Is TOR Still Anonymous? and How Were People Caught Using TOR?

Ғылым және технология

PIA Internet Access Affiliates Link
www.privateinternetaccess.com...
Parrot Security Linux Anon Surf Mode Using TOR
• Parrot Security Linux ...
The Tor Project
www.torproject.org/
Darknet Diaries Operation Bayonet
darknetdiaries.com/episode/24/
DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught
• DEF CON 22 - Adrian Cr...
www.defcon.org/images/defcon-...
Adrian Crenshaws Site
www.irongeek.com/
Connecting With Us
---------------------------------------------------
+ Hire Us For A Project: lawrencesystems.com/hire-us/
+ Tom Twitter 🐦 / tomlawrencetech
+ Our Web Site www.lawrencesystems.com/
+ Our Forums forums.lawrencesystems.com/
+ Instagram / lawrencesystems
+ Facebook / lawrencesystems
+ GitHub github.com/lawrencesystems/
+ Discord / discord
Lawrence Systems Shirts and Swag
---------------------------------------------------
►👕 lawrence.video/swag
AFFILIATES & REFERRAL LINKS
---------------------------------------------------
Amazon Affiliate Store
🛒 www.amazon.com/shop/lawrences...
UniFi Affiliate Link
🛒 store.ui.com?a_aid=LTS
All Of Our Affiliates that help us out and can get you discounts!
🛒 lawrencesystems.com/partners-...
Gear we use on Kit
🛒 kit.co/lawrencesystems
Use OfferCode LTSERVICES to get 5% off your order at
🛒 lawrence.video/techsupplydirect
Digital Ocean Offer Code
🛒 m.do.co/c/85de8d181725
HostiFi UniFi Cloud Hosting Service
🛒 hostifi.net/?via=lawrencesystems
Protect you privacy with a VPN from Private Internet Access
🛒 www.privateinternetaccess.com...
Patreon
💰 / lawrencesystems

Пікірлер: 836

  • @TILR
    @TILR4 жыл бұрын

    You can have as many locks on your front doors as you want, but the moment you forget to lock them is the moment someone can take advantage of.

  • @TILR

    @TILR

    3 жыл бұрын

    @Ni ck also very true

  • @zeorjvistr6245

    @zeorjvistr6245

    3 жыл бұрын

    @Ni ck I don't even have ventilation now just with an oxygen pump

  • @jeannieh3661

    @jeannieh3661

    3 жыл бұрын

    I dont have windows or doors I live in a cave within a cave with a single 6mile long LAN line coming in.

  • @blair5475

    @blair5475

    3 жыл бұрын

    @@jeannieh3661 The FBI just need only to follow your LAN line to get to you.

  • @TILR

    @TILR

    2 жыл бұрын

    @Jon Doe but they said they had a REALLY COOL lookin' wooden horse to give me

  • @Ejohns1004
    @Ejohns10044 жыл бұрын

    So basically, you're only as secure as your patience allows you to be.

  • @AleksandarGrozdanoski

    @AleksandarGrozdanoski

    4 жыл бұрын

    Always

  • @chriscontact5857

    @chriscontact5857

    4 жыл бұрын

    @@alaskansummertime you know that mega data center the government built that turned out to be the tip of the iceberg with a few more sprinkled here and there? They have video of you buying all that burner shit at Walmart. Pay a prostitute to get it for you if you want it from walmart.

  • @-----REDACTED-----

    @-----REDACTED-----

    4 жыл бұрын

    Well, security and comfort of use usually are opposed to each other, so in general you are correct.

  • @alaskansummertime

    @alaskansummertime

    4 жыл бұрын

    @@chriscontact5857 Way ahead of you my man. Don't forget to wear a hat in case they pull sat footage.

  • @alaskansummertime

    @alaskansummertime

    4 жыл бұрын

    @@chriscontact5857 That I believe is how they caught a guy years ago using pre paid phone cards to call people on pay phones and harass them at McDonalds.

  • @holyravioli5795
    @holyravioli57954 жыл бұрын

    So in short, TOR is plenty secure as long as your not stupid.

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    4 жыл бұрын

    Yup!

  • @holyravioli5795

    @holyravioli5795

    4 жыл бұрын

    @xOr Excessive question marks is excessive. Also vpn is secure sometimes depending on how lenient your vpn provider is regarding logs. Alot of the big vpn names like NORDvpn will happily give your logs to any federal agency with a warrant.

  • @lauralil6886

    @lauralil6886

    4 жыл бұрын

    @PricklyTrees do you need a hug?

  • @isaackarjala7916

    @isaackarjala7916

    4 жыл бұрын

    @xOr i2p and Tor are both low latency encrypted mixnets.... But Tor is intended as an out-proxy, with in-proxying (hidden servers, .onion) being more or less an afterthought, while i2p is meant to be an in-proxy with little support for out-proxying.

  • @shockbladezed2352

    @shockbladezed2352

    4 жыл бұрын

    You're*

  • @Yoshi4d
    @Yoshi4d4 жыл бұрын

    this video is in everyone's watch history so you're already compromised

  • @andrescabrera6097

    @andrescabrera6097

    3 жыл бұрын

    Lol

  • @woodenhoe

    @woodenhoe

    3 жыл бұрын

    incognito mode:

  • @micsss_

    @micsss_

    3 жыл бұрын

    actually use of tor is legal and so is surfing the dark web unless ur doing some shady shit

  • @lamka6978

    @lamka6978

    3 жыл бұрын

    Yosua Mokalu no VPN

  • @ooSHINIES

    @ooSHINIES

    3 жыл бұрын

    @@woodenhoe incognito only doesnt show your history to you specifically. Feds can still see it

  • @liondovegm
    @liondovegm3 жыл бұрын

    "I cite my sources." Subbed. Too few people do.

  • @ThouguohT
    @ThouguohT4 жыл бұрын

    Moral of the story: use Tor, don’t do illlegal shit on Tor

  • @parkv4861

    @parkv4861

    4 жыл бұрын

    A' Le that’s the only way to use tor effectively lmao

  • @shreyash366

    @shreyash366

    3 жыл бұрын

    @@nofood1 exactly the place is messed up bro

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @Amazigh AFRICA Either it will load the content or won't. I doubt anything happens to you personally unless you uniquely identified yourself but I doubt it

  • @evanrichley7506

    @evanrichley7506

    3 жыл бұрын

    So i can watch shit on pornhub?

  • @sleepisirrelevant1067

    @sleepisirrelevant1067

    3 жыл бұрын

    But shit like downloading books and music is illegal?

  • @-----REDACTED-----
    @-----REDACTED-----4 жыл бұрын

    The downfall usually comes as soon as one cuts corners on OPSEC...and thus it is as with most vulnerabilities in cyber security: the user is likely the weakest link, not the system.

