Overclock.net › Forums › Industry News › Software News › [TR] Uncensored/Anonymous Web Browser TOR Released! (DOWNLOAD LINK)
New Posts  All Forums:Forum Nav:

[TR] Uncensored/Anonymous Web Browser TOR Released! (DOWNLOAD LINK) - Page 2

post #11 of 81
This is awesome for privacy concerns and to stop companies from tracking me and developing a profile of me. (Yes, they do.) On a side note, I don't like the idea of people using it for illegal purposes, but to each his own. For me, I think it's awesome for the other uses. thumb.gif
post #12 of 81
Quote:
Originally Posted by joshd View Post

You can still get traced though. You would need everything else like a live Linux distro, SSL etc. to even be remotely secure. But then again that depends what you are upto..

everything is traceable...

RIAA caught my VPN's Tokyo based server acquiring some stuff. The sent me a less than nice email telling me I was a bad boy. It would most likely take collusion between my provider, and my ISP. again it comes down to resources like the posters above said. I can be gotten but how much time and money do you want to spend getting.
 
DD Portable
(12 items)
 
 
CPUMotherboardGraphicsRAM
i5 5675C Gigabyte GA-Z97X Gaming 5 XFX RX 480 GTR 32GB Corsair Vengeance 1600 
Hard DriveHard DriveHard DriveCooling
Samsung 840 Evo Western Digital Black RE4 2TB Western Digital Green 2TB bequiet! Silent Wings 2 140mm PWM 
CoolingCoolingCoolingOS
bequiet! Silent Wings 2 140mm PWM bequiet! Shadow Wings SW1 120mm PWM bequiet! Dark Rock Pro 3 Arch X64 / Gnome and OSX 10.11 
MonitorKeyboardPowerCase
Samsung 590D 4K KBC Poker II be quiet! Straight Power 10 400W bequiet! Silent Base 800 
MouseAudioAudio
Speedlink Omni VI  Sound Blaster Z  Bose Companion 2  
CPUMotherboardGraphicsRAM
i5 3427U The Googs HD4000 4GB DDR3 
Hard DriveOSMonitorKeyboard
32GB Flash / 128GB SanDisk Extreme SD card ChromeOS / Ubuntu 14.04 12" 2560x1700 bad 
PowerCaseMouseAudio
not much  Aluminium  Trackpad it makes noise I think  
  hide details  
Reply
 
DD Portable
(12 items)
 
 
CPUMotherboardGraphicsRAM
i5 5675C Gigabyte GA-Z97X Gaming 5 XFX RX 480 GTR 32GB Corsair Vengeance 1600 
Hard DriveHard DriveHard DriveCooling
Samsung 840 Evo Western Digital Black RE4 2TB Western Digital Green 2TB bequiet! Silent Wings 2 140mm PWM 
CoolingCoolingCoolingOS
bequiet! Silent Wings 2 140mm PWM bequiet! Shadow Wings SW1 120mm PWM bequiet! Dark Rock Pro 3 Arch X64 / Gnome and OSX 10.11 
MonitorKeyboardPowerCase
Samsung 590D 4K KBC Poker II be quiet! Straight Power 10 400W bequiet! Silent Base 800 
MouseAudioAudio
Speedlink Omni VI  Sound Blaster Z  Bose Companion 2  
CPUMotherboardGraphicsRAM
i5 3427U The Googs HD4000 4GB DDR3 
Hard DriveOSMonitorKeyboard
32GB Flash / 128GB SanDisk Extreme SD card ChromeOS / Ubuntu 14.04 12" 2560x1700 bad 
PowerCaseMouseAudio
not much  Aluminium  Trackpad it makes noise I think  
  hide details  
Reply
post #13 of 81


With the billions of users that are online, it's a waste of time trying to trace them, unless your some type of worldwide internet criminal. Proxies, VPNs, TOR, etc. only make the process more complicated.

-snip- Don't want to get in trouble with the mods thumb.gif

TOR is really slow, unfortunately, but I guess it's a necessary compromise for some people.
Edited by airisom2 - 8/13/12 at 11:32am
post #14 of 81
***PLEASE***

Before anyone tries it, DO NOT DDoS via a website through TOR, you will only slow the network even more.

