[ home / overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / lgbt / R9K / dead ] [ meta ]

/leftypol/ - Leftist Politically Incorrect

"The anons of the past have only shitposted on the Internets about the world, in various ways. The point, however, is to change it."
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble


File: 1627490114789-0.png ( 62.47 KB , 1200x725 , 1200px-tor-logo-2011-flat.….png )

File: 1627490114789-1.png ( 909.59 KB , 1250x1000 , 529.png )

 No.407274[Last 50 Posts]

Hi /leftypol/
There's been talk recently about US intelligence agencies (CIA,FBI,NSA etc) spying and conducting astroturfing operations on various websites including Twitter, 4Chan, Reddit and obviously here /leftypol/.

I would like to remind everyone that you can use tor to browse this site (and other sites) anonymously, for newcomers it's very easy to use, just download it from here (https://www.torproject.org/) install it, open it and click connect.
There are mobile apps too:
Android:https://play.google.com/store/apps/details?id=org.torproject.torbrowser
IOS:https://apps.apple.com/mx/app/onion-browser/id519296448

After installing it use the Onion Link for leftypol.org:
http://wz6bnwwtwckltvkvji6vvgmjrfspr3lstz66rusvtczhsgvwdcixgbyd.onion

You don't even have to remember this address, you can configure tor to do the translation from regular sites (non-onion links) to onion links, so you only have to type "leftypol.org" and it will redirect you to the .onion link
>Open tor
>Hamburger Menu (Right Upper Corner)
>Options
>Privacy & Security
>Onion Services-> Always

You can use the site normally, post images and such.

Posting this here instead of /meta/ because almost no one reads /meta/, if mods want they can move the thread, but I think it should stay here at least for some hours.

STAY SAFE!
>>

 No.407276

Ask jannies to pin this.
>>

 No.407281

Thanks this is great info OP, downloading the tor app rn.
Also, can you recommend any good VPNs?
And any recommendations for alternatives to Google keyboard on Android?

I'm not great with tech, so any other advice on improving security and privacy on Android would be appreciated.
>>

 No.407286

No.
>>

 No.407298

>You don't even have to remember this address, you can configure tor to do the translation from regular sites (non-onion links) to onion links, so you only have to type "leftypol.org" and it will redirect you to the .onion link
Thanks for this tidbit, already had tor downloaded but the onion links were intimidating for this techlet. Also didn't know about the mobile apps. Thanks OP.
I've seen people claim that tor is compromised by the feds or something, I guess this is bs?
>>

 No.407302

File: 1627491102098.png ( 36.73 KB , 700x500 , mystery glow.png )

>not rawdogging the internet
Come on, it really hurts the user experience. Nothing loads as fast, so it's hard to get those doubles you all like so much, and you might get confused for people transmitting CP. I also heard that the feds have compromised TOR so if anything you will be drawing more attention to yourself.
>>

 No.407303

File: 1627491114365.png ( 26.1 KB , 1366x537 , lefty.PNG )

For some reason this is happening rn.
If typing the address directly fails you can use duckduckgo and search for leftypol and if you have onion services activated it will redirect you to the .onion site.

Or use the .onion link directly, just paste it into a notepad save and use when necessary.
>>

 No.407313

Shameless bump for visibility.
>>

 No.407331

>>407298
Even if tor is compromised (they seem to solve issues rather fast, but the possibility is always there) it's still much better than using raw clearnet.
>>

 No.407333

File: 1627492763968.png ( 1.2 MB , 900x900 , 1872304725230572.png )

>not bookmarking the .onion address like you would in any other browser
>>

 No.407338

>tor will save me from the van
It won’t. Just don’t say anything incriminating at all online
>>

 No.407343

>>407338
>don’t say anything incriminating at all online
didn't you once talk about 3D printing guns on leftybritpol
>>

 No.407344

>>407333
>using bookmarks, not relying exclusively on search engines to navigate the internet
boomer detected, the future is now and it's tech illiterate
>>407338
Well that sucks since I'd only use tor to post incriminating things on leftypol
>>

 No.407363

>>407298
>I've seen people claim that tor is compromised by the feds or something, I guess this is bs?
>>407331
>Even if tor is compromised (they seem to solve issues rather fast, but the possibility is always there) it's still much better than using raw clearnet.

