The Tor Illusion

Is this crap supposed to "protect your anonymity" ? The fact is, you can't use it almost anywhere. It's "attention required" after "attention required". Some websites don't even provide that, but inexplicably ban your IP. Most forums won't allow you to register. And even here, I can't post with Tor since the captcha just keeps appearing...

Is Tor an illusion?

Attached: rotten_onion.jpg (1396x1374, 303.26K)

Other urls found in this thread:

torproject.org/download/download-easy.html.en
onion.torproject.org/
expyuzz4wqqyqhjn.onion/download/download-easy.html.en
8ch.net
206.223.147.211
youtube.com/watch?v=Di7qAVidy1Y
0x0.st/s_4R.png
twitter.com/AnonBabble

Maybe you need to kill yourself

You are already dead inside.

It's simple, don't use cucked websites which block tor.

So which ones? Remember that your criteria disallows 8ch as well...

Use the Tor browser bundle:
torproject.org/download/download-easy.html.en

Find the onions
onion.torproject.org/
expyuzz4wqqyqhjn.onion/download/download-easy.html.en

Zig Forums doesn't block tor, retard, they even have a tor hidden service which you would know if you actually used tor to post in Zig Forums, just like you would also know that you are not asked for captcha if you use the hidden service.

...

...

Doesn't Zig Forums use Cloudflare, by any chance? Because if it does, your reply would make you look stupid.

I don't expect a 100% internet experience using tor, but it does allow me to get most of what I want without having my actions attached to a discernible identity.

I'm fairly sure this applies only to certain boards and it's entirely because of Child Porn spamming.

Did you try the Privacy Pass extension?

fucking glowniggers

Yeah but you can access it without cuckflare either through tor or with direct IP access. Here's a list of Zig Forums IP addresses which I've found so far. 8ch.net (206.223.147.211)8ch.net (206.223.147.214)8ch.net (206.223.147.215)8ch.net (206.223.147.217)8ch.net (206.223.147.218)8ch.net (206.223.147.221)8ch.net (206.223.147.222)8ch.net (206.223.147.228)

Fuck tor, use direct IP you stupid goyim. Or use my free VPN based in Israel, it's free!

Might as well blame Linux for NVIDIA drivers.

you can post links to files, so what

wow
hackerman.jpg

>206.223.147.211
hmm

Hmm I need to send SNI in order to get into the right service?
Can I do this without messing with /etc/hosts? In Firefox or something.

How many people connected to those IP's yet, Hackerman?

How does this stuff work? I've read about it but still don't get it. I mean, it would have to save some data on your machine to know that it's YOU that solved the challenge, and then it's not anonymous as it claims? Apparently there's some tough crypto behind it, but I still don't see how it bypasses the issue...

Wait, I kinda get it now. But still, it requires the "service" to enable it. And you still need to solve craptchas.

Maybe you just stop using Google, faggot.

use it where it works

>

You can use it almost everywhere that's worth accessing, normalfaggot.

Yeah yeah, TOR is the best thing regarding online privacy as on for now, cia niggers here will shill anyways.

Tor is for visiting onion sites. Aka cheese pizza.

VPN -> TOR -> VPN
I recommend this way.

everyone in this thread is pretty much retarded

You can upload files to imgur or catbox.moe via tor and link to that.

so enlighten us genius

dunno if true but it's fucking shady as fuck
Just use proxychain and use hide under 7 or more tunnels/proxies that shuffle every load

don't forget to also shuffle your dns too or have your very own dns.
use a vps to fetch all proxies using a script then send them to you encrypted so your ISP won't flag you suspicious.
as fallback, remember to have a few zombie computers. dumb winfag is your friend so use fully disclosed outdated exploits to install rat on as many outdated winfag systems as you can
maybe use anonymous burner SIM cards too and a modem whose IMEI can be altered or randomized. make sure that your modem connection is locked only to one cell tower so they won't magically locate you by calculating or triangulating RSSI from other frequency bands.
be careful of IMSI catchers but if you're using a burner SIM you're only problem would be the IMSI catcher party van passing by your area so be sure to live in a private residential area (maybe a private island if you have like 9000 bitcoins)

Man up and solve those captchas, fgt

Attached: dfsdfsdf.png (593x540, 306.14K)

Ever heard of "Cui Bono"?
Sure, Tor is more anonymous the more pedos use it yada yada but seriously, bandwith and computers and electricity costs.