Also most schools etc. block this somehow..
Main Rig.
(14 items)
 
Battlefield 2 review.
Battlefield 2 PC Game EA
 
CPUMotherboardGraphicsRAM
Bulldozer FX4100 Gigabyte GA-M68MT-S2 MSI 7770 Kingston Hyper X | 2 x 2 GB 
Hard DriveOptical DriveCoolingOS
WD 2 TB  LiteON DVD/CD R-W Drive AMD Standard cooler Windows 7 Ultimate 
MonitorKeyboardPowerCase
32' Luxor Full HD TV Microsoft comfort curce Antec 450 Watt OcUK Value case 
MouseAudio
Microsoft wireless mouse Logitech speakers & Bass 
  hide details  
Reply
Main Rig.
(14 items)
 
Battlefield 2 review.
Battlefield 2 PC Game EA
 
CPUMotherboardGraphicsRAM
Bulldozer FX4100 Gigabyte GA-M68MT-S2 MSI 7770 Kingston Hyper X | 2 x 2 GB 
Hard DriveOptical DriveCoolingOS
WD 2 TB  LiteON DVD/CD R-W Drive AMD Standard cooler Windows 7 Ultimate 
MonitorKeyboardPowerCase
32' Luxor Full HD TV Microsoft comfort curce Antec 450 Watt OcUK Value case 
MouseAudio
Microsoft wireless mouse Logitech speakers & Bass 
  hide details  
Reply
post #15 of 81
Quote:
Originally Posted by Telimektar View Post

Unless you like downloading files at 5KB/s you'll be disappointed I think.

With a good exit node, you can get speeds upwards of 150KB/s.
    
CPUMotherboardGraphicsRAM
Intel Core i7 920 SABERTOOTH X58 Gigabyte GTX 970 Corsair  
Hard DriveHard DriveHard DriveCooling
WD 320GB WD 1TB Hitachi 1TB CM Hyper 212 Plus 
OSMonitorMonitorPower
Windows 10 Pro 24" Sceptre 20" Asus Corsair TX750 
Case
Antec 1200 
  hide details  
Reply
    
CPUMotherboardGraphicsRAM
Intel Core i7 920 SABERTOOTH X58 Gigabyte GTX 970 Corsair  
Hard DriveHard DriveHard DriveCooling
WD 320GB WD 1TB Hitachi 1TB CM Hyper 212 Plus 
OSMonitorMonitorPower
Windows 10 Pro 24" Sceptre 20" Asus Corsair TX750 
Case
Antec 1200 
  hide details  
Reply
post #16 of 81
I thought Tor functions as a VPN?
    
CPUMotherboardGraphicsRAM
Intel Core i7 5820K EVGA X99 Micro2 EVGA GTX 980 32GB DDR4-2400 
Hard DriveOSMonitorPower
Samsung 850 Pro Windows 10 x64 Pro Qnix 1440p EVGA 850W Gold 
Case
CaseLabs Mercury S5 
  hide details  
Reply
    
CPUMotherboardGraphicsRAM
Intel Core i7 5820K EVGA X99 Micro2 EVGA GTX 980 32GB DDR4-2400 
Hard DriveOSMonitorPower
Samsung 850 Pro Windows 10 x64 Pro Qnix 1440p EVGA 850W Gold 
Case
CaseLabs Mercury S5 
  hide details  
Reply
post #17 of 81
Quote:
Originally Posted by lordikon View Post

Does this prevent your ISP from knowing what your internet traffic looks like? Or just prevent the sites you're on from knowing anything about you?

I can answer this one, as an owner of an ISP.

No. regardless of which method you use to browse the internet, if you send data across our network we can see it and where it is coming from within our network. Not only can it be tracked via an IP address but also the MAC address of the computer being used, which is something not a lot of people are aware of. The MAC comes in handy when tracking someone who travels between networks as well, as MAC addresses aren't changed, and most people don't know how to spoof them.

There are other ways law enforcement tracks and monitors individuals they might think are doing things that are illegal, but I won't get into those as I could find myself in hot water.

EDIT: I will go one further on this...

If your ISP uses NAT it is possible to hide (sorta), as the only IP shown to anywhere on the WWW is the NAT address and it can be very generic, just returning to your ISP. Then depending on how your ISP monitors traffic, it may be extremely difficult for them to even know which NAT user it was. Unless the MAC of the client end is being traced, that makes it easy.
Edited by PostalTwinkie - 8/13/12 at 11:15am
    
CPUMotherboardGraphicsRAM
Intel i7 5820K AsRock Extreme6 X99 Gigabyte GTX 980 Ti Windforce OC 16 GB Corsair Vengeance LPX 
Hard DriveHard DriveCoolingOS
Samsung 840 EVO 250GB - HDD Speed Edtition Samsung SM951 512 GB - I still hate Samsung!  Noctua NHD14 Windows 10 
MonitorMonitorMonitorKeyboard
Achieva Shimian QH270-Lite Overlord Computer Tempest X27OC  Acer Predator XB270HU Filco Majestouch 2 Ninja 
PowerCaseMouseMouse Pad
Seasonic X-1250 Fractal Design R5 Razer Naga Razer Goliathus Alpha 
AudioAudio
AKG K702 65th Anniversary Edition Creative Sound Blaster Zx 
  hide details  
Reply
    