  • @livebythews

    @livebythews

    4 жыл бұрын

    The 8th layer of the OSI model 😏🤣🤣

  • @chriscontact5857

    @chriscontact5857

    4 жыл бұрын

    I was at a computer show in the nineties talking to a guy about the next Intel chip coming out. I said I was hopeful they would finally use all the extra features built into the chip with them getting so fast. I said I was tired of paying the high prices for chips and them not being leveraged. The guy took me aside and said those features are there for the government to hack you. It was kinda like how the Chinese were putting a rice size chip in boards coming to the US. In this case the insecurity was built into the processor, bus and architecture in general. All this and we were paying absurd prices for processor chips. We pay high prices for the government to have access to any intellectual property or advanced knowledge of our business deals. We actually pay the government to hack us.

  • @-----REDACTED-----

    @-----REDACTED-----

    4 жыл бұрын

    Brendon Patrick that would be the extended OSI model... 😂

  • @chriscontact5857

    @chriscontact5857

    4 жыл бұрын

    @N e g r i t o [tenfold] thank you for noticing. I put what i believe to be the same comment under the general comments to the video. The Lawrence Sys account replied saying none of it was true. I responded with the following: @Lawrence Systems / PC Pickup really? www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Classy response BTW. What about the German hacker groups back in the nineties that cracked Nice Try and exposed the unknown keys for windows nt. The two keys started with the letters NSA and MS. Microsoft egnowledged the MS key, but they wouldn't even respond about the NSA key. Those German hacker groups have now been outlawed and over the years multiples of their members have been maliciously prosacuted, silenced, killed, and disappeared. It was nice when they were being prosecuted, for crimes they committed before the laws were on the books. Your really going to tell me the computer companies use all the features they build into their processors? In the nineties they were using less then 10% in some cases. What did you think when it came out, with pictures, that Cisco routers were being sent to an NSA facility and had their own chips added? Then China outlawed cisco and ibm from much of their infrastructure. We have tried to remove china from much of or infrastructor. After that came out cisco tried for a while to unload Linksys. What are you a government paid counter intelligence officer? If not get your head out of your...

  • @chriscontact5857

    @chriscontact5857

    4 жыл бұрын

    @Pxsseiidon your screwed. The tech companies are part of the military industrial complex. If you dont like that term just say the tech companies are in bed with the government. The government can get your information whenever they want. As an extra bonus your system will never be truly secure or stable. I got really paranoid a few years back when Intel announced they were adding special features into the processor and chipset/buses that would give them wifi capacity. Never noticed my wifi improving. I did notice fifteen or so years ago where some devices seemed to connect to the internet through secure wifi and get some rudimentary information exchange as long as you didn't try to open a browser or something.

  • @adrianzolla9737
    @adrianzolla97374 жыл бұрын

    I stopped watching to eat chilli and you randomly said my first name at 2:52 and I got paranoid

  • @eirinsynnvefrydenborg5909

    @eirinsynnvefrydenborg5909

    4 жыл бұрын

    Adrian Zolla Hahah the way he says it makes it more hilarious “Uhhhh... Adrian?”

  • @adrianzolla9737

    @adrianzolla9737

    4 жыл бұрын

    @@eirinsynnvefrydenborg5909 it tripped me tf out, I'm watching a video about TOR and then my screen is talking to me

  • @krinka1458

    @krinka1458

    4 жыл бұрын

    i just ate chilli too. coincidence? i think not!

  • @theflowerhead

    @theflowerhead

    4 жыл бұрын

    What timing. 😅

  • @ithaca2076

    @ithaca2076

    3 жыл бұрын

    @@adrianzolla9737 😂😂

  • @uiopuiop3472
    @uiopuiop34722 жыл бұрын

    I wish IT companies were this cool and knowledgeable in my country, these videos are on a different level education-wise

  • @erinmayo5170
    @erinmayo51704 жыл бұрын

    I have tape over my phone camera rn

  • @josephsmith6777

    @josephsmith6777

    4 жыл бұрын

    I use cheap cellphones and throw away laptops

  • @datitsdapussy4283

    @datitsdapussy4283

    4 жыл бұрын

    @@josephsmith6777 😂😂😂😂😂 what are you even doing ??????????ß

  • @philipmoore449

    @philipmoore449

    4 жыл бұрын

    carson mayo yeah I put one over my laptop camera. #nofacenocase

  • @RichardsWorld

    @RichardsWorld

    4 жыл бұрын

    We don''t want to see you in your underwear.

  • @princess200783

    @princess200783

    4 жыл бұрын

    @@datitsdapussy4283 "Datits Dapussy" O_O

  • @boro057
    @boro0574 жыл бұрын

    +1 for Darknet Diaries, great podcast. Casefile ep 76 also did an incredible breakdown of Silk Road which heavily ties into tor.

  • @sethwilliamson
    @sethwilliamson4 жыл бұрын

    TOR is one of those things that I enthusiastically cheer for, yet will not use personally. Why? Well, I approach it using torrent etiquette. I only feel right using it if I'm providing as much or more bandwidth to other users as I'm consuming. That means running a TOR node. Knowing the kinds of traffic some users turn to TOR to hide, I don't need that coming back to my IP. Sure, plausible deniability, but I'll leave it to others to be the brave social justice warriors and present that case in court. I don't need that in my life. Again, I wholeheartedly endorse the project, their pursuit of privacy, and the people that provide the nodes.

  • @jimbobbrowning35

    @jimbobbrowning35

    4 жыл бұрын

    as long as you're not running an exit node you won't have the problem. Run an onion router.

  • @sethwilliamson

    @sethwilliamson

    4 жыл бұрын

    @@jimbobbrowning35 -- Naw. Not good enough for me. I'm still taking pennies from the penny tray (using exit node bandwidth) and if everyone did that and only provided onion routers, the system collapses. I'm specifically talking about providing as much or more exit node bandwidth as I consume. I'd consider your suggestion if I was only using TOR to connect to TOR sites. In that case, it'd be a great suggestion. However, much of TOR usage serves as a sort of mesh VPN, used merely to connect to sites on the Internet through a privacy layer. That's about all I'd use it for as well, hence my personal compulsion to provide that same exit node bandwidth to others and not be a leech.

  • @darkhunter3232

    @darkhunter3232

    4 жыл бұрын

    @@sethwilliamson wait what? you torrent over tor? or did i misunderstand something?

  • @sethwilliamson

    @sethwilliamson

    4 жыл бұрын

    ​@@darkhunter3232 No, no no. :) That was an analogy. The same etiquette applies to me since what both share in common the penny jar kind of thing. If everyone leeches and nobody seeds torrents, torrenting just doesn't work. You have to have at least as much seeding as leeching. That leads to etiquette like minimum 1:1 seeding ratios. As in, if you download a torrent, seed it to the next people at least 1:1. Pretty widely accepted etiquette to keep it alive and healthy. I look at using TOR exit nodes like seeding/leeching. If all you had was a bunch of users wanting to traverse the TOR network and out exit nodes, but none of them were providing exit nodes, that doesn't work. The network is only healthy as long as there is as much or more exit-node bandwidth available as there is demand for it. Thus, I don't feel right using exit-node bandwidth unless I'm providing as much or more in return. I get that this seems bizarre to people, especially in consideration of the public entities out there providing big exit nodes. I guess that's analogous to some universities or other agencies seeding your favorite Linux distro's torrent. Regardless, I'll still seed that Linux distro ISO a minimum 1:1 or I feel like a leech, and I'll still feel the same compulsion to provide the TOR exit node 1:1 as well, which I am not comfortable doing for the reasons stated in my OP. Hope that clears it up. :) Oh, BTW. I'm not preaching or trying to push my view of it on others. No judgment at all on how others approach it. Just explaining my personal hangups here.