Attached: b249b2acd1f3dc080adb0006c95b61e2d7930ea86d34caaadd69795f35465552.gif (1005x742, 2.42M)

has been avoidable for almost a year now. either use Tor Browser or set your user agent to
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
in firecuck and its forks you can set this with the general.useragent.override key in about:config

what kind of special nigger opinion is this? 99% of the point of tor is to access the clearweb

shut the fuck up. blocking tor is a special placebo that chanfags like to take. even reddit allows uploading videos over tor.

imgur has blocked tor since it started existing.

Obfuscated bridges
Proofs?
Traffic correlation was solved 4 years ago

I guess it wouldn't be hard for ISPs to scan obfuscated bridges? Dont know much on topic

Welp, seems like rumor I kept propagating, sorry bout that fam

Really? Just Jewgled it a bit and nothing comes up?

Works fine for me, most everywhere in fact. If some site doesn't let me in with Tor I just close the tab and go somewhere else.

Why do people fear the government on the internet more than corporate industry tracking them?

2015 happened. Now it's current year.

Central point of failure. The govenment gets data from all the main corporations (see PRISM) and it all goes in one spot. Anyone or any nation sponsored attacker that gets access to that data can steal identities en masse.
Also, any government can now perform a 99-100% efficient genocide with all that data (already been done in Africa). Just hope your country elect the right people for the next 50 years and don't get invaded!

Has anyone actually tried asking the site owners to unblock?

Assuming clearweb but otherwise sane Tor browser usage.
1) How effective if Tor anonymisation against a nation state for a non-targeted user? (eg. actually dindu nuffin, USA couldn't care less about activities)
2) How effective is Tor anonymisation against muh corporations? The browser forces a shared fingerprint, and it seems they are unlikely to be able to perform a timing attack, so it should be totally effective.

AFAIK effective against both.
t. Tor user for everything except sites that require real name

Everything is answered on the tor wiki.
Why do you even bother asking that then. I'll not do the job of a potential bot that could answer you in a nanosec.

"Officially" effective against both, but you don't know what they really have in store. I mean a few years ago the FBI apparently paid some university to deanonymize Tor.

Remember Heartbleed? That was used for I think two years before being revealed. I've become more suspicious lately since "they" seem to have accepted Tor pretty much. I bet they have something on it...

Why do you even bother typing this shit post? At least link to the answer, or fuck off.

The information you """""may not find easily""""":
the Tor project is actually nearly a 100% funded by the US government (and 80% of the programmer working on the project already work for the government at some point):
www .documentcloud. org/public/search/projectid:37206-The-Tor-Files-Transparency-for-the-Dark-Web
The Tor network never attempted to stop traffic analysis, and so attack made by government.
news. ycombinator. com/item?id=8608941

And please, stop with the "The government doesn't care about you and your information, because you're irrelevant to him".
That is the dumbest thing you could ever say. You're the absolute target of the mass surveillance system. You can now be very easely picked in the middle of the huge databases, thanks to Palantir.
You always were the center of effort. Not the terrorists. They already know who they are. And terrorism is actually the way to promote this monstruous surveillance system. So terrorism is very beneficient for the government. So much that you could question the true origin of terrorism itself. But let's take one step after another. You don't want to fall in the rabbit hole.

Attached: this-reality-have-crushed-my-dreams.jpg (1024x780, 89.99K)

Of course this is blocked on tor, haha.

