I can tell /g/ really hates Tor. I've been using it forever to access e.g. TPB and other stuff my faggotty ISP and country laws block access to. I've got just the proxy running as a service and use connection settings to manually tell Firefox to use it instead of the system default connection. Works like a charm and is nicely minimalistic and down to business.
Since you all hate Tor so much, what do you suggest I use instead? I absolutely hate bloat like overlay UIs (hotspot shield browser plugin) and other shite I don't need, I'd like it to basically be the equivalent of running a background service that offers a connection interface.
>Tor isn't just tor browser bundle
I almost literally said that... I just have tor.exe running as a background service all the time and my programs can connect to it via a port. The browser bundle is shite IMHO.
My point is, since you all hate Tor and believe Tor is compromised, what do you suggest I use instead? I'm looking at i2p and freegate atm, but I see no reason to trust them anymore than Tor. Anyone can claim to have setup an anon network and to not be logging stuff etc.
>believe Tor is compromised
This isn't just some tinfoil bullshit. Around half of the exit nodes were recently zero day'd
Private mode, lots of blocking stuff to kep cookies and whatnot out, etc. I'm not an expert but I'm not a total fool either. Sheesh. I'm not giving you every last detail of my setup either.
I mainly don't use it because I use Firefox with a bunch of technical add-ons for my poweruse, I CBA to use the tor browser (=vanilla firefox mostly) or wait a minute for it to start up and connect every time I want to use it.
There's so much wrong with your statement it hurts.
First off, no exit nodes were hacked with any sort of zero day exploit. In fact none of the exit nodes were hacked period. What this skid group is trying to do is attempt a Sybil Attack, which is an attack that has a single malicious body having control over almost all of the nodes on the Tor network, making it possible to track connections and deanonymize people.
Fortunately Tor already has mechanisms built in to block nodes which are flagged as malicious and the design of the network makes it hard to tell which hop in the chain of nodes you are, with the exception of being an exit node of course.
tl;dr Tor is still not broken.
Besides, it's not like anybody's hunting for me. Even without extras, as long as Firefox sends all its packets through the Tor proxy and I only connect to sites with SSL, my ISP can't tell shit and the nodes can't tell shit either.
Firefox has an option "remote DNS" even with a SOCKS proxy. I believe that forces DNS requests to go through the proxy, dunno for sure. It's not like I'm being hunted, I just want my ISP to get off my back.
>Besides, it's not like anybody's hunting for me.
>as long as Firefox sends all its packets through the Tor proxy and I only connect to sites with SSL, my ISP can't tell shit and the nodes can't tell shit either.
It's not that simple. Browser bundle isn't just Firefox with some extensions, it's patched and modified to leak as much information about the user as possible.
As one other anon said, Firefox leaks DNS requests when using a SOCKS proxy, which is what you'd probably be using if you're connecting your web browser to your tor service, among tons of other things like your system clock being out of sync by milliseconds, the size of your browser window, the fonts you have installed, etc.
I'd seen it before but didn't really care much about it. I always kind of felt that the reason data like your screen size and browser plugins is sent (to allow speshul sites to work properly) trumps some loss of privacy on the occasion that someone gives a fuck about me downloading 10 year old porn torrents. On the other hand, having dealt with websites more closely lately, if a site actually needs that sort of info, it's a piece of shit site in the first place. I kinda doubt blocking out all that info is really gonna cause any problems. I'll have a look at it, thanks anon.
Yeah, but it also takes forever between starting it and using it, and I CBA to constantly clone my addons setup from ff to tor to actually be able to browse properly (adblocking, domain blocking, video sniffing, bookmarks, browsing history, extra UI stuff, etc.
Ghostery maybe, though I wouldn't use any addon, because the more you customize your browser, the easier is to track it, if you use tor vidalia out of the box, your browser identity is the same as many other tor users, this makes tracking harder, I delete and reinstall the tor folder every time I need to use it.
The way you wrote that implies the mere presence of addons is detectable. As an add-on dev, I have a hard time believing that. I think you mean add-ons that modify the sent data in a fixed pattern, which makes that pattern itself identifiable.
I have a browser that is unique according to the EFF, but it won't accept anything that can be tracked, except cookies.
Use TOR? Don't accept JS or Flash, dummy.
I got a question about Tor.
Say I live in a government that has shitty laws preventing people to post anything they deem offensive which is usually crass criticism of their leaders. I want to make some parody
accounts of these leaders on Twitter / FB but I am not sure if I can get tracked if I use TOR. My question is if I create the accounts using TOR and post from it using TOR is there anyway I can be tracked? Will Disconnect add - on further help