  • @darkhunter3232

    @darkhunter3232

    4 жыл бұрын

    ​@@sethwilliamson Okay, now I got it. You could run a middle relay, because they never get abuse reports and running some relay (even if it isn't an exit relay) still helps the network.

  • @youssefwolfx
    @youssefwolfx8 ай бұрын

    WOW you did deep research and your information is solid keep the hard work 🔥

  • @franciscruz1309
    @franciscruz13094 жыл бұрын

    i personally drive 20 miles to an open wifi set up an aws instance running kali linux than i spin up a 2 vms through that instance whonix gateway and whonix workstation and after all that i brows cute cat videos.

  • @theillegalseagull6838

    @theillegalseagull6838

    2 жыл бұрын

    Please tell me this is a joke lol

  • @lp812leo

    @lp812leo

    2 жыл бұрын

    Nice

  • @salmandekkari5523

    @salmandekkari5523

    2 жыл бұрын

    you mean silly cute cat videos that are probably illegal 🤔🤔

  • @sharedknowledge6640
    @sharedknowledge66404 жыл бұрын

    Another great video. I’m a long time fan of TOR and the more credible privacy oriented VPNs. And you’re absolutely correct the devil is in the details. Those who 100% follow best practices are likely to remain anonymous while those who are lazy and take a 95% anonymity is good enough approach probably shouldn’t even bother as they’re likely leaving an obvious trail nearly anyone could follow despite their half assed effort at privacy. Just like it takes just one unwanted pic on social media to ruin a politicians life it also takes just one lapse in anonymity to undo years of trying to be anonymous.

  • @theflowerhead
    @theflowerhead4 жыл бұрын

    Thank you, I'm pretty new to this.

  • @nathanjones704
    @nathanjones704 Жыл бұрын

    Informative no waffle and very funny dude you insight and research is appreciated 🥰

  • @AwesomeNickGaming
    @AwesomeNickGaming4 жыл бұрын

    Donating directly to the tor project is great and all but if you really want to help the Tor network, the best way is to run a Relay/Bridge/Exit Node to add more servers to the Tor network, I've been running an exit node for a few months or so

  • @ergpopler413

    @ergpopler413

    4 жыл бұрын

    Don't be tracking!

  • @sealifett8395

    @sealifett8395

    4 жыл бұрын

    Can you do that from a home connection?What are the requirements?

  • @AwesomeNickGaming

    @AwesomeNickGaming

    4 жыл бұрын

    @@sealifett8395 you can do it from a home connection but it's not recommended, I'd recommend to use a VPS or other server, the only requirements are being able to open a port and have Tor installed

  • @gigi8584

    @gigi8584

    2 жыл бұрын

    What is a bridge

  • @AwesomeNickGaming

    @AwesomeNickGaming

    2 жыл бұрын

    @@gigi8584 A bridge is pretty much a Tor relay which is not part of the Tor directory, and it is meant to be used by people in countries such as China where the government censors Tor. The idea is that since bridges are not published with the list of public Tor relays, governments can not block them by IP address. Many bridges also use pluggable transport like obfs4 in order to obfuscate the traffic so that the Great Firewall does not detect it as Tor traffic and block it

  • @NinoM4sterChannel
    @NinoM4sterChannel4 жыл бұрын

    Computerphile also made awesome videos explaining Tor hidden services and how Onion Routing works. really worth watching!

  • @Reth_Hard

    @Reth_Hard

    4 жыл бұрын

    If you are using Tor, always make sure javascript is not disabled, that's very important... :D

  • @johnnyaingel5753

    @johnnyaingel5753

    4 жыл бұрын

    @@Reth_Hard thank you for sharing

  • @Reth_Hard

    @Reth_Hard

    4 жыл бұрын

    @@johnnyaingel5753 No problem, hehehe >:D

  • @whenshtf4155

    @whenshtf4155

    3 жыл бұрын

    ​@@Reth_Hard Yeah very important, to keep JavaScript enabled, you will lose so many wonderful features of a website if you disable JS. lmao

  • @DrAdityaReddy

    @DrAdityaReddy

    3 жыл бұрын

    @@Reth_Hard are you joking or are you serious? JavaScript should be disabled

  • @strange6973
    @strange69734 жыл бұрын

    Thanks, this is a great talk! Some nice links and readings!

  • @godhateseveryonewhodoesntr5977
    @godhateseveryonewhodoesntr59773 жыл бұрын

    I just installed it. I use it to exceed my free download limit and converting limits of ebooks. I hope the government doesn't find me, lol.

  • @justinconnor3721

    @justinconnor3721

    3 жыл бұрын

    Audible free trial?

  • @thepardigon178

    @thepardigon178

    3 жыл бұрын

    the government doesn't care about that lol

  • @godhateseveryonewhodoesntr5977

    @godhateseveryonewhodoesntr5977

    3 жыл бұрын

    @@thepardigon178 Haha, I know. I was just joking 😅

  • @craig-ilesbagels2950

    @craig-ilesbagels2950

    3 жыл бұрын

    i use it for watching youtube videos my goverment has blocked instead of paying for a vpn

  • @floydloonie4880

    @floydloonie4880

    3 жыл бұрын

    Good luck hiding from God dude! You better stay in school and learn to read... The end clock is running down.

  • @Palaciosyt
    @Palaciosyt4 жыл бұрын

    Great explanation, thank you!

  • @NumbaOneBuddhaSmoka
    @NumbaOneBuddhaSmoka4 жыл бұрын

    Great Video, most informative I've found on this thanks!

  • @thenew77
    @thenew774 жыл бұрын

    One key point with Tor that I didn't hear in this video is the fact that whoever controls the exit node(3rd hop,this is where your encrypted traffic hits the internet) is the one in control. Whoever has control over an exit node can abuse this to monitor traffic, among other things, just be careful, TOR is great, but its not 100% secure if you don't know what you're doing.

  • @ronnyondasticks9379

    @ronnyondasticks9379

    2 жыл бұрын

    What would you use instead

  • @xCwieCHRISx

    @xCwieCHRISx

    9 ай бұрын

    yes TOR-Exit-Nodes are perfect to perform Man-in-the-middle-attacks. But if you use a good up to date encryption protocol to communicate with the server like TLS1.3 or TLS1.2 with secure cypher suites. Everything should fine.

  • @davinalex
    @davinalex4 жыл бұрын

    great job on tor guide/info

  • @radicaledwards3449
    @radicaledwards34494 жыл бұрын

    but how do the nodes know if they never knode the other nodes?

  • @acidbath3226

    @acidbath3226

    3 жыл бұрын

    trust me, you'd node.

  • @egg3288

    @egg3288

    3 жыл бұрын

    @@acidbath3226 please stop

  • @anteconfig5391
    @anteconfig53914 жыл бұрын

    Sorry, my tin foil hat is practically welded on.

  • @Mheprai

    @Mheprai

    4 жыл бұрын

    Yeah, that little jab at the end threw a wrench in the spokes.

  • @zaktripper4908

    @zaktripper4908

    3 жыл бұрын

    Would that allow 5-G bandwidth to toast your noodle quicker, or spare your noodle from a 5-G toasting?

  • @crappyaccount

    @crappyaccount

    3 жыл бұрын

    😂😂

  • @robertthompson5568
    @robertthompson55683 жыл бұрын

    I had heard about the use of Tor to...procure, so I just Googled "what is Tor" and since I don't speak Computer Guru.....I'm actually more confused...lol! 😆

  • @a.j.5108
    @a.j.51084 жыл бұрын

    That video you referenced is 5 years old. It's theoretically possible to deanon tor by controlling the majority of the exit nodes with a bot net. It would need to be a targeted attack opposed to mass surveillance, but it could happen by a nation state.

  • @a.j.5108

    @a.j.5108

    4 жыл бұрын

    I think its being done right now. I think the gov't is parallel constructing other evidence.

  • @Replicant2600
    @Replicant26003 жыл бұрын

    It’s hard to anonymize behavior. You almost need another application with an entropy source that takes you input and randomizes your behavior, securely, on the other side :).

  • @AB-ot3bm

    @AB-ot3bm

    2 жыл бұрын

    If you’re paying for your own ISP or cell phone and they ask for ID/Name/Address, you’re basically trackable - it’s just how many phone calls the authorities feel like making to track you down.

  • @MoraKingdom

    @MoraKingdom

    2 жыл бұрын

    @@AB-ot3bm If you wan't to have a secure phone, you have to open it ur self, remove GPS tracking thing, disable microphone and use a case that covers the camera, so you can use it, but people can't see shit if its hacked. And you need headphones plugged in to talk. You shouldn't have a Sim card or have an illegal one and take it out after use. Use Graphene OS, use public Wi-Fi. Put your phone in a Metal Box before entering home. Let a friend buy the phone and report it to the police for stolen. That should be pretty safe :)

  • @xero8865

    @xero8865

    2 жыл бұрын

    @@MoraKingdom You seem experienced😂

  • @ckilr01
    @ckilr014 жыл бұрын

    You run TOR on a computer. If the IP can be compromised they can poke in through ports. one way is by getting movies to send out the IP address, or by using social information. I was reaearching how the US Government was busting TOR's used by criminals.

  • @MrNaporowski
    @MrNaporowski3 жыл бұрын

    My problem with Tor is that it doesn't seem to do much fingerprint spoofing, other than resolution... so, when you log in to the same website, your fingerprint will be pretty much the same, even though you changed your identity. Now, if the website is not very popular, they might easily figure out that it's the same person that has all those accounts...

  • @prsence5921

    @prsence5921

    2 жыл бұрын

    Just use virtual machine for resolution

  • @ennuiiunne5319

    @ennuiiunne5319

    Жыл бұрын

    I know right? And popular sites will just block all of tor in contrast ergo it's useless.

  • @rootcanal7188

    @rootcanal7188

    7 ай бұрын

    Doesn't WHONIX claim to be better with fingerprinting than TAILS? There is a detailed discussion of that on the Whonix site.

  • @sebastiantello6966
    @sebastiantello69664 жыл бұрын

    So, as i understod from this video, tor is still secure? During the last months I worked in this new informatic congress in my law school, and i learn how much information we give to Google and other companies. If you need to compare between tor and Mozila for private web browsing (like searching for PDFs, news, social networks), which one would be better?

  • @DA-jh9sr

    @DA-jh9sr

    4 жыл бұрын

    can you please elaborate on the information we give to google and other companies? I really want to know what type of information they get about me.

  • @blair5475

    @blair5475

    4 жыл бұрын

    D A They get everything.

  • @koilen
    @koilen3 жыл бұрын

    So, is it Good or is it Bad? I cant seem to get a clear response to that- what are some things i should avoid doing?

  • @mfour

    @mfour

    3 жыл бұрын

    avoid doing: illegal things plain and simple

  • @EnergyWRLD

    @EnergyWRLD

    2 жыл бұрын

    @@mfour Except guns and the 2A is gonna help you out.

  • @wompastompa3692
    @wompastompa36923 жыл бұрын

    "Correlation attacks are a bitch." -Adrian Crenshaw. He's how I got introduced to all of this.

  • @INFERNO-bt1hz
    @INFERNO-bt1hz2 жыл бұрын

    I'm just still confused ..how do I simply make my device n network private?

  • @ssgpro1686
    @ssgpro16864 жыл бұрын

    moi il me mes se message ? """ Tor Browser is already running, but is not responding. The old Tor Browser process must be closed to open a new window. """" ?? pourquoi

  • @SlingbladeJim
    @SlingbladeJim3 жыл бұрын

    Thank you sir.

  • @chrisatx6303
    @chrisatx63032 жыл бұрын

    I started an ecomm service and need a website for customers to place orders and for payment. I need this website to be untraceable for tax purposes. Will this tor work for what I’m trying to do.

  • @longnamedude3947
    @longnamedude39474 жыл бұрын

    Can you install Anon Surf on other distros? Also, TOR, like any other security method, is only as good as the weakest link, and like you say, often that weakest link is the person operating the device rather than the device itself, not always true, but it applies to most situations.

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    4 жыл бұрын

    It's all open source so with the right amount of coding I am sure it could work with other distros.

  • @longnamedude3947

    @longnamedude3947

    4 жыл бұрын

    @@LAWRENCESYSTEMS I assume you could just build it from source for another distribution? Or is it more tightly inter-connected with the distribution than that?

  • @pwn3d_d1rt

    @pwn3d_d1rt

    4 жыл бұрын

    There are several ports of anonsurf and some similar and IMO better scripts a Google search will return lots of results mostly from GitHub

  • @longnamedude3947

    @longnamedude3947

    4 жыл бұрын

    @@pwn3d_d1rt Any, 'Key Words' that may help narrow down my search area? I use multiple search engines so I have no doubt I'll find alternatives, I'm really after something that works with Arch and/or Arch based Distros

  • @pwn3d_d1rt

    @pwn3d_d1rt

    4 жыл бұрын

    @@longnamedude3947 yeah "anonsurf Kali" Will give some results, I use anonym8 but it's old and needs to be tweeked to get it to work properly now but it's the best if you're comfortable with that

  • @Theferg1
    @Theferg13 жыл бұрын

    Thank you for the information and your time and resources definitely do appreciate that I’m just now learning and going down the Rabbit hole I would like to ask everyone a question I have been trying to find information on how to learn about PGP and how to get it all set up? Is there anyone out there that can possibly help me and point me in the right direction? Thanks!!💯👍

  • @shaneintegra
    @shaneintegra4 жыл бұрын

    You should talk about Tails

  • @trikkerman1
    @trikkerman12 жыл бұрын

    I need help. I'm having trouble logging in using Tor. I put the info in but it just keeps saying, log in. Does anyone know how to fix that? Does anyone know if there is another browser out there like Tor?

