IntelligentObserver

Dont have to be agressive.. check article and even link to test methodology: https://chloe.re/2015/06/20/a-month-with-badonions/

Article: http://www.scmagazineuk.com/tor-network-exit-nodes-found-to-be-sniffing-passing-traffic/article/423818/

I asked the question because i want to secure my computer but lots of disinformation, compromised telecommunication and servers makes me unsure on which direction to go. Any advice?? Curious to hear ur opinion

SoSickInside

I keep hearing about the Tails operating system as well. It's promoted on Wikileaks page, I think or Tor page. Not sure where I saw it.

Any thoughts?

psmith85

I'd be wary of both Tor and Tails as potential honeypots.

PizzaThrowaway123

So why has it been used by whistleblowers, pedos, drug dealers and the likes for the past decade or so? I forget who said it, but they said that if your "secure" network is not being used by these types of groups of people, then it is most definitely not secure.

You are doing what is called "concern trolling".

psmith85

It's not trolling. I'm saying that low-tech methods that do not rely on technology 99.99% of us cannot understand or properly and independently vet may be preferable to them.

PizzaThrowaway123

It is better than using nothing, but people have been exposed in the past by not having proper TOR habits and OPSEC in general.

13asteroids

I have a question. Is it possible for someone to be spying on my activity as I type depending on the browser I'm using? (I'm using Mozilla). But if I were to use Tor, I wouldn't be able to be spied on? I'm not sure how much or what kind of information the spys would be able to have of my activity. I'm new to this kinda stuff so I'm sorry if these are dumb questions.

PizzaThrowaway123

I am not up to date with how well popular browsers are sandboxing stuff for protection, but if your PC is compromised then it doesnt matter what browser you use. I experimented with the open-source PUPY remote access trojan (RAT) last year - https://github.com/n1nj4sec/pupy And I realized how powerful in-memory execution really is because at the time no antivirus could detect it, I had to use Volatility and do memory analysis to see that I had been infected.

Any RAT will allow live keylogging,screenshots,etc.

Dataanti

he is not wrong, its rule 41 being passed by the DOJ, anyone using tor or a VPN is automatically put on a watch list sort of thing and they can have their devices confiscated from them without warning, and its a global thing, meaning its not limited to united states.

i will say, researching this stuff doesnt really matter, its posting things that you would have to worry about. if you where to post something use tails on a public wifi, if you are just reading and researching, dont worry about it.

PizzaThrowaway123

What about when you are researching and stumble upon something serious?

In any case, if what you say is true then that has solved the mystery of why these folks are using their codes and franchises out in the open. Using business fronts and code words/images is more safe than using TOR?

Dataanti

well for a long time ive heard tore exit nodes where compromised, for years i have heard this but it was hit an miss if your packets where able to be re assembled by the authorities simply due to how packets would travel from node to node, not all of them would use an exit node that was controlled by authorities. this is one of the reason why I2P was created.

https://www.eff.org/deeplinks/2016/04/rule-41-little-known-committee-proposes-grant-new-hacking-powers-government

PizzaThrowaway123

Anyone can set up a TOR Exit node and monitor traffic. I set one up to see how easy it is. Bad exit nodes are reported all the time. There is a lot more required to be able to compromise your real IP.

If you can find me a case where a TOR browser user was compromised by the TOR network, (ie NOT A CASE OF USER ERROR), I will be impressed.

Dataanti

this may be so however your ISP can still tell if you are using tor or a VPN, if american authorities request it via rule 41, than they find you anyways, so it wouldnt be the tor network compromising you. i suggest going with a decent 3rd party ISP if you can, thats what i did, my ISP has a history of protecting user data and raising money to go to court to do it so if you have an ISP that is willing to do that for you and the rest of its customers, i would switch to that.

PizzaThrowaway123

I am not sure if you are a troll or not yet because you claim to work for military doing some type of IT but you seem to keep making excuses why to not try and protect yourself that don't really make much sense.

Who cares if the ISP knows you are using VPN or TOR? It is the encrypted content of the traffic I care about not being exposed.

For VPN, use a VPN provider that has been proven to not retain any logs.

https://news.slashdot.org/story/16/03/12/2043254/vpn-providers-no-logging-claims-tested-in-fbi-case

IntelligentObserver

So they cant read the content of traffic history but can geographically locate u?

CuriousGeorge16

I have been reading the investigations and sharing on Gab, but not posting any new info. My phone, which is 99% of my onine usage, would not accept a charge and died - had to take it to a technician to fix. I was using a Nook in the meantime & it locked up. I am not trying to "protect" myself" and crazy things are happending to my quipment too.

Dataanti

this is tough, im a technician for the military so i want to say its either coincidence (cause black magic smoke inst behaving properly) or user error :P

but than again i dont want to sound like a shill

i have been posting on here an contributing a little bit of info on here so far and nothing has happened to my stuff.

CuriousGeorge16

I am no technician and not taking precautions with my connections. It could be coincedence. Twitter would also lock up when I would post the #PizzaGate hashtag or share a #PizzaGate hashtag tweet. It would lock up for a few minutes. It ONLY happened in those incidents. I figured it was a "time-out". LOL. Stopped sharing/tweeting #PizzaGate on Twitter & moved my #PizzaGate sharing to Gab. Haven't had any more problems with Twitter. It too can be a coincidence... but lots of weird stuff going on.

El_Snapster

I just went to sign up for tweeter and it deleted all my log in info and passwords and it drained and shut off my phone within seconds of accepting their terms of conditions. I made a post about it earlier today.

IntelligentObserver

With Intelligence powers expanding Dec 1, and supposedly tor and vpn server exit nodes compromised (article i read forgot where) does a vpn really make a difference???