Discussion in 'Security, Privacy & Anonymity' started by Ripped, Mar 5, 2017.

  1. Ripped

    Ripped Member

    I downloaded thor & the browser on my s5 but could not get it to work. It would start checking thor but never finish anyone have this problem or any suggestions on what went wrong.

    Sent from my SAMSUNG-SM-G900A using Tapatalk
  2. master.on

    master.on Member

    Be careful with TOR
    it was invented my the military
    The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997

    so it's obvious they know of to spy on it.
    Tor Is Vulnerable to Malware and Government Surveillance – Adweek
    Everything you need to know about the NSA and Tor in one FAQ

    Several attacks result in implanting malicious code on the computer of Tor users who visit particular websites
    NSA and GCHQ target Tor network that protects anonymity of web users

    TOR? No offense but you're so naive while believing you're smart.
    TOR network gets a huge amount of LE attention.
    In the plain vanilla Internet you get NSA spying but seldom active monitoring, in other words your recorded Internet activity stands still in a storage device but never gets monitored by humans, unless you did something really bad.
    In tor you'd always get nsa spying + active LE monitoring + malware infection attempts every single day
    Last edited: Mar 6, 2017
  3. Ripped

    Ripped Member

    I was under the impression that it was more secure that it's harder to monitor than the normal browsers.

    Sent from my SAMSUNG-SM-G900A using Tapatalk
  4. Jak3d

    Jak3d Member

    TOR was good till the fucken sick pedophiles took over and the silk road busts. I won't even go near it anymore.
    master.on likes this.
  5. master.on

    master.on Member

    Not hard enough for nsa
    plus it gets too much LE attention
    NSA likely targets anybody who's 'Tor-curious'
    Use Linux or Tor? The NSA might just be tracking you
    How the NSA (Or Anyone Else) Can Crack Tor's Anonymity - Motherboard

    the website was launched in February 2011; development had begun six months prior...
    In October 2013, the Federal Bureau of Investigation (FBI) shut down the website

    Silk Road (marketplace) - Wikipedia
    So it took just 2 years for them to shut down the site, they hacked the site in just a few months, most of those 2 years were spent gathering court-quality evidence, judge warrants, and quietly monitoring in case a higher priority crime (likely terrorism related) was spotted.
  6. master.on

    master.on Member

    No offense but if you installed TOR in your PERSONAL computer having files with your name on it (like resumes or bills) you're a total idiot.
  7. Ripped

    Ripped Member

    No I'm not that stupid.I have an phone for this kind of stuff.

    Sent from my SAMSUNG-SM-G900A using Tapatalk
  8. Ripped

    Ripped Member

    Is thor & tor the same thing.

    Sent from my SAMSUNG-SM-G900A using Tapatalk
  9. master.on

    master.on Member

    THOR is a browser for surfing the TOR network
    TOR network is already highly monitored by nsa and all kinds of le agencies.

    I wouldn't be surprised if THOR already came with spyware
    the NSA redirects traffic to a fake website, pretending to be the download site, and boom, free spyware included .

    Ever heard the news about DEA, NSA secretly selling encrypted phones to mexican drug cartels so they begin talking shit over the phone believing they are safe?

  10. Ripped

    Ripped Member

    I believe I will just stay away from all of it till I know more about it. I appreciate you're help on the subject.

    Sent from my SAMSUNG-SM-G900A using Tapatalk
  11. pumpingiron22

    pumpingiron22 Member Supporter

    WTF Its all about how you do it. are you saying the reg web is much safer?????
    please read my post and re educate your self its not a insult but your info is misleading
  12. pumpingiron22

    pumpingiron22 Member Supporter

    if you use Vpn to download TOR they will not know your downloading it. also always keep your vpn on as you are using tor that way you netprovider will not know you are using it.
    But regardless it not against the law to use tor. also Use a virtual machine or boot up using tails os there will be no info to write on your drive no info kept you are safe
  13. master.on

    master.on Member

    While not illegal to use/download TOR,
    it is the wild west, a lawless, you're on your own web
    point you can actually expect to download spyware with it

    Nobody wanting privacy (for legal purposes, I'm not advocating/ condoning to break any law) should install any dark web on their PERSONAL computer, they should expect spyware to read their personal files. Don't rely on VPN/proxies, they may not help.

    For privacy, they should use a burner computer, with no personal files whatsoever, a prepaid modem, etc.
    Just like Dr Jekyll having his own separate computer to use when becoming Mr Hyde for his wild activities.

    Even church pastors have their hidden prepaid smartphones or laptops to watch porn privately, even though porn ain't illegal.
    Using the same computer for TOR believing VPNs will save your privacy? Come on guys can't believe you're so naive.
  14. pumpingiron22

    pumpingiron22 Member Supporter

    Open, free and uncensorable websites,
    using Bitcoin cryptography and BitTorrent network
  15. master.on

    master.on Member

    Did you watch today's 'Vault 7' wikileaks release?
    They can hack Iphones, Android, turn TVs mics on
    and you believe TOR is spyware free?
    especially since wikileaks now accepts leaks submitted via TOR
    WikiLeaks:Tor - WikiLeaks
    So you think TOR ain't a top priority for spies?

    Using our anonymous access package (see below) you can prevent internet spies knowing that your computer has connected to Wikileaks.

    Most Wikileakers do not need this extra security, and there are simpler and possibly safer alternatives for once-off high-risk leaks (see Submissions). But for those who are at risk and want to access Wikileaks from the comfort of their homes or offices or need to bypass Internet censorship, Tor (Onion Routing) is an excellent solution.

    As if paying a homeless drunk $200 to buy a prepaid phone for you was that hard