  • @darkhunter3232
    @darkhunter32324 жыл бұрын

    Great Video! :D

  • @cansadrigamerd9584
    @cansadrigamerd95844 жыл бұрын

    I really wonder what was that email blackmail on the google bar ??

  • @freedomisdead9638
    @freedomisdead96382 жыл бұрын

    Long story short, you are anonymous and safe from casual attackers but not against government Hackers! 😆

  • @spacetimejourney3471
    @spacetimejourney34713 жыл бұрын

    There are multiple vectors of attack to de-anonymize someone. Using tor is pointless if your pc is not secure.

  • @MoraKingdom

    @MoraKingdom

    2 жыл бұрын

    nah just use empty pc with. tails

  • @2Sor2Fig
    @2Sor2Fig Жыл бұрын

    Glad to know all this, finally downloaded it today (as an atheist living in a christian household, I'm tired of the subtle hints that my browsing history isn't appreciated).

  • @billsmith9249
    @billsmith92494 жыл бұрын

    what about using TOR while on a paid VPN too? I don't do anything bad but sometimes I just dont want to be tracked. I NEVER use login accounts and only use TOR. I have read some articles that say that you should not use TOR in full screen mode but no one has told me why. :/

  • @billsmith9249

    @billsmith9249

    4 жыл бұрын

    @Red Rain i'll look that reddit up, and thanks for the call on the resizing.

  • @waterspray5743

    @waterspray5743

    Жыл бұрын

    By going full screen, you are basically telling the server your monitor resolution. They can puzzle out your identity by comparing data between clearnet and deepnet.

  • @everblu
    @everblu4 жыл бұрын

    Awesome video👍🏼

  • @AleksandarGrozdanoski
    @AleksandarGrozdanoski4 жыл бұрын

    Hmm, perhaps the ideal solution is to subscribe to two different VPN's and use Tor in the middle 😄

  • @adrianzolla9737

    @adrianzolla9737

    4 жыл бұрын

    That's what I do, I couldn't trust just one

  • @AleksandarGrozdanoski

    @AleksandarGrozdanoski

    4 жыл бұрын

    @@adrianzolla9737 😂😂😂😂😂

  • @mr.rockout7959

    @mr.rockout7959

    4 жыл бұрын

    Which one are those vpns I don’t know any good ones ?

  • @RIPOBJ

    @RIPOBJ

    4 жыл бұрын

    @@adrianzolla9737 someone's doing illegal shit 😂😂

  • @ergpopler413

    @ergpopler413

    4 жыл бұрын

    That's less secure then just TOR LMAO

  • @Avalanche2
    @Avalanche24 жыл бұрын

    The large Tor exit nodes are mostly government owned, I thought people knew that.

  • @lechsiz1642

    @lechsiz1642

    4 жыл бұрын

    I think the fact that Tails forces users to first go to their website is a security risk (putting a target on one's own back). I am way wrong?

  • @adamspeek476
    @adamspeek4764 жыл бұрын

    hey...Why the new tor browser use duck duck go search engine to enter tor....is the tor browser's serches are monitored by duck duck go?????..... i think may be it is possible....please answer this question

  • @amoghnayak7867
    @amoghnayak78672 жыл бұрын

    when this video started playing due to autoplay and i first heard your voice, i thought that you were jack rhysider for a moment

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    2 жыл бұрын

    As Jack said at the end of E90: " Even though in the future everyone will have fifteen minutes of privacy" this is NOT Darknet Diaries but I do love that podcast.

  • @simonmartinez4433
    @simonmartinez44334 жыл бұрын

    Hi Tom, I was trying Tor Browser last day. Since I was testing a geolocation feature that blocks ip's in selected countries on my office firewall. It was able to determinate my location, it blocks me but how could it be that the firewall could find out my location. Not that I´m not happy that the geolocation features works but it makes me doubt about anonymity using Tor.

  • @eldrago19

    @eldrago19

    2 жыл бұрын

    Either it just blocks all Tor connections or your Tor entry node was in a banned country.

  • @karlklaus3177
    @karlklaus31774 жыл бұрын

    How about supposedly most nodes, specially exit notes are run by government agencies etc? Wouldn’t this be a problem if most of the nodes are compromised?

  • @ruthlessbanditz2961

    @ruthlessbanditz2961

    4 жыл бұрын

    @NubsWithGuns So in theory, the only benefit of using a VPN then Tor, is the small chance all of the nodes are compromised?

  • @ruthlessbanditz2961

    @ruthlessbanditz2961

    4 жыл бұрын

    @NubsWithGuns I have read it, but i think they're wrong, VPN is your last line off defense, and if they really don't keep logs and they're outside the Five eyes country's, you should be good even if you connect to all 3 of their nodes.

  • @Plastik13
    @Plastik13 Жыл бұрын

    Nothing better than the old good methods : trade goods with your personal friends at your home, goods given hand to hand (nothing digital, nothing electronic).

  • @pkkigathi
    @pkkigathi3 жыл бұрын

    Just don't slip up. Be consistent when using tor

  • @williammelvin6371
    @williammelvin63714 жыл бұрын

    I seriously doubt TOR is anonymous. Once the General Public catches on, the powers that be ruin it anyway they can.

  • @TheBoostedDoge

    @TheBoostedDoge

    4 жыл бұрын

    Still better than VPNs fucking honeypots

  • @darkridr25

    @darkridr25

    4 жыл бұрын

    @@TheBoostedDoge Personally I consider both TOR and VPNs to be honeypots....

  • @lething1237

    @lething1237

    4 жыл бұрын

    @@darkridr25 Why do you think Tor is a honeypot lmfao

  • @darkridr25

    @darkridr25

    4 жыл бұрын

    @@lething1237 Why do you think VPNs are honeypots? Whatever answer you give applies to TOR as well.

  • @lething1237

    @lething1237

    4 жыл бұрын

    @@darkridr25 No It doesn't, because VPN's are centralized, while Tor is decentralized. By the way, It's Tor & Not TOR.

  • @TheRandomTecLad
    @TheRandomTecLad4 жыл бұрын

    Just subed

  • @Witcherworks
    @Witcherworks4 жыл бұрын

    What is your opinion on signal?

  • @notreallyme425

    @notreallyme425

    4 жыл бұрын

    It’s good, except you have to register your real cell phone #.

