Thanks man, very useful info and very long answer.
"And choose your tunnel providers wisely. Find out in which physical and legal jurisdiction and network their servers are located."
Well, it sucks that you have to blindly trust a VPN provider , knowing that they will log you with 99.99% cha
@joshi One night i touched pepper with my hands while i was eating, then i went to the bathroom to pee and i touched my D1ck ...
then i spent the whole night without being able to sleep, the pain was too much!
You get scared too easily for bullshit stories.
Ross is in jail due to his big mistakes. It was not TOR fault.
The guys behind AlphaBay and Hansa ,.. the same.
They try to scare everyone and make you believe they are almighty and they can catch you anyway blah blah.. yeah sure LOL.
That's why we should only trust open source and frequently audited software !
Is it possible to have like a virtual network adapter that forces all the traffic via TOR?
So all the processes will see this as a network interface like the other ones, and everything will go through TOR in a comfortable and transparent way.
Seems very cool.
So you can use apt-get or yum or pip to install stuff via a TOR connections ?
Also, is it possible to set up like a virtual network adapter that forces all the traffic via TOR?
So all the processes will see this as a network interface like the other ones, and everything
Why have you been targeted? Are you a rich/important person?
What are they sending you at your workplace ?
You need privacy... on an iPhone??
Very hard i guess.
What kind of things are sending you?
Is your workplace at your home or your company ?
If they are spying from your webcam, just cover it like Zuckerberg and many others did as well.
If even a tech guy like Zuck did it, it doe
What file extension does it have? .EXE ? .html ?
Anyway, generally if you execute downloaded files, the external program that will open that file will not use TOR.
If you want a program to connect to the internet only via TOR and not directly, you have to set up it's proxy settings.
Once in a while they say that the "FBI cracked TOR blah blah...", and "there are TOR vulnerabilities that only the FBI is aware of blah blah.. ".
TOR and I2P are still safe places.
When they seized hidden services like SilkRoad, it was just because their owners
Hey all !!
I've seen that some sites are blocking TOR IPs, maybe someone used TOR to do evil stuff there.
So in order to access those sites anonymously, what can be done?
I don't want to use just a VPN , as it's not really anonymous ( it will know my real IP ).
Is it possible to use