• Kromonos
    link
    fedilink
    162 years ago

    Why actually directly this aggressive tone in the title? It would have been enough to take the title of the post to start a respectable discussion instead of directly evoking such an emotionally charged discussion.
    It’s just a good thing I use Tor and not TOR.

    • @ZerushOP
      link
      -22 years ago

      Sorry when you think that the title is agressive, it’s not my proposit. Perhaps it was because of a kind of Freudian bug of mine, because it was often attacked in a very agressive way by users who claimed without real knowledge, that or the other is the only way to be safe on the network, once EVEN CITING A SOURCE ON FACEBOOK.

      Naturally Tor is a valid option, I simply say that it does not guarantee anything that is usually attributed to it for use on the open web, it is simply slower and less compatible than a normal browser with the respective protections maybe also a good VPN. Tor is what it is for and of course you can use a truck to go 2 km to the bakery, but it is certainly not the best way.

      • Kromonos
        link
        fedilink
        62 years ago

        A VPN is not the ultimate solution. The endpoint of a VPN can be infiltrated just like a middle relay of a Tor network. The same applies to logging. Everything has its purpose, and a VPN is not a solution for anonymity, because the connection can always be traced. A VPN is a solution when you need to get into a protected network. A Mech-VPN, such as Wireguard, has the best use case for connecting multiple servers to securely exchange data between them. And I2P and Tor are the best solutions for Anonymity.

        • @ZerushOP
          link
          12 years ago

          I know, but it’s also a valid methode. Also to use P2P with people you know is a good methode. But if you want or need to use the normal Internet, there are much harder to protect you from the worse. There are a lot of diferent systems used by the webpage to track and spy the user, you can test all of these in the page Browserleaks (The test with my browser and protections I use show a good protection, all values are wrong or no disponible, except that I use Spain as my language, because I don’t use a VPN in this test)

          You can protect you from the most of them, spoofing, blocing or giving it randomised fake values with some apps or extensions, with this you are reasonably protected for normal use against a malicious hacker who wants to access your PC, but if secret services or governments with or without a court order, want to spy on you, none of this helps you, nor VPN nor Tor

          Naturally you can’t do much about going for a server that was intercepted or contaminated. You can use a strong protection, like the CyDec platform, despite it isn’t OpenSource, it’s a enterprise system which works on browser and OS level, with which, if you want, you can apear in the web as someone who posted with an old Pentium and Windoows 95 with IE, from a island in the Pacific, but at the price that half of the webpage don’t work for you if you activate all the protection it has. It’s the strongest privacy tool i know. You can try a extensión from CyDec for free, but with reduced functions.

          The rest depends on yourself

  • @southerntofu
    link
    32 years ago

    The original post

    Well Tor has its limits but given the resourcefulness of this attacker, they’re probably someone who has/wants access to a lot of traffic even if it does not go through the tor network :)

    • @ZerushOP
      link
      -3
      edit-2
      2 years ago

      If you use TOR in the OpenWeb, go to browserleaks and you’ll see, that it isn’t more private as any othher privacy focused browser with some extensions, only slower. The only proposit of TOR is the capability to access the .onion, but even this don’t protect you, when you use TOR there without a VPN.

      • @southerntofu
        link
        22 years ago

        I don’t understand your point. TBB is specifically hardened against leaks (that’s why WebRTC is entirely disabled for example) and fingerprinting. What kind of leaks exactly are you suggesting?

        If you mean that using any random browser (eg. Chrome/Firefox) over Tor is insecure, we agree. That’s why we have Tor Browser in the first place, and that’s literally one of the first things taught in privacy workshops.

        • @ZerushOP
          link
          02 years ago

          Have you tested it in Browserleaks? There you will see, how private is the browser. Apart it don’t serve me if the browser blocks trackers and fingerprints, when the Browser itself do it, also Firefox, which send data to Alphabet.Inc, NEST and Google.