  • @jacobmatt3532
    @jacobmatt35323 жыл бұрын

    So..dont get lazy. Be careful and keep yourself safe

  • @LeonSteelpaw
    @LeonSteelpaw4 жыл бұрын

    Interesting, but does it like DSL?

  • @Rama_Guru
    @Rama_Guru4 жыл бұрын

    what do you think about a very good VPN that routs to TOR or to 2 servers that are owned by the VPN in two different countries?

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    Tor and a VPN do nothing for your overall security in fact it draws more attention to yourself to third parties.

  • @Rama_Guru

    @Rama_Guru

    4 жыл бұрын

    @@Scorges1 the VPN keeps my ISP from selling my data and gets me content I would not see otherwise, I not much on TOR because its so slow.

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    @@Rama_Guru While that may be true don't use a VPN on Tor not really needed personally. Might be better to consider a bridge. Shitty your ISP sells your data. Are you in the US?

  • @Rama_Guru

    @Rama_Guru

    4 жыл бұрын

    @@Scorges1 the land of trump the corporat king, thats why a VPN

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    @@Rama_Guru Haha that sucks. Hell change your DNS settings to openDNS or cloudflare heard they don't keep your queries for more than 24 hours and won't sell your information or give it out unless law enforcement requests it

  • @iliaschannel3646
    @iliaschannel36463 жыл бұрын

    hello , wich is the best for full anonymity ,anonsurf , nipe or whonix ? or another tool that you know

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    Whonix. But due note no one is fully anonymous you can still be tracked but the chance of it happening is low unless you did something that uniquely identified yourself

  • @iliaschannel3646

    @iliaschannel3646

    3 жыл бұрын

    @@Scorges1 thanks bro for your answer

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @@iliaschannel3646 No problem

  • @snekjuce

    @snekjuce

    3 жыл бұрын

    lmao full anonymity? are you stupid? or you joking? there is no such fucking thing. Unless...... but that's beyond 99.99999999% of computer users. fuck it. And seriously how silly is your question? "which third party software OWNED by a COMPANY/GROUP of INDIVIDUALS should I TRUST?" is what is really being asked....At the end of the day any service you go with, you are going with their service. ie on their servers n shite most likely. Obviously each has their own security measures taken from A-Z (at least supposedly)....but those are just SECURITY MEASURES....nothing is set in stone. Putting a lock on a door or 20 locks, does not mean that one cannot still get into that door. I mean no disrespect btw....enjoy and stay hydrated.

  • @satvindersihra9038
    @satvindersihra90382 жыл бұрын

    @lawrence Systems Hi how do we cloak our entry and exit nodes?

  • @Scorges1

    @Scorges1

    2 жыл бұрын

    Click the onion when you connect to a website

  • @you_just
    @you_just2 жыл бұрын

    "how were people caught using tor?" opsec; it's always opsec

  • @jnorfleet3292
    @jnorfleet32924 жыл бұрын

    Run a sniffer and pay attention to the packet data in tor. Easier to just hack Grandma Mildred's Wi-Fi down the street 😂

  • @lightalt5872
    @lightalt58722 жыл бұрын

    I thought he was going to say "so I donated to the tor project, and all I got was this lousy t-shirt"

  • @brian2590
    @brian25904 жыл бұрын

    Security has and always will be about the onion layers and even when those layers are tight one could still be swiss cheese and not even know it. It's a dynamic sort of thing that can change in a week a few days or even an hour. To think a single app can take care of all of this for you is kind of naive. An app wont fix your operating system, sloppy or lazy browsing habits or unpatched weakness in hardware no one will know about until 6 months from now. sure allot this stuff looks good on paper and works in some cases. I always cringe when people talk about the protocols behind secure messaging apps they have installed on cheap crap android phones where even the on screen keyboard could be compromised. protocols wont help you when the clear text you input is keylogged. There are probably hardware and software configurations where one can have some short term confidence but one app for all to have equal security is just a pipe dream. sure we can develop on our own clean systems what would work in theory but in the wild it's still just good on paper. If we all witnessed the horrors that went into device manufacturing and software development for devices meant for consumers to consume more shit we would throw it all out and not use it ever again. /end of drunken rant :D

  • @tasnubatahsin4504
    @tasnubatahsin4504 Жыл бұрын

    I have a question. Will it be dangerous if I accidentally use it without security VPN? And what will happen if I search a website in it and give my Email address?

  • @TasmanianTigerGrrr

    @TasmanianTigerGrrr

    5 ай бұрын

    I dont think you need a VPN for tor only for security

  • @topdog5252
    @topdog52522 жыл бұрын

    Great video for a noob like me learning about Tor

  • @yourlogicalnightmare1014

    @yourlogicalnightmare1014

    2 жыл бұрын

    It's a heavenly place for criminals and pedos to do business

  • @sultanel-kalil7072

    @sultanel-kalil7072

    2 жыл бұрын

    @@yourlogicalnightmare1014 sucks that no matter how many sites get taken down, many more get developed

  • @ancapftw9113
    @ancapftw91134 жыл бұрын

    Don't be the same person on the deepnet and the clearnet. Have a persona or character that you play when using TOR to do anything illegal or shady. If someone asks your name, location, etc., only the character's info is a valid answer. If you have to get things deaddrops could work, the UPS store. Yes, they might know who "ancapftw" is. But he isn't on TOR.

  • @maskedredstonerproz

    @maskedredstonerproz

    3 жыл бұрын

    Like my MaskedRedstonerProZ persona ?? it's got nothing to do with who I really am , aka my real name , although I should probably use a different persona if I do anything shady , which I probably won't

  • @jeffdaughertysdad6585

    @jeffdaughertysdad6585

    2 жыл бұрын

    Do you know what PGP encryption is? lol I can tell you have no idea what your talking about😂

  • @ancapftw9113

    @ancapftw9113

    2 жыл бұрын

    @@jeffdaughertysdad6585 do you not realize that all the encryption in the world can't do jack shit about fingerprinting and you telling people your real ID? Tell me, do you get confused about how Lex Luthor can still know Superman's real identity when he has the glasses on?

  • @jeffdaughertysdad6585

    @jeffdaughertysdad6585

    2 жыл бұрын

    @@ancapftw9113 when you buy something off the dark web. You use PGP encryption. The only 2 people that can read the messages are you and the vendor. The only way for the police to find you is if they got your laptop or the vendors laptop. Again I can tell you’ve never done this so go educate yourself

  • @ancapftw9113

    @ancapftw9113

    2 жыл бұрын

    @@jeffdaughertysdad6585 and you trust everyone you talk to and buy things from? No chance they are part of a sting? That they will get caught? That they will turn over their records or get hacked or have their records stolen? The whole point of the blockchain used in crypto is that you don't have to trust people. But sure, you should tell the person at the other end exactly who you are when you buy illegal stuff. Have fun in prison.

  • @tomatopuree2193
    @tomatopuree21933 жыл бұрын

    So how can you make sure a link is not illegal or made to track you down?