M8 I've been trying to replicate the effects of the Tor browser with firefox forks for two years and none of them are able to not trigger cloudflare like the tor browser bundle.

Wait, you're right, I don't get these "attention required" messages when using the Tor browser. Why though? I mean if cloudflare considers tor traffic malicious, why give a pass to Tor browser? Something's fishy here.

I'm using Tor Browser Bundle and it works fine for me.

I've also noticed this and would like an explanation, what is going on exactly?

Government funding and contributors has been common knowledge since the very beginning of the project. Paul always posted using his navy.mil email address. Claiming it's hard to find this information only betrays your meme level understanding of Tor.
Agree with your second paragraph, however.

Why not just use I2P?

anyone watch this? youtube.com/watch?v=Di7qAVidy1Y - Dingledine giving talk about Tor Services at DefCon 25 last summer

I2P is a darknet. There are few (and at times, 0) "outproxies", which are I2P nodes configured to ferry traffic between I2P and the regular internet. They are slow and unreliable.

I actually get that "one more step" shit every time I follow an archive.XX link, despite not using Tor. So I basically don't bother with those archive shits anymore.
My browsers are Links and Lynx.

Then why not combine I2P, IPFS and IP-Wayback into one single package? That would make things more convenient

Corporatism means that government and corporations stand hand in hand with their evil plans of global control.

The difference being is that governments have monopoly of force.

Redefinition of the word, it was originally used by Mussolini and included unions as one of the pillars of society. Crony Capitalism would be more correct. Sage for off topic and pedantry.

I thought that Tor coming out of the US Navy is common knowledge? They basically invented it to spread freedom sow discord in China and other nations that police their internet.

The term "Crony capitalism" implies that Capitalism can exist in the wild chaotic world without monopoly of governments protection.

Every current country has monopolies in which corporations lobbied governments and politicians for.
Corporations don't want fair trading enemy with which they will fight over for market shares. They want monopolies.
Corporatism is correct term.

sage

Can anyone answer this? Because it is suspicious as fuck. For so long Cloudflare did everything possible to make life harder for Tor users, and now poof! And it's gone.

Login to ShitHub through Tor and...

Attached: shithub.png (922x65, 8.18K)

Works for me. I can even post images: 0x0.st/s_4R.png

But I rarely do.

That's why I putted mutiple quotes, was an attempt to be ironic, because the guy was asking for shit question findable on the tor wiki.

That happened to me once, but then I wrote a filthy language complaint about it and they un-flagged me.

I could understand them locking it for security reasons, but flagging it? What are they doing? Just another reason never to use github again.

There needs to be a movement towards Freenet.

sage and ignore

I think cloudflare is not scared of human Tor users, but automatic bots, those usually execute only basic http functions and have a "lulsorandum" user agent, which also proves why all textbrowser larpers in this thread get btfo'd by cloudflare, they simply appear to be bots and stick like a sore thumb in swarm of regular tor browsers.

It would be hard for ISP to scan the bridges, and a bit easier for government-backed entity since bridges are given up from Tor project's website after entering captcha or sending email, that's a lot of pajeet-hors to bruteforce. Private obfuscated bridges are not listed elsewhere and are virtually impossible to find unless a DPI is trained to find them, and those usually become known to wide public pretty soon. If you run a bridge with different algorithm like shadowsocks, govpn, stunnel instead of default Tor obfuscators, it'd be even harder to discern what traffic you're sending over the network.

You realize the solution to all of that is just kill all unauthorized protocols. Things like HTTP(s) and email will be about it.

All you have to do is make the headers look like Tor Browser. I captured this from Tor Browser:GET / HTTP/1.1Host: 192.168.2.2:1234User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-aliveUpgrade-Insecure-Requests: 1
Some Cuckflare sites still wont let you on (because "high security" mode or some bullshit), but I'm pretty sure like 99.999% will let you pass once you look like Tor Browser. Also Links bypasses Cuckflare too last time I checked.


