hojuruku

I did this myself today. distcc on my vps - compiled chromium - transferred 10 gig of lzo's .c and header files to my PC it sent back the c object files to the build host. Yay I had my own browser build with all the multimedia crap stripped out of chrome, no pepper flash etc.

Cooked my my own browser in gentoo - a source based linux distro most ppl who know their stuff have been using since 2003. For those who can't DIY (it's not that hard) there is another way torproject.org - browser bundle.

I mean who would want a virtualbox image of a web browser - especially something that one person cooked up. If you want a secure browser use the tor browser bundle - it's got more peer review - use it without tor with I2P instead i you want just change the networking settings (SOCKS proxy port) for more speed - as it's been tweaked to disable all the stuff that modern web browsers have to rape you online.. Let's see websockets for video conferencing NAT detection - report you real IP address back to the webserver to, flash etc. Using lynx or some ancient web browser would be better than using any modern browser with an anonimizer service.

Using anything else like what you suggested isn't a wise move.

hojuruku

https://johnsunol.blogspot.com/2017/04/catherine-judith-burn-head-of-anti.html Look I don't run a tor Exit node but if you want a safe first hop by someone who has their WHOLE FUCKEN FAMILY UNDER ATTACK BY GAY PEDOPHILES WORKING WITH NSW GLLO SPECIAL GAY POLICE (-> these scum http://facebook.com/policeglbti) ) then use LukesArmyDotCom tor node. I'm doing their new website shortly - it's a Facebook group of 30k that exposes the government stealing kids and giving them to pedophiles in Australia. They even have gay only adoption agencies getting 20 million a year (fostercare.lwb.org.au). Alternatively find someone else with a tor node, or a VPN to bounce there. Tor is so friggen slow there is nothing lost by adding extra layers of security like your own friend's bridge node with pluggable encryption modules. I don't want to scrape your details, and I can't see shit of what anyone does because being a relay usually most of the traffic is between an entry and an exit node anyway especially for tor relays only running a few months.

Here's my TOR config in case you were interested - using exits in America might have to change for you, obviously you can see it's work in progress and you really need to RTFM. Remember more people are watching you if you use tor than if you don't. I think I2P is the way to go because of more traffic on their network due to everyone being a relay - and them all torrenting a flood of data. It's better by design than tor that half the exits don't even work because they are all too busy spying on you.

Uses hardware acceleration modules built into libcrypto

HardwareAccel 1

AccelName cryptodev

AccelName af_alg AvoidDiskWrites 1 ClientOnly 0 Sandbox 1 PIDFile /var/lib/tor/tor.pid Log notice stderr LogMessageDomains 1 SOCKSPort [::1]:9050 PreferSOCKSNoAuth PreferIPv6 PreferIPv6Automap IsolateClientAddr IsolateClientProtocol IsolateDestPort IsolateDestAddr SOCKSPort 127.0.0.1:9050 PreferSOCKSNoAuth PreferIPv6 PreferIPv6Automap SOCKSPort unix:/var/lib/tor/socks PreferSOCKSNoAuth PreferIPv6Automap WorldWritable

Default: Bind to localhost:9050 for local connections.

Allow DNS over socks

SafeSocks 0

WarnUnsafeSocks 1 #Obsoleted

TransProxyType TPROXY TransPort 127.0.0.1:9052 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr

TransPort [::1]:0952

ControlPort localhost:9051

ControlPort unix:/var/lib/tor/control GroupWritable RelaxDirModeCheck CookieAuthentication 0

HiddenServicePort 80 [::1]:80

PublishHidServDescriptors 0

HiddenServiceMaxStreams 10

HiddenServiceMaxStreamsCloseCircuit 1

DNSPort [::1]:9053 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr

DNSPort 127.0.0.1:9053 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr

AutomapHostsOnResolve 1 AutomapHostsSuffixes .exit, .onion

ClientDNSRejectInternalAddresses 1

ClientRejectInternalAddresses 1 DataDirectory /var/lib/tor/data DataDirectoryGroupReadable 1 ORPort [2a00:1838:35:26::8008]:9991 ORPort 94.242.59.34:9991 ClientUseIPv6 1 ClientUseIPv4 1 ClientPreferIPv6ORPort 1 ClientPreferIPv6DirPort 1 EnforceDistinctSubnets 1 UseEntryGuards 1

UseEntryGuardsAsDirGuards 1 Obsolete

FastFirstHopPK 0

AllowSingleHopCircuits 0 Obsolete

UseNTorHandshake 1

StrictNodes 0 FascistFirewall 0

Must be set to zero so we can provide hidden service to the aussies in hell

PathsNeededToBuildCircuits 0.95

ExcludeSingleHopRelays 0 Obsolete

ExcludeNodes Unnamed,default,{af},{dz},{ao},{am},{az},{bh},{by},{bj},{bn},{mm},{bf},{bi},{kh},{cm},{cf},{td},{cn},{co},{km},{cd},{ci},{cu},{dj},{eg},{gq},{er},{et},{ga},{gm},{ge},{gn},{hn},{hk},{in},{id},{ir},{iq},{jo},{kz},{kw},{kg},{la},{ly},{mo},{mg},{my},{mr},{yt},{mx},{md},{ma},{ng},{ne},{kp},{om},{pk},{ps},{qa},{ru},{rw},{sa},{sn},{sl},{sg},{so},{kr},{lk},{sd},{sz},{sy},{tw},{tj},{th},{tg},{tn},{tr},{tm},{ua},{ae},{uz},{ve},{vn},{ye},{zw},{gb},{ie},{je},{gg},{im},{ai},{bm},{aq},{io},{vg},{ky},{fk},{gi},{ms},{sh},{gs},{tc},{us},{mp},{pr},{vi},{as},{ht},{fm},{gu},{gl},{ca},{au},{cc},{nf},{nz},{tk},{ck},{nu},{cy},{al},{ar},{bt},{bo},{cg},{ec},{fj},{gt},{gw},{il},{ke},{lb},{ls},{lr},{mk},{mw},{mv},{np},{ni},{py},{sc},{ug},{zm},{??}

ExcludeNodes {vn}, {au}, {ca}, {gb}, {nz}, Unnamed, default, {??}

Exclude countries that might have blocks

ExcludeExitNodes {ag},{bb},{bz},{bw},{bg},{dm},{gh},{gd},{gy},{jm},{ki},{mu},{me},{na},{nr},{pg},{kn},{lc},{vc},{ws},{sb},{so},{sr},{tz},{to},{tt},{tv},{dk},{ie},{gb},{be},{it},{cn},{ir},{fi},{no},{ru}

ExcludeExitNodes {ag},{bb},{bz},{bw},{bg},{dm},{gh},{gd},{gy},{jm},{ki},{mu},{me},{na},{nr},{pg},{kn},{lc},{vc},{ws},{sb},{so},{sr},{tz},{to},{tt},{tv},{dk},{ie},{gb},{be},{it},{cn},{ir},{fi},{no},{ru} ExitNodes reactortornode,PhantomTrain4,PhantomTrain8,PhantomTrain7,PhantomTrain5,PhantomTrain6,Libero,noiseexit01d,ibibUNC0,noiseexit01a,noiseexit01c,xmission,xmission1,bohr,noiseexit01c,noiseexit01b,piecoopdotnet,proximus LongLivedPorts 21, 22, 80, 443, 706, 1863, 5050, 5190, 5222, 5223, 6523, 6667, 6697, 8080, 8300, 9001, 9030

Western FiveEyes ESCHELON Intelligence Block

NodeFamily {au}, {ca}, {gb}, {nz}, {us} NodeFamily {cn}

DirPort [2a00:1838:35:26::8008]:9998

Dirport 94.242.59.34:9998

Address tor.lukesarmy.com

OutboundBindAddress 94.242.59.34 OutBoundBindAddress [2a00:1838:35:26::8008]

OutboundBindAddressOR 94.242.58.117

OutboundBindAddressExit 94.242.58.117

Nickname LukesArmyDotCOM RelayBandwidthRate 800 KBytes RelayBandwidthBurst 1600 KBytes AccountingMax 2072 GB AccountingStart month 1 00:00 ContactInfo Use Our Web Form spam@lukesarmy.com