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    You honestly can't. If you do view something that is illegal, I doubt anything happens to you personally because the feds go after people who knowingly produce and distribute illegal material such as child exploitation material.

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @De Te Hardly. They do arrest people for watching it, but it's rare and usually based off a tip in those cases. However they usually go after people who produce the material and distribute the material. Usually when they go after people who know the content is considered illegal and produce it and distribute it around the web.

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @De Te Yes cause it happens quite a bit. Pornhub is an example they allowed teens but the depiction of the material they looked of age but they actually weren't. It's hard to track watching it. Easier to go after people who produce/distribute it cause sites will report the material and help FBI other law enforcement officials out by giving them IP of the user

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    So if you accidentally stumbled upon and watched ti don't lose sleep over it. Cause feds got bigger fish to fry and go after those who knowingly produce and distribute the material.

  • @uppermostking02
    @uppermostking024 жыл бұрын

    How to be smart 101 obvious for anyone don't use your home internet connection for legal activity. Use a brand new computer that has never been given any of your personal data. This would be referred to as a burner computer. If the computer is penetrated with malicious malware what have you nothing on that brand new computer can lead back to you. you can just throw it away

  • @SyncroScales
    @SyncroScales2 жыл бұрын

    Good video.

  • @BreadMan434
    @BreadMan4343 жыл бұрын

    Let me get on this non-incriminating network and do some incriminating digital activity. Because I'm smart like that...*sniff*

  • @olivergoodston2997
    @olivergoodston29972 жыл бұрын

    Basically it is developed by us military which means if it's out its old news with known vulnerabilities and it may give you some degree of privacy provided you are not actual target of some Intel agency with sufficient resources. Conceptually the internet is not privacy oriented therefore you can never really escape from that.

  • @granautismo786
    @granautismo7864 жыл бұрын

    Isn't Tor funded by the NSA? Is a bug rumor going around...

  • @andreibanu5927
    @andreibanu5927 Жыл бұрын

    Can someone explain me what means to connect tor with home ip? I mean isnt that obvious? I should hack my neighbour wifi to use tor for annonimity or what?

  • @titustide
    @titustide4 жыл бұрын

    omg he said opsec lmao, I never thought I would hear that phrase ever again

  • @haveaniceday7950

    @haveaniceday7950

    4 жыл бұрын

    Why?

  • @titustide

    @titustide

    4 жыл бұрын

    @@haveaniceday7950 it stands for operation security, the military uses it a lot and I just got out of the navy

  • @haveaniceday7950

    @haveaniceday7950

    4 жыл бұрын

    Titus Tide I see. I know what it means, I thought you were implying that there wasn't such a thing.😉

  • @Vamavid
    @Vamavid4 жыл бұрын

    Parallel construction

  • @stephenalexander7076
    @stephenalexander70764 жыл бұрын

    So can I copy my bookmark from my safari to Tor browser and use Tor instead of Safari ?

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    Personally I wouldn't import bookmarks. You can whatever you feel like

  • @obitorasu1760

    @obitorasu1760

    3 жыл бұрын

    Dont that ties back to you being you

  • @snekjuce

    @snekjuce

    3 жыл бұрын

    you can do whatever the FUCK you wanna do steven alexander...dude thats not how you spell my name.

  • @jbwrist
    @jbwrist4 жыл бұрын

    Human error accounts for 90% of breaches.

  • @ssm840
    @ssm8402 жыл бұрын

    why would someone be caught for connecting to IRC?

  • @crazysquirrel9425
    @crazysquirrel94254 жыл бұрын

    If you use Windows or Mac, not even TOR is sufficient protection. TOR now uses centralized exit nodes that you can no longer change. It is a very WEAK point in the system. The dangerous portion is the exit node. Once it hits there it is in the clearnet.

  • @crazysquirrel9425

    @crazysquirrel9425

    4 жыл бұрын

    @Salvador Luna Linux, BeOS. The term 'windows computers' is a bit of a misnomer. It refers to the operating system and not the hardware.

  • @crazysquirrel9425

    @crazysquirrel9425

    4 жыл бұрын

    @Red Rain Exit nodes are FIXED now so that you can not change them. You can only change the route TO the exit node. Once it reaches the exit node and is sent out onto the clearnet, that portion is vulnerable just as if you went directly somewhere. TOR is best to hide your location, not so much the content. I use TOR daily.

  • @A.C.71
    @A.C.714 жыл бұрын

    What I found is Tor is secure, but you cant use it on any website you normally would frequent I.e yahoo, youtube etc. every time I try to go to popular websites I would normally visit it gives me some error similar to this "Our systems have detected unusual traffic from your computer network. Please try your request again later. Why did this happen?"

  • @Redstoneprojrjr

    @Redstoneprojrjr

    2 жыл бұрын

    Do the captcha .

  • @derjagerhalt3281
    @derjagerhalt32814 жыл бұрын

    but does it work in China?

  • @tubbalcain

    @tubbalcain

    3 жыл бұрын

    @NightsEdge 0.1 never use a VPN, while connecting to TOR. Al that does, is putting in a really vulnerable entry- and exit point to your connection. The VPN server can be a honeypot or have been seased. And it makes data correlation also so much easier.

  • @RinksRides
    @RinksRides4 жыл бұрын

    Use linux Tails and TOR inside? AT THE PUBIC LIBRARY? (yes that was intentional misspell)

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    @BEN 1891 Arrested for what using Tor? All Tor users have the same fingerprint and it's hard enough tracking people down on there. Yes you can prevent it from happening as long as you don't enter unique identifying information and take the right protections while browsing to websites.

  • @beyondspace4088

    @beyondspace4088

    2 жыл бұрын

    @@Scorges1 is there risk in downloading using tor? On phone, specifically.

  • @Scorges1

    @Scorges1

    2 жыл бұрын

    @@beyondspace4088 Not quite. It might take longer to download awhile using Tor

  • @beyondspace4088

    @beyondspace4088

    2 жыл бұрын

    @@Scorges1 thx

  • @Scorges1

    @Scorges1

    2 жыл бұрын

    @@beyondspace4088 You're welcome at most anyone will know someone used Tor to download a file.

  • @therealb888
    @therealb8883 жыл бұрын

    i2p>tor Change my mind!

  • @makatron
    @makatron3 жыл бұрын

    TOR cannot prevent errors in layer 8

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    3 жыл бұрын

    nope, it can not

  • @mronion597
    @mronion5974 жыл бұрын

    Why some people says u need to disable java script also???

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    Cause that can uniquely identify you

  • @obitorasu1760

    @obitorasu1760

    3 жыл бұрын

    Almost the entire online tracking and fingerprinting process is based off on js

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @Lxka Well it can uniquely identify you but, don't be paranoid

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @Lxka Well worst case scenario for your friend. Likely nothing will happen to him. .onions use Tor on Tor encryption and are not reachable by the normal browser and require Tor. Once the session is closed the data is dropped and connection is closed. Not even exit nodes can see .onion links they are hidden for a reason. Your friend will be fine in the long run. Feds would of gotten him by now and he would be in jail. They go after people who knowingly produce and distribute and download/receive that material with the criminal intent to reproduce and distribute it usually on a large scale.