Cuckflare is a WAF. Do you guys still not know what a WAF is 20 years after the year 2000 when they were popular? A Web Application Firewall is a piece of shit that sits around going through each request and deciding whether to approve them. This placebo technology is supposed to provide some form of "security" to site admins who are to retarded and lazy to figure out how the word "security" even pertains to the internet. Like all WAFs, it will block whatever the fuck their retarded end up blocking. This is typically all of Tor, all VPNs, most open proxies, some public places such as schools and cafes, etc. The way your IP even gets into the blocklist in the first place is either by manually adding ranges (such as Tor), or by you sending some traffic that looks like hax (such as having a quote in the URL). Even if you aren't trying to hack the page, you will inevitably trigger the WAF at some point, resulting in a single block, temporary ban, or permanent ban. It's also of course possible that Cuckflare is blocking Tor deliberately, but it doesn't really matter. At the end of the day they should be ousted as retards for selling and spreading this garbage technology all over the web.

You couldn't be more wrong. As I said, Links bypasses Cuckflare. Tor Browser was blocked from Cuckflare for its entire existence up to a year ago (that's at least 5 years). Also refer to my previous paragraph.
Also refer to the rest of this thread. For example uses Links without Tor and was blocked from archive.is.

No, that solves nothing. It's not possible to determine whether encrypted traffic is flowing over a pipe, even if the data is "plain text" (for example only alphanumeric characters or words of the dictionary). Of course some government niggers would love to implement such a retarded non solution as long as they are paid in votes.

Everything is possible, but it's a never ending arms race between DPI methods and obfuscation methods.
You can tunnel all your shit through legit-looking https with third-party CA and a legit looking website as a face for your tunnel server.

Keep giving them ideas so they can create the most greatest walled garden Internet possible. No one is going to mess with that crap. The best hope is some kind of packet radio, but even that would fall under some kind of surveillance and punishment quickly.

Maybe I wanted a discussion from multiple viewpoints and not just a press release from a government employee who has a vested interest in promoting their own software.

You can't send encrypted messages though.

Manually put wired networks and a tight-knit grassroots community of fellow hackers.
It's not like they care about you personally, they ban obvious normalfag-accessible services like messaging apps, websites, proxies, popular vpns, in name of fighting terrorism and poor children, then they stumble at true anonymous networks and start pretending they don't care while having a status quo on honeypotting drug-dealing retards. Or as I think so. It's a sad thing, people don't understand that having freedom to use communication technology in an age said technology equals to having your natural freedom to speak.

...

Illegal in almost every planetary sector, with some exceptions for low power non-derectional wi-fi.

pretty sure that low frequency in the tens of kilohertz range is unregulated in most jurisdictions, but it requires high power to transmit well due to antenna inefficiency, and it's also low bandwidth

Man, we would be lucky to get dialup speeds on that. At the most it would be about 5 kilobits.

How do you tell encrypted messages from unencrypted?
You can use strong encryption over alphabet of cleartext pieces of junk information, like words "hello", "goatse", etc.

For some kinds of information flows it's not too bad.
Sure streaming video in real time would not be possible.

I can imagine messages with high entropy and unknown compression algorithm may be considered encrypted because it's not possible to tell the difference. You can always lower your message's entropy, but that makes your communication channel less useful.

good enough for textboards, good enough for me

"encrypted" == anything (((they))) don't understand

I am wondering how two concurrent transmissions to one receiver would work.

could be still useful, if it's not too slow and secure

>anything (((they))) don't understand
oven gas evaluation taffymaker uncrystallized laterality detacher berigora …
it's plain text, isn't it? there's nothing to decrypt, capiche?

Probably no one's going to give a fuck if you send messages encoded in your kid meme language. The whole point of the encryption ban is to prevent anyone from secretly using ham radio frequencies for commercial purposes.

there's nothing preventing use of this shit for commercial purposes.

except frequency constipation

What's the point, why not simply use Tor Browser?

It's a poorly configured Firefox