CPUMotherboardGraphicsRAM
Intel i7 5820K AsRock Extreme6 X99 Gigabyte GTX 980 Ti Windforce OC 16 GB Corsair Vengeance LPX 
Hard DriveHard DriveCoolingOS
Samsung 840 EVO 250GB - HDD Speed Edtition Samsung SM951 512 GB - I still hate Samsung!  Noctua NHD14 Windows 10 
MonitorMonitorMonitorKeyboard
Achieva Shimian QH270-Lite Overlord Computer Tempest X27OC  Acer Predator XB270HU Filco Majestouch 2 Ninja 
PowerCaseMouseMouse Pad
Seasonic X-1250 Fractal Design R5 Razer Naga Razer Goliathus Alpha 
AudioAudio
AKG K702 65th Anniversary Edition Creative Sound Blaster Zx 
  hide details  
Reply
post #18 of 81
Quote:
Originally Posted by StormX2 View Post

well aint you the bad boy, did you give em the sunny side up of yer Kilt as well?

I did, then I got a batton up the arse along with 50,000 volts for my troubles frown.gif
Main Rig.
(14 items)
 
Battlefield 2 review.
Battlefield 2 PC Game EA
 
CPUMotherboardGraphicsRAM
Bulldozer FX4100 Gigabyte GA-M68MT-S2 MSI 7770 Kingston Hyper X | 2 x 2 GB 
Hard DriveOptical DriveCoolingOS
WD 2 TB  LiteON DVD/CD R-W Drive AMD Standard cooler Windows 7 Ultimate 
MonitorKeyboardPowerCase
32' Luxor Full HD TV Microsoft comfort curce Antec 450 Watt OcUK Value case 
MouseAudio
Microsoft wireless mouse Logitech speakers & Bass 
  hide details  
Reply
Main Rig.
(14 items)
 
Battlefield 2 review.
Battlefield 2 PC Game EA
 
CPUMotherboardGraphicsRAM
Bulldozer FX4100 Gigabyte GA-M68MT-S2 MSI 7770 Kingston Hyper X | 2 x 2 GB 
Hard DriveOptical DriveCoolingOS
WD 2 TB  LiteON DVD/CD R-W Drive AMD Standard cooler Windows 7 Ultimate 
MonitorKeyboardPowerCase
32' Luxor Full HD TV Microsoft comfort curce Antec 450 Watt OcUK Value case 
MouseAudio
Microsoft wireless mouse Logitech speakers & Bass 
  hide details  
Reply
post #19 of 81
Quote:
Originally Posted by PostalTwinkie View Post

I can answer this one, as an owner of an ISP.
No. regardless of which method you use to browse the internet, if you send data across our network we can see it and where it is coming from within our network. Not only can it be tracked via an IP address but also the MAC address of the computer being used, which is something not a lot of people are aware of. The MAC comes in handy when tracking someone who travels between networks as well, as MAC addresses aren't changed, and most people don't know how to spoof them.
There are other ways law enforcement tracks and monitors individuals they might think are doing things that are illegal, but I won't get into those as I could find myself in hot water.
The MAC is useless if whoever your trying to track can download a program, enter a few numbers, and click a button. Correct me if I'm wrong but, just because you can SEE the data doesn't mean you know what it is. AFAIK Tor encrypts traffic, and uses any number of nodes before connecting to the actual endpoint. Doesn't this mean that you can see the data leave your network on the way to the first node, then see the data to your network from a node on the return trip, but not know what it is?
post #20 of 81
Please do not discuss the circumvention of any network security. This includes the discussion of using software such as Tor to circumvent any security or filtering such as those used by schools and workplaces.
TudjBox.
(16 items)
 
  
CPUMotherboardGraphicsRAM
Intel i5 2500k Asus P8Z68V Gen3 PRO Sapphire Radeon HD7970 Corsair Vengeance 1866 
Hard DriveHard DriveOptical DriveCooling
OCZ Vertex II Samsung F3 1TB Sony DVD-RW Thermalright Silver Arrow 
OSMonitorKeyboardPower
Windows 7 x64 iiyama ProLite 24" 16:9 Filco Ninja Majestouch-2 Corsair HX620 
CaseMouseMouse PadAudio
Antec P182 G5 SteelSeries Cambridge Audio DAC Magic 
  hide details  
Reply
TudjBox.
(16 items)
 
  
CPUMotherboardGraphicsRAM
Intel i5 2500k Asus P8Z68V Gen3 PRO Sapphire Radeon HD7970 Corsair Vengeance 1866 
Hard DriveHard DriveOptical DriveCooling
OCZ Vertex II Samsung F3 1TB Sony DVD-RW Thermalright Silver Arrow 
OSMonitorKeyboardPower
Windows 7 x64 iiyama ProLite 24" 16:9 Filco Ninja Majestouch-2 Corsair HX620 
CaseMouseMouse PadAudio
Antec P182 G5 SteelSeries Cambridge Audio DAC Magic 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Software News
Overclock.net › Forums › Industry News › Software News › [TR] Uncensored/Anonymous Web Browser TOR Released! (DOWNLOAD LINK)