DaemonForums  

Go Back   DaemonForums > Miscellaneous > General software and network

General software and network General OS-independent software and network questions, X11, MTA, routing, etc.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 29th December 2008
Oko's Avatar
Oko Oko is offline
Rc.conf Instructor
 
Join Date: May 2008
Location: Kosovo, Serbia
Posts: 1,102
Default Tor and Privoxy

Could people share their experience in using Tor and Privoxy?
Reply With Quote
  #2   (View Single Post)  
Old 29th December 2008
roddierod's Avatar
roddierod roddierod is offline
Real Name: Rod Person
VPN Cryptographer
 
Join Date: Apr 2008
Location: Pittsburgh, Pa
Posts: 437
Default

I had tor working on FreeBSD a few months back, it works, but it was so slow that I found it not usuable for web browsing...
__________________
"The basic tool for the manipulation of reality is the manipulation of words. If you can control the meaning of words, you can control the people who must use the words." -Philip K. Dick
Reply With Quote
  #3   (View Single Post)  
Old 30th December 2008
Oliver_H's Avatar
Oliver_H Oliver_H is offline
Real Name: Oliver Herold
UNIX lover
 
Join Date: May 2008
Location: Germany
Posts: 427
Default

I'm using Tor and Privoxy. Tor isn't about performance and usability, it's about your privacy. If you want to anonymize certain data on your Internet journey then this is the proper tool. Web 2.0 applications are a no-go with Tor, however e.g. Jabber with Tor (via Socks) is possible too. So in the end it depends on your daily use and how much you're interested in securing your privacy.
__________________
use UNIX or die :-)
Reply With Quote
  #4   (View Single Post)  
Old 31st December 2008
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 4,125
Default

And what happens if the KGB or CIA sponsors and administers, using a straw man, a TOR exit node ? How can you be sure that this is not the case?
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote
  #5   (View Single Post)  
Old 31st December 2008
bsdfan bsdfan is offline
New User
 
Join Date: Dec 2008
Posts: 5
Default

my first experience with it is quite good. i did not experience any performance issues by now.
it works quite good for me. now i need to find out how to tell tor (shell command) to get new ip immediately.
besides i need to know how to keep ip, if it works good for me.
Reply With Quote
  #6   (View Single Post)  
Old 31st December 2008
Oliver_H's Avatar
Oliver_H Oliver_H is offline
Real Name: Oliver Herold
UNIX lover
 
Join Date: May 2008
Location: Germany
Posts: 427
Default

Quote:
Originally Posted by J65nko View Post
And what happens if the KGB or CIA sponsors and administers, using a straw man, a TOR exit node ? How can you be sure that this is not the case?
So what? It doesn't matter, they must have control over a huge share of the net to do forensics via time-based analysis to get a hint about you. The exitnode itself doesn't have a clue about the source, so your anonymity is 'secure', but your data isn't. But which data you submit is up to you (and it can compromise your anonymity). In terms of Jabber over Tor I'm using Gpg or OTR encryption - so anybody can have a look at it, but the don't know the decrypted content and the source of the transmission.
__________________
use UNIX or die :-)
Reply With Quote
  #7   (View Single Post)  
Old 31st December 2008
Randux Randux is offline
Disgruntled desktop user
 
Join Date: May 2008
Location: Siberia
Posts: 100
Default

If you use GPG they have a pretty good idea who you are by your email address. GPG and TOR do NOT go together.
__________________
BSDForums.org refugee #27
Multibooting with LILO
Reply With Quote
  #8   (View Single Post)  
Old 31st December 2008
Oliver_H's Avatar
Oliver_H Oliver_H is offline
Real Name: Oliver Herold
UNIX lover
 
Join Date: May 2008
Location: Germany
Posts: 427
Default

Quote:
Originally Posted by Randux View Post
If you use GPG they have a pretty good idea who you are by your email address. GPG and TOR do NOT go together.
Of course it's possible (Jabber with GPG or OTR encryption plus Tor) - I'm using it. And you can use OTR (deniable) if you have a personal email address. One hint for the latter, it's possible to use a freemailer like Gmail and without giving Google your personal data.

Btw. it doesn't matter for Tor which data you're transmitting - it can be a SSH session, a GPG or OTR encrypted XMPP transmission etc. pp.

Some further information, because I see some misconception in your saying:

OTR: http://en.wikipedia.org/wiki/Off-the-Record_Messaging
GPG: http://en.wikipedia.org/wiki/GNU_Privacy_Guard
XMPP: http://en.wikipedia.org/wiki/Xmpp
SSH via Tor: http://themostboringblogintheworld.w...n00b-approved/
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)

etc.
__________________
use UNIX or die :-)
Reply With Quote
  #9   (View Single Post)  
Old 6th January 2009
Randux Randux is offline
Disgruntled desktop user
 
Join Date: May 2008
Location: Siberia
Posts: 100
Default

Ah, no, I see misconception in your saying. GPG is about privacy, not anonymity.

If you use GPG for anonymity and you don't understand how to wrapper it, you will not be anonymous. Like I said, GPG and TOR do NOT go together.
__________________
BSDForums.org refugee #27
Multibooting with LILO
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Squid -> Privoxy -> Tor Peter_APIIT OpenBSD Security 3 17th June 2008 08:06 AM


All times are GMT. The time now is 11:50 AM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick