Congratulations. You are using Tor.
Rose | 14.11.2010 19:48 | Culture | Technology
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser, and is self-contained. The Tor IM Browser Bundle additionally allows instant messaging and chat over Tor.
It's mobile tor that can be carried anywhere and used on any computer, without leaving a trace on it...
http://www.torproject.org/projects/torbrowser.html.en
The Tor Browser Bundle lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser, and is self-contained. The Tor IM Browser Bundle additionally allows instant messaging and chat over Tor.
It's mobile tor that can be carried anywhere and used on any computer, without leaving a trace on it...
![](/img/extlink.gif)
Rose
Comments
Hide the following 10 comments
Nice idea but...
14.11.2010 21:56
Crazy Barry
better a slow browser than get arrested
14.11.2010 23:52
anon
security/
15.11.2010 07:56
i noticed when you logged on it went to fort meade, against my wish.
despite my warnings it was about 3weeks befor the new tor was introduced and the old one shut down.
the addy was tracked down to washington dc,despite trying to hide it in another country ,still the yanks are every where.
theres a much better system out there than tor.
despite what tor say this was the security services, ive nothing to hide ,have you?
artfulldodger
@artfulldodger
15.11.2010 09:08
If you read the article that you yourself posted, you'll see that the 'cracking of TOR' is really rather a minor affair. Hardly a reason to avoid it. Just remember - nothing you do online from an IP address that you pay for or have been recorded using is 100% safe to use in terms of privacy....but you can minimise the risks and TOR seems to be fairly easy to use and effective.
MrLazy
whatever/not arsed
15.11.2010 16:26
i can trully say ip was routed through nsa fortmeade via other countrys, of course tor are not going to admit to being so breached, nothing is possible on the web, we checked the ip address etc , not really arsed ,just pointing a FACT out, ive nothing to hide,
artfulldodger
research
15.11.2010 23:13
Krop
100% compromised
16.11.2010 20:16
It is just a network of 5 proxies, all proxies make a cache of their data flows and it totally ruins https encription. And who owns these proxies?
Also the exit IP numbers are all barred from posting on wikipedia.
see article in 1600 entited "Torminator"
also Tor button-
Roger
@Roger
16.11.2010 23:21
So, even if - and this is a big supposition - Tor is 100% compromised, the CIA and FBI and whoever else are going to keep this very secret. They'll save the information for big cases - - big-time child abusers and terrorists - not social activists. Otherwise the terrorists will come up with a much better response to the destuction of Tor, and the CIA and FBI will be years behind again.
Personally, I'd feel perfectly happy using Tor. I use a VPN instead though, and I do know that this isn't perfect. My aim isn't to have 100% security - that's impossible. But VPN or Tor or whatever else one wishes to use, it can all help. If you're really bothered, stop using the net altogether.
Krop
@Krop
18.11.2010 19:29
Where do you think Tor staff member Daniel "eisberg" got over a million docs to help start wikileaks?
"The torminator" also investigated the IP of the other proxies, including private sector NSA partners!
Roger
AppelBaum: How TOR Has Been Crippled Described
13.03.2011 16:47
Tor claims that their software protects users in two ways: i) Tor protects your communications from ``traffic analysis;'' and ii) Tor provides ``anonymity.'' Neither of these is true, but the latter is where the Iranian government chose to strike, and is the subject of this memo.
Tor uses a public key exchange protocol called Diffie-Hellman [1] to establish an initial encrypted connection between the user and an ``entry node.'' However, the parameters to this exchange -- which are sent unencrypted on the wire -- were chosen to be those defined as the ``Second Oakley Group'' (RFC 2409). No other web software uses these parameters. Thus, if traffic on the wire is observed to be communicating these parameters, it is almost certainly traffic generated by Tor. In other words, the use of these specific parameters is a unique signature which identifies Tor traffic from all other encrypted traffic. And this, in a nutshell, is how the Iranian government caused Tor usage in Iran to plummet from 10,000 users per day, to zero -- overnight. [2] Note that the Diffie-Hellman parameters in Tor were since updated to match those used by the most popular web server on the Internet (Apache), between versions 0.2.1.29 and 0.2.1.30 of the stable branch. [3]
What does this mean for Tor users in Iran? It means the Iranian government knows exactly who was using Tor in Iran -- and at exactly which times. The contents of the communications remain purportedly secure, but the fact that the communication took place is established, which in itself could be a death sentence in Iran. The Iranian government chose to use the information about Tor's traffic signature to block it -- a more patient government would have not have blocked Tor, but simply logged the identities and times of Tor users' access to the network.
A hacker employed by the Tor Project, ``phobos,'' has since admitted in no uncertain terms that this particular vulnerability in Tor has been known ``for years,'' but that a decision had been made that it would remain unpatched [4] -- until now. Now that the Iranian government had begun exploiting it publicly. It is interesting to note that the developer assigned to tune Tor's Diffie-Hellman parameters in order to un-block Tor in Iran is Jacob Appelbaum -- a hacker who recently garnered criticism for urging fellow hackers to insert ``bug-doors'' in their software. This logically leads to the question of whether this serious vulnerability was one such ``bug-door,'' patched only when another government begins exploiting it...
[1] <
[2] <
[3] <
[4] <
Roger