on TOR for its access the TOR developers were already readying a patch to prevent access to it. So yes, censorship IS possible on TOR, they just don't object to any of the above mentioned vile filth currently flowing over it. But they were ready to basically break the whole premise to stop a troll. Lets put on our thinking caps and ponder who would meet this description, unoffended by terrorists, criminals and child molesters but a Nazi Larper is out of bounds.

[Jeopardy theme plays]

Who is the CIA? for $500.

Jason Jones
Jason Jones

no doubt about it... i have worked with that tranny cunt.

Asher Turner
Asher Turner

twitter.com/isislovecruft

KILL THIS TRANNY B4 IT IS TOO LATE!

Brayden Howard
Brayden Howard

They could prevent you from accessing a hidden service site by patching the browser running on your machine, which you could revert. They might have said they were going to censor it, but if they did they were just bluffing. They don't have any way of doing it without removing the privacy and anonimity provided by the network. Also citation needed. Also go back to pol, you low IQ retard schizo boomer.

Jonathan Roberts
Jonathan Roberts

PGP key for TOR
No such thing. You mean Tor? The Tor source tarball? Which one? Tor Browser Bundle? Which one? Which OS?
negative match
No such thing. You mean a bad signature?
The Tor project doesn't have a single signing key. Different people sign different releases. 2019.www.torproject.org/docs/signing-keys.html.en
I haven't even looked at the protocol
Shocking.
null-byte.wonderhowto.com/forum/encrypt-your-browser-sessions-linux-0164227/
Following this guide will enable you to "surf the web" with your back covered (like a pro) safe from prying eyes (GCHQ cough, NSA cough cough) packet sniffing and MITM attacks.
lol. Also, an SSH tunnel is not an alternative to Tor.
linuxandubuntu.com/home/how-to-encrypt-dns-traffic-in-linux-using-dnscrypt/
Encrypting DNS queries is not an alternative to Tor.
Was your post a joke?
When Daily Stormer was depending on TOR for its access the TOR developers were already readying a patch to prevent access to it.
Prove it. All I remember is some butthurt nobody from the community asking the Tor Project to censor TDS, and the Tor Project saying, essentially, "we can't and won't do that."

Shit, man, we already know from that FBI warrant about the Earnest posts on /pol/ that the FBI shills on Zig Forums, but do you guys have to be so obvious about it? We get it. While Tor isn't perfect, it's still a significant threat to SIGINT, so you want to scare people away from it. Try to be more subtle next time.

Tyler Myers
Tyler Myers

Shocking
Non-argument.

Thomas Rogers
Thomas Rogers

Non-argument.
Not an argument

Nathaniel Hall
Nathaniel Hall

those things that were made by the US military industrial complex and alphabet soup are not compromised at all
<t. CIAnigger
Man, you sure have me convinced.

Attached: windows-security.webm (217.5 KB, 360x360)

Caleb Richardson
Caleb Richardson

I don't need an argument against a seething glownigger who didn't have any arguments either.

James Cruz
James Cruz

tor threatens SIGINT
<funded by the State Department

Yeah, OK. Let me guess, helpful passer by, I shouldn't use client-side PGP encryption on my emails because it's "too complicated", right?

Joshua Hernandez
Joshua Hernandez

calling others "glowniggers"
sounds like a glownigger thing to do

Juan Jackson
Juan Jackson

Don't forget the browser using noScript instead of uBlock Origin in advanced mode and not disabling js by default or at least having some sort of a setup where they give you an immediate option of choosing the security setting.

Luis Gray
Luis Gray

Stop pulling shit out of your ass.
They get a pass for enabling js by default because not doing so would break lots of sites and reduce anonimity by reducing the amount of normalfags using Tor. You can change the security settings easily by clicking on the Tor icon in the browser.
You are right that chosing noscript+ABP instead of ublock origin is a weird choice but I guess it could be that way for historical reasons.

Sebastian Reed
Sebastian Reed

These are actually the concerns I have with TOR. Especially the ease of targeted correlation attacks. It's truly frustrating. And I also wish I could have a different identity per tab. Would make anonymity a lot easier.

John Robinson
John Robinson

The CIA didn’t MAKE Tor. It was made by independent researchers whom the Navy funds independent researchers in order to justify its overinflated budget.

Gabriel Rodriguez
Gabriel Rodriguez

I fucked him.

Nolan Sanchez
Nolan Sanchez

him

Cameron Perry
Cameron Perry

No, the post wasn't a joke, I don't pretend to be an expert on this stuff, those are simply encryption alternatives I saw around and thought they were interesting I guess. I thought perhaps they'd be good in conjunction somehow. Tcpcrypt seems like a good alternative though.

Landon Parker
Landon Parker

or am i wrong about that too..

Xavier Hill
Xavier Hill

Install arch it will solve all your problems

Adam Rivera
Adam Rivera

lmao

Angel Gray
Angel Gray

Come to think about it now, I remember years ago reading about a project that was supposed to be even safer than Tor, but I haven't heard a word about it since, maybe 2012-13 or so?

I read that Hornet is supposed to be better than Tor ("supposed to be").
Then there's these. quora.com/Are-there-any-alternatives-to-Tor

But the one I read about years ago wasn't any of these, it was an attempt to basically make Tor obsolete in a way, but I guess Hornet seems to do just that.

zdnet.com/article/hornet-tor-alternative-for-high-speed-anonymous-browsing-revealed/

Owen Collins
Owen Collins

Maybe it was hornet...and maybe it wasn't 2012 or 13.. probably more like 2015.

Jeremiah Garcia
Jeremiah Garcia

Archive

archive.is/vLKOL
archive.is/NuZ0y

Benjamin Taylor
Benjamin Taylor

The problem isn't software, but cost and risk. Who pays for all the bandwidth? Who pays to host the servers? Who accepts the risk of owning an endpoint with massive throughput of CP and drug deals every day?

That answer seems to be the US Government.

Robert Adams
Robert Adams

If the network was well designed it wouldn't matter if the exit node was CIA (unless you were dumb enough to use plain text).
All that matters is that your traffic goes through at least a couple non compromised nodes.
Tor's default is 3 nodes including the Guard server and exit node (so really only one non CIA node if you're lucky).
You can increase this number, but guess what. THAT BY ITSELF DEANONYMIZES YOU! I'm not making that up! The number is sent in plaintext!

Jacob Green
Jacob Green

The idea of users donating bandwidth seems great, if they can fix it somehow. And just purge specific compromised exit nodes(?) I don't see a download for HORNET yet, 2016 posts suggest it's still being developed (then). I often wonder if somewhere on the darkweb, people are sharing better technology by now, or selling it.

I'm just interested in security, don't care what other people are using it for, ideally they wouldn't be using it to commit crimes, but let's face it, as long as criminals exist, crime will exist. Gotta be people out there coding stuff that rivals the best known online security though.

Recently I was really interested in what DietPi developed for the raspberry pi, an easy tor wifi hotspot, haven't been able to get it going beyond the raspi itself, no hotspot capability, even with an edimax attached or editing password configs, meh.

William Brown
William Brown

Go back to Reddit.

Gabriel Evans
Gabriel Evans

What's wrong, user? Didn't get enough sleep?