DirPortFrontPage /etc/tor/tor-relay-notice.html

DirPortFrontPage /var/www/localhost/htdocs/index.html ExitPolicyRejectPrivate 1 ExitPolicy accept *:53 # DNS ExitPolicy accept *:993 # IMAP over SSL - Internet Message Access Protocol over TLS/SSL (receive email only) ExitPolicy accept *:995 # POP3 over SSL - Post Office Protocol v3 (receive email only) ExitPolicy accept *:1194 # OpenVPN - Virtual Private Network ExitPolicy accept *:1755 # RTSP - Media Services (MMS, ms-streaming) ExitPolicy accept *:554 # RTSP - Real Time Streaming Protocol ExitPolicy accept *:1863 # MSNP - MS Notification Protocol, MS Messenger service / Instant Messaging clients ExitPolicy accept *:1723 # PPTP - Point-to-Point Tunneling Protocol ExitPolicy accept *:8082 # HTTPS Electrum Bitcoin port ExitPolicy accept *:50002 # Electrum Bitcoin SSL ExitPolicy accept *:8232-8233 # Zcash ExitPolicy accept *:8332-8333 # Bitcoin ExitPolicy reject : # no exits allowed

ExitPolicy reject6 :

ExitRelay 0 IPv6Exit 0

requires root to memlock

DisableAllSwap 1

DisableOOSCheck 1 SocksSocketsGroupWritable 1 BridgeRelay 0 NumCPUs 4 PublishServerDescriptor 1 ServerDNSAllowBrokenConfig 0 ServerDNSDetectHijacking 0 ServerDNSAllowNonRFC953Hostnames 0 ServerDNSRandomizeCase 0 GeoIPFile /etc/tor/geoip GeoIPv6File /etc/tor/geoip6 GeoIPExcludeUnknown 1 EntryStatistics 1 ConnDirectionStatistics 1 HiddenServiceStatistics 0 ExitPortStatistics 0 ExtraInfoStatistics 1 AuthorativeDirectory 0

V3AuthoritativeDirectory 0

HeartbeatPeriod 2 hours RefuseUnknownExits auto SigningKeyLifetime 30 days

hojuruku

the big ones are # comments. Obviously you can see tor is a bit of a pain in the arse to configure for IPV6 but if you really RTFM you can do it. My box relays at 1m to 1.6 meg a second i could give double that but I don't want to piss off the hosting provider. Create your own bridge node with your trusted friends only - then next hop of that your encrypted data to someone you trust, then choose a country or a list of exist nodes. CONTROLLED TOR IS MORE SECURE than letting it work it out for you. And yes I'm still improving security, I love the trolls trying to log into it. It gives me some good test data to train fail2ban and other anti-DDOS stuff.

blablah

The actuel best way to secure yourself is to buy a 2nd hand laptop, remove the harddisc. create a usb stick with tails on it and use some public wifi to access internet. ...but in my opinion u don't have to get paranoid. If you don't really investigate in real life u wont get in trouble. just reading here and posting some stuff u found isn't anything that should worry u. ...there are so many ppl out there that post about intel / conspiracy theories and most of them that don't really investigate deep are still free ;)

lurch91

You must be new here.

Because obviously underestimating the intellect of some of the users on here still fascinates me, and I've been here since the beginning.

This was a security/privacy tip , not a Michael Bazzell seminar. There are some people on here who are mind-blowing intelligent, but computers/security/privacy isn't their area of expertise, but like I mentioned, they like simple, easy tips they can follow to enhance these areas in their browsing.

blablah

it doesn't matter if you or me are new into PG or there since it started on 4chan. I'm not underestimating any intellect, how come? I appreciate your tip, I just added another way how to be really safe (so if someone has strong evidence or confidential data, he should better go the way I montioned to prevent getting hijacked). There are of course some ppl with a lot of different skills and i appreciate and welcome it. Tipp 2, maybe thats something beween mind and yours (so mid security): running a linux OS with firefox in a firejail sandbox. so firefox wont be able to communicate outside of the sandbox which can be very helpful to prevent unwanted access.