So im confused I installed Tor button and https everywhere yesterday after reading a similar thread on here Now im reading that dosnt do anything? Should i just go back to google crome? Im a spinal cord patient who uses cannibis for med reasons But i dont live in a legal state. I only grow for myself. I dont think they are worried about little ole me.
No Gypsy doesn't send you a tracking link. Others do
can provide numerous wide open connection opportunities to remotely check traceable communications.
I can receive line of sight wifi signals from a couple of miles away.
2.4GHz 16dBi Directional High Gain 16-Unit Antenna for Wifi/Wireless Network (with a "RP-SMA" connector.)
These are currently available from "DealExtreme"dotcom for (US) fifteen dollars and eighty cents delivered from Hong Kong...
Neweggdot has wifi repeaters starting about 25-30 dollars delivered.
Wardriving in a car for an open wifi signal across town with an open laptop searching is another classic ol' standby anonymity technique.
With remotely accessed Internet Service Provider signals through an open access router a
Good Information, thanks for sharing y'all.
IMB
Some food for thought:
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.
Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:
1. Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. Tor recommends you use Firefox with the Torbutton extension.
2. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. (How many tool-bars and add-ons do you have installed?) Some people prefer using two browsers (one for Tor, one for non-Tor browsing).
3. Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help protect any cookies you do not want to lose.
4. Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.
5. While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.
6. Tor tries to prevent attackers from learning what destinations you connect to. It doesn't prevent somebody watching your traffic from learning that you're using Tor. You can mitigate (but not fully resolve) the risk by using a Tor bridge relay rather than connecting directly to the public Tor network,
Keep in mind that Tor doesn't encrypt you info being sent to the vendor, only between you and the Tor network. Once it leaves Tor network, it is wide open and the gov already knows which servers to watch; USPS?
I hate to say it OldPork but Tor really does NOTHING to offer security in the manner you want/need. It is another instance of false security.
I did give you rep for bringing the topic up and making others aware. But in the end Tor does nothing for you except slow your PC down and falsely ease paranoia slightly for the unaware.
not to mention that the original creators of TOR were law enforcement that wanted to illegally dig into peoples privacy and didn't want to be traced doing it. most TOR nodes are LEO computers. for that reason alone i wouldn't use it. its so easy to configure firefox to use an elite proxy and have ALL of your connections to the internet encrypted it isn't even funny. spend 10 minutes on firefox's home page and figure it out. and if your super paranoid, you can get a program that changes your mac address just in case you don't trust your elite proxy, a bit unnecessary, but if it makes you feel better, than its worth it. there are also web sites that you can go to to check your proxy to see what info it is giving about you. install "noscript" onto firefox and you have even more protection for all the script programs that stealthily reveal your ip and whatnot even when using a proxie.
not to mention that the original creators of TOR were law enforcement that wanted to illegally dig into peoples privacy and didn't want to be traced doing it. most TOR nodes are LEO computers. for that reason alone i wouldn't use it. its so easy to configure firefox to use an elite proxy and have ALL of your connections to the internet encrypted it isn't even funny. spend 10 minutes on firefox's home page and figure it out. and if your super paranoid, you can get a program that changes your mac address just in case you don't trust your elite proxy, a bit unnecessary, but if it makes you feel better, than its worth it. there are also web sites that you can go to to check your proxy to see what info it is giving about you. install "noscript" onto firefox and you have even more protection for all the script programs that stealthily reveal your ip and whatnot even when using a proxie.
What!! Now im less safe with tor and am using leo computers. fck this!! im going back to chrome and not worrying about it.