  • @Scorges1

    @Scorges1

    3 жыл бұрын

    @Lxka Also the .onion dark web links know a connection is made but not exactly the end user at all. That's a completely encrypted connection even if they got your physical access to machine they couldn't sniff your IP address

  • @SWIFTO_SCYTHE
    @SWIFTO_SCYTHE3 жыл бұрын

    :( one slipup one login to facebook or KZread or email by mistake while Tor is up you done played yourself. And unlike you the person the government surveillance NEVER slips for a second.

  • @selenophile410

    @selenophile410

    3 жыл бұрын

    Wait if I login to youtube using tor, is it still trackable ?

  • @thebandit9982

    @thebandit9982

    3 жыл бұрын

    @@selenophile410 don't log into anything that requires you to input any information that leads back to the real you. And things like KZread and Google accounts/emails is all someone needs.

  • @dankhill_

    @dankhill_

    3 жыл бұрын

    @@thebandit9982 so would i be able to make a throwaway account? or do i just NEVER log in into youtube on tor?

  • @chriscontact5857
    @chriscontact58574 жыл бұрын

    I was at a computer show in the nineties talking to a guy about the next Intel chip coming out. I said I was hopeful they would finally use all the extra features built into the chip with them getting so fast. I said I was tired of paying the high prices for chips and them not being leveraged. The guy took me aside and said those features are there for the government to hack you. It was kinda like how the Chinese were putting a rice size chip in boards coming to the US. In this case the insecurity was built into the processor, bus and architecture in general. All this and we were paying absurd prices for processor chips. We pay high prices for the government to have access to any intellectual property or advanced knowledge of our business deals. We actually pay the government to hack us.

  • @LAWRENCESYSTEMS

    @LAWRENCESYSTEMS

    4 жыл бұрын

    LOL, please remove your tinfoil hat, none of what you said is true.

  • @chriscontact5857

    @chriscontact5857

    4 жыл бұрын

    @@LAWRENCESYSTEMS really? www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies Classy response BTW. What about the German hacker groups back in the nineties that cracked Nice Try and exposed the unknown keys for windows nt. The two keys started with the letters NSA and MS. Microsoft egnowledged the MS key, but they wouldn't even respond about the NSA key. Those German hacker groups have now been outlawed and over the years multiples of their members have been maliciously prosacuted, silenced, killed, and disappeared. It was nice when they were being prosecuted, for crimes they committed before the laws were on the books. Your really going to tell me the computer companies use all the features they build into their processors? In the nineties they were using less then 10% in some cases. What did you think when it came out, with pictures, that Cisco routers were being sent to an NSA facility and had their own chips added? Then China outlawed cisco and ibm from much of their infrastructure. We have tried to remove china from much of or infrastructor. After that came out cisco tried for a while to unload Linksys. What are you a government paid counter intelligence officer? If not get your head out of your...

  • @chriscontact5857

    @chriscontact5857

    4 жыл бұрын

    @@LAWRENCESYSTEMS how come you never answered me to say I planted the Bloomberg story or just give me some other snarky remark?

  • @fluffyhamster550

    @fluffyhamster550

    4 жыл бұрын

    Chris Contact Because it’s the ruthless truth 🙈🙉🙊

  • @BadgerBotherer1
    @BadgerBotherer13 жыл бұрын

    I have had two anonymous death threats that popped up on my tablet, both when I was using a certain app. Is there any way I can trace who sent them?

  • @w1z4rd9

    @w1z4rd9

    3 жыл бұрын

    BadgerBotherer1 HACK THE PLANET

  • @acidbath3226

    @acidbath3226

    3 жыл бұрын

    lol so dumb. probably autotxt generator

  • @everyonehatesme6564

    @everyonehatesme6564

    3 жыл бұрын

    Use wire shark to get the IP

  • @jamesbenedict6991
    @jamesbenedict69913 жыл бұрын

    Your missing the bigger picture. Tor is great at what it does but they still have to comply with the government. There is ways of being impossible to trace. Tor and orbit work to cover up your crucial information. The key thing to do is not only cover up your ip and mac but to completely change it. On android(Linux) you can change your ip and mac by simply factory reset. Go get you a straight talk rebel phone and buy a phone card. Reset this phone everytime you plan on logging into your site. Another important thing that everyone seems to forget is that every phone has a gps in it. You can block the gps by taking apart the phone. You can use the phone to connect your computer to the internet as well. The last important thing to keep in mind is never be on or around any other networks while on your site. The feds can trace you from what's called maping your location. They look for routers and devices in your wifi range to locate you. So if its not obvious you need to be isolated away from everything. If you follow all these steps it will be impossible to trace you. I am personally working on the new silk road. It will come to light soon

  • @imdaddyjoe1039

    @imdaddyjoe1039

    2 жыл бұрын

    Teach me. I'm willing to learn

  • @AnaiBendai
    @AnaiBendai4 жыл бұрын

    The NSA basically focuses on all TOR users. No browser is totally anonymous.

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    Not entirely true. NSA goes after government leakers, whistleblowers, suspected homeland terrorists, and other government related shit. I wouldn't worry too much just don't enter anything that can uniquely identify yourself or take the right precautions when browsing.

  • @AnaiBendai

    @AnaiBendai

    4 жыл бұрын

    @@Scorges1 Exactly because your aforementioned subjects think using TOR keeps them anonymous when it doesn't. It makes them stick out like sore thumbs.

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    @@AnaiBendai Haha it happens pretty often someone thinks Tor is anonymous and they link their Bitcoin up to some .onion and uniquely identify themselves. Tor is pretty secure, but yes you'll stick out like a sore thumb if you enter unique identifying information across exit nodes especially on sites that use http and not https

  • @jesus.christis.lord.foreve899
    @jesus.christis.lord.foreve899 Жыл бұрын

    I see necessity for a battery of pc s 1 tor only pc 1 mediary (faraday room non internet) pc to de-infect files to use on 1 reg. pc 1 (also faraday room non internet connectible) px as archive

  • @marineandmotor9270
    @marineandmotor92703 жыл бұрын

    Tor is not famous for its speed exacly. Ok but sometimes unstable connection.

  • @lucaslindgren3237
    @lucaslindgren32374 жыл бұрын

    What is the best anonymized tool i can use?

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    Tor Whonix Tails

  • @holyshit1916

    @holyshit1916

    4 жыл бұрын

    Reclusion aren’t whonix and tails seperate?

  • @Scorges1

    @Scorges1

    4 жыл бұрын

    @@holyshit1916 Yes you can choose between Tails or Whonix both are pretty secure as is and don't need tweaking. Tor alone is also secure

  • @obitorasu1760

    @obitorasu1760

    3 жыл бұрын

    The best tool is not a single tool but chained ones the topic of chaining itself is a big deal.

Келесі