Registered | last year |
Last Visited | 3 weeks ago |
Total Posts | 136 |
by DavidMatrix in General Questions
...
![]() | TOR Hacker 7 months ago |
The right key term for that is "bitcoin vps" or "visa gift card".
Hosting, that openly says it is "Anonymous" will not live for long, or is not anonymous.
by DacorDave in Userspace Software
...
![]() | TOR Hacker 7 months ago |
When you run a Tor Browser, it automatically starts Tor in background, then waits for Tor to connect to Tor Network, and then starts a castrated copy of Firefox Portable, with special settings in it (Proxy:Yes, IP:127.0.0.1, Type:Socks5, ...). When you close Firefox Portable, it automatically shutd
by ManInTheMiddle in Security Questions
...
![]() | TOR Hacker 7 months ago |
Tails says somthing about a permanent Entry- or Exit node. But why? the VPN isn't part of Tor. So it's not an Entrynode or is it?
"ManInTheMiddle"
This is very good question.
Some threats are described here: https://blog.torproject.org/blog/improv ... parameters
Permanent entr
by HurryUp10 in Security Questions
...
![]() | TOR Hacker 7 months ago |
Well, this is only my GUESS, because I don't know your email server, your configuration, etc.
But let's discuss the most probable case:
1) Tor (the application) chooses random Tor Exit Node from public list, makes virtual circuit to it and creates localhost:9050 that acts like socks5 proxy.
by mc118 in Security Questions
...
![]() | TOR Hacker 7 months ago |
They said this is impossible, but i still think Tor was connecting via PIA.
So your actual scheme was: you -> pia -> tor -> tor exit node -> target website.
by HurryUp10 in Security Questions
...
![]() | TOR Hacker 7 months ago |
I think TRUE.
As long as your IDM wasn't configured to use Proxy localhost:9050, it sends direct request from your real IP with sessid of your account.
To avoid this situation in future, you should block all outgoing traffic except Tor.
Or use Tails/Whonix/corridor.
by thetoruser in Security Questions
...
![]() | TOR Hacker 8 months ago |
There is a public list of all Tor nodes (except Bridged). You can view it in Vidalia, or here:
https://torstatus.blutmagie.de/
https://www.dan.me.uk/tornodes
or google "list of Tor nodes"
When you start a session, your Tor client randomly picks 3 nodes from that list (let
by Screwlegg in Security Questions
...
![]() | TOR Hacker 8 months ago |
Best way is to install Whonix and double-check any information you put in your Virtual Box.
Ideally, that Virtual Box should be a totally "new life" of you - new email, new accounts, new wallets... Never access your real accounts from inside Whonix, and never access accounts you creat
by sheldon in Running a Server
...
![]() | TOR Hacker 8 months ago |
viewtopic.php?f=5&t=18268
It will create .onion address anyway since this is the only way to address an anon. service inside Tor network.
by Erich in Userspace Software
...
![]() | TOR Hacker 8 months ago |
I think no, because VPN Server is the actually node that connects to Tor network.
Good thing that almost all VPN's allow Tor. And your ISP will only see you connecting to VPN, which is also legal.
by bertybaby1000 in Userspace Software
...
![]() | TOR Hacker 8 months ago |
What happens when you comment out these two lines?
# HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
# HiddenServicePort 80 127.0.0.1:80
Does Tor work with default settings?
by darkguyver in General Questions
...
![]() | TOR Hacker 8 months ago |
Yes, this is true. All tracker announcements come with your real IP address inside. And if somebody wants to download a file, he should connect to this IP and initiate transfer. This is how torrents work.
(Btw, this is one of the reasons why you should never route your torrent traffic via Tor.
by darkguyver in General Questions
...
![]() | TOR Hacker 8 months ago |
Hi!
Tor Browser runs Tor and then opens browser (Firefox), so all security risks associated with Tor are also applicable to Tor Browser.
But as far as you don't reveal your IP while browsing anon network (for example, by catching a remote exploit), the only thing that could potentially be
by DrFrankenstein in Userspace Software
...
![]() | TOR Hacker 2 weeks ago |
This is famous hackers group Lizard Squad: https://www.facebook.com/LizardSquadOnYaForehead
by zeb in Running a Server
...
![]() | TOR Hacker 2 weeks ago |
No, this really could be dangerous.
Could you please capture "Technical Details" here (Certificate date, fingerprint)
by xcaret in TorForum.org
...
![]() | TOR Hacker 2 weeks ago |
Tor encrypts traffic only between you and Tor Exit Node. After Exit Node it comes unencrypted. So operator of Exit Node can read all of your e'mails & passwords unless you use your own encryption (SSL, PGP or whatever). Don't rely on TOR!
by Antmound in General Questions
...
![]() | TOR Hacker 8 months ago |
Yes, in new versions of Tor Browser Bundle, javascript is enabled by default. Flash & Java - not. But youtube has also html5 player, so you can watch video even with no Flash installed.
by postcd in Security Questions
...
![]() | TOR Hacker last year |
The most secure (and proper) way is to have your Windows installed inside a virtualbox, and to route virtual bridge interface. Look "Whonix" for details, they use Debian for the guest OS, but Windows is also supported.
Other way (witch doesn't require virtualization) is to set up a new TUN/TAP
by shisharkata in General Questions
...
![]() | TOR Hacker last year |
Seems you are not using Tor. Your Browser opens sites directly because you did not put correct Proxy Settings.
Can you just re-install Tor Browser Bundle and try again?
If this not gonna help, please open Tools -> Options -> Advanced -> Connection Settings and printscreen it h
by dam123456 in General Questions
...
![]() | TOR Hacker last year |
Here's a big thread about changing country: viewtopic.php?f=2&t=18267
I think we need some kind of FAQ here on this forum. This is very freq. question.