Danja

Registered 5 years ago
Last Visited last year
Total Posts 75


Posts by Danja


Internet2Tor Proxy

by lonny in Running a Server

...
  Danja   last year

netcat can work via Tor.
-x localhost:9050 -X 4

View Topic (14 replies)



Using Tor Browser without being connected to TOR

by alek in Security Questions

...
  Danja   2 years ago

Tools -> Options -> Advanced -> Network -> Connection -> Settings
Choose "No proxy".
This makes Tor Browser (that is actually a Portable installation of Firefox) work without Tor connection.

View Topic (2 replies)



Basic question

by torit in General Questions

...
  Danja   2 years ago

Whatever you do via Tor Network appears to Google like it is been performed by Tor Exit Node, not by you.
However, it would be strange if Tor Exit Node suddenly sends cookies, that Google assigns to you. Or passes login/password, that belongs to you. That's how Google can guess that Tor Exit No ...

View Topic (1 replies)



A quick tor question?

by cheesypasta in Userspace Software

...
  Danja   2 years ago

When accessing to *.onion sites Tor doesn't use Exit Nodes. Last level of decryption occurs directly on the computer that actually hosts that *.onion domain.

View Topic (1 replies)



Do computers have an identification?

by ericvogert32 in Security Questions

...
  Danja   2 years ago

Well, yes and no.
"Experienced hacker" normally cannot get your cpuid or hdd serial number (unless using some 0-day exploits which is rare situation).
But combination of your browser user-agent, javascript version, OS version, accept-language headers, etc... is usually unique eno ...

View Topic (1 replies)



Using a Private IP Address, a Private VPN... while using Tor

by tnt211 in Security Questions

...
  Danja   2 years ago

No, this is stupid.
Consider using VMWare or VirtualBox, make your own Virtual Machine (there are several common installations with Tor already onboard - such as Tails, or TorVM) and restore your Virtual Machine every time from backup copy. This will definitely remove all flash cookies etc, a ...

View Topic (1 replies)



Upload pics with TOR BROSWER

by Anonymail92 in Security Questions

...
  Danja   2 years ago

Beware of EXIF metadata in your images: GPS coordinates, type of camera, Photoshop licence, etc. Google for EXIF remover.
The rest is fine: uploading images is done via same Tor Exit Node.
PS: To keep safe not only from your Internet Service Provider, but also from Tor Exit Node (which c ...

View Topic (1 replies)



Is Tor causing these problems?

by Hugheen in General Questions

...
  Danja   2 years ago

I get shut out of my email program because of unusual activity."Hugheen"
Seems that you've been using your personal mailbox via TOR Network, which is strongly not recomended.
Tor is for anonymity. What's the sense to hide your identity if you keep logging to your facebook account or private ...

View Topic (1 replies)



Will Tor keep me safe with the new Aus "three strike" Law?

by Redstar2613 in Security Questions

...
  Danja   2 years ago

Yes, Tor will keep you safe, but this is an overkill for your situation, and also I doubt the speed will be enough for comfortable streaming. Consider using any VPN service, there are many of them.
If the server supports https, even that will be enough. Your ISP will see you connecting to y ...

View Topic (2 replies)



Will Tor keep me safe with the new Aus "three strike" Law?

by Redstar2613 in Security Questions

...
  Danja   2 years ago

Yes, Tor will keep you safe, but this is an overkill for your situation, and also I doubt the speed will be enough for comfortable streaming. Consider using any VPN service, there are many of them.
Even basic https-connection should be enough: your ISP will see you connecting to your anime ...

View Topic (2 replies)



what is .onion websites?

by tor3match911 in Running a Server

...
  Danja   3 years ago

viewtopic.php?f=5&t=18268

View Topic (1 replies)



the same icon in ubuntu

by marcopolon2 in General Questions

...
  Danja   3 years ago

On Windows you should place your custom icon here:
\Tor Browser\FirefoxPortable\App\Firefox\chrome\icons\default\main-window.ico
On Ubuntu (i guess) should be something similar:
/usr/lib/firefox/chrome/icons/default/default.xpm
Also check out this thread: http://ubuntuforums.org/sh ...

View Topic (1 replies)



Can a tor server own me?

by mobbynoob in Userspace Software

...
  Danja   3 years ago

Tor encrypts traffic between you and Exit Relay.
After Exit Relay the traffic travels as-is, without any additional security.
So every Exit Relay can (and many of them actually do) view and even modify everything that comes between you and target server. Everything.
Fortunately we have ...

View Topic (1 replies)



Firefox Attempts to Bypass Tor in Ubuntu

by Preznik in Userspace Software

...
  Danja   3 years ago

Seems like Firefox Auto-Update or Safe-Browsing feature.

View Topic (2 replies)



Running a secure-only - and a hidden mail server.

by dannycrafts in Running a Server

...
  Danja   3 years ago

Do hidden services (.onion's) support MX records in some way?
No
Can a mail server be configured to sent email through Tor towards my hidden service?
Yes. You can torify your mail server or even put into virtual circuit with all traffic transparently routed to Tor.
Would it be possi ...

View Topic (2 replies)



how anonymous/Safe is TOR

by tealsack in Security Questions

...
  Danja   3 years ago

Despite the fact you are using Tor (which is not illegal) your ISP knows nothing about your traffic. No IP or web addresses, no data, nothing. It doesn't even know whether this is your traffic or just a some transit.
There are several techniques to hide Tor inside other traffic (Skype morph, Tor ...

View Topic (9 replies)



Tor with Firefox and Google Problem

by mouse2113 in General Questions

...
  Danja   3 years ago

Google throws unique identifier to every browser. Not only Google site, but all google code: YouTube Embedded videos, Google+ "share" buttons, Google Analytics code, Adsense blocks etc. Many chances that your browser have already got this unique ID and now every your visit Google knows this is not ...

View Topic (4 replies)



how anonymous/Safe is TOR

by tealsack in Security Questions

...
  Danja   3 years ago

Sometimes there are stories like this:
http://thehackernews.com/2013/08/Firefo ... sting.html
http://arstechnica.com/security/2013/08 ... tor-users/
So as for me, isolated environment is also a must.
In Whonix you can use any OS as a "second guest system" and route all it's traffic ...

View Topic (9 replies)



Using one Tor service through local networt

by franc in Userspace Software

...
  Danja   3 years ago

If your home PC (XP-SP3-32) has local IP address, say, 192.168.0.5
edit your torrc file:
SOCKSListenAddress 192.168.0.5:9100
then restart Tor
then use it everywhere as a usual socks5 proxy: Host:192.168.0.5 Port:9100 Type: Socks5
Should work all over inside your network.

View Topic (2 replies)



VPNCheck Pro

by ipadtaller in Userspace Software

...
  Danja   3 years ago

I think your VPN goes directly, without TOR. Am I wrong?
Also, check out our previous 'VPN over Tor' treads, mb you'll find something useful:
viewtopic.php?f=6&t=18264
viewtopic.php?f=4&t=18283
viewtopic.php?f=6&t=18263

View Topic (2 replies)