Well, there's this. Judge for yourself.
https://restoreprivacy.com/tor/
<2017 court case proves FBI can de-anonymize Tor users
<Tor developers are cooperating with US government agencies
<When you use Tor, you stand out like a glow stick
<Anybody can operate Tor nodes and collect your data and IP address
<Are governments running Tor nodes for bulk data collection?
<Malicious Tor nodes do exist
<No warrant necessary to spy on Tor users
<Tor was created by the US government (for a reason)
<Tor is funded by the US government
<When you use Tor, you help the US government do spooky stuff
<IP address leaks when using Tor
<Using Tor can make you a target
>>

 No.407364

>>407333
It's even possible to have bookmarks on tor? I thought it deleted everything after you close it.
>>

 No.407368

>>407363
Still better than using clearnet.
Stay mad CIA.
>>

 No.407370

>>407343
I said it was justifiable not that I was planning to do it.
>>

 No.407371

>>407368
>using a bad tool is better than using no tool
The article (and plenty of other people) advise using a (good) VPN to mask traffic. And there are reasons laid out in that article why using Tor may actually be worse than the clearnet because on Tor there's less noise to sort through (people don't normally use it for pointless internet browsing).
>>

 No.407376

Another liberating thing about taking the grill pill is the realization how little glowuighurs actually matter. Oh wow, congratz agent Smith, you've convinced twitter liberals and redditors that already follow CNN religiously that Cuba bad, wow! Its totally not like you have 100% direct control over all media like you showed us with the Iraq war. And what is this? You are wasting your time trying to turn some random fringe leftists with zero real world power against China? Oh, please, take your time sir. Waste the budget to your hearts content.
>>

 No.407377

>>407371
Most VPN's are not safe, they keep logs and will give them to the CIA if they ask.
Use common sense, I think tor is enough to hide yourself on /leftypol/, especially if more people uses it.

Now if you're going to plant bombs somewhere, well, I don't think tor is enough.
>>

 No.407378

>>407274
how is tor making me slightly more anonymous gonna save us from glowies astroturfing this place up?
And you shouldn't post anything sensitive on the net even with tor, the entire thing is glowie territory.
>>

 No.407401

>>407274
>>407298
>You don't even have to remember this address, you can configure tor to do the translation from regular sites (non-onion links) to onion links, so you only have to type "leftypol.org" and it will redirect you to the .onion link
Many sites, including leftypol, inform Tor browser about the onion version of the site through "onion-location" response header. Tor browser then shows you a button for the onion domain in the URL bar. So you don't have to even know about onion domain existing beforehand, Tor browser will automatically tell you about it.
>>

 No.407407

Reminder that VPNs are a scam and most Tor FUD is from VPN salesmen.
>>

 No.407414

>>407303
Ctrl+Shift+L = new Tor circuit

This is happening because leftypol is unfortunately using CloudFlare which often blocks Tor. CloudFlare is effectively a MITM attack btw.
>>

 No.407418

>>407364
Bookmarks are not deleted because they can't be used to fingerprint you, they're safe to use.
>>

 No.407433

>>407371
Lol, VPN is not much better than "hiding" behind your IPS, it's just one more layer. Tor is different because it is designed from the start to dissociate your entry and exit from each other, which requires minimally 3 hops while the connection is encrypted in such a way that the nodes themselves only know about the previous and next node, but not the whole route.
>>

 No.407437

>>407371
I don't consider tor to be bad per se, imperfect yeah of course, but not "bad", clearnet is just begging to be spied on.

At least with tor you get some protection.
>>

 No.407442

>>407364
>>407418 (me)
I should clarify: bookmarks CAN be used to track you but ONLY IF you're bookmarking URLs that contain session ids or similar shit. So if you're saving some long ass URL with some weird numbers or hashes then be sure to sanitize it before bookmarking it.
>>

 No.407444

>Had Kim used a bridge or VPN before accessing the Tor network, he probably would have gotten away with it

Tor now comes with obfs4 meekazure and snowflake bridges on top of allowing you to request bridges from the torproject, connecting with proxies, using tor from a virtual machine and firewall config. Isn't this a non-issue? Or do you still need a VPN for an extra layer of anonymity? Because I don't think I can afford one, or want one because I'm not under burger jurisdiction.
>>

 No.407447

The funniest thing about Tor to me is that feds absolutely use it all the time, but they can't afford to actually compromise the network to catch anyone, because it would fuck all of them over as well.
>>

 No.407451

>>407437
Internet in general spies on you, this should be taken for granted, always.

The difference between clearnet and Tor is like walking in the city with CCTV cameras either naked or disguised in a way that you have no distinct features and the ones you do show are the same as all other Tor users. So the cameras know you're a Tor user but they don't know who you are and they have hard time distinguishing between different Tor users because you all look the same. It's anonymity through uniformity.

Now of course a user can easily give himself away if he doesn't understand how Tor works. If you login into your regular Facebook account over Tor and think Facebook doesn't know who you are then you're a retard.
>>

 No.407457

>>407447
What's even funnier is that you have different glowie agencies that are sabotaging and competing with each other, often times without any awareness because of a lack of transparency between each other. Glowies are not as homogeneous as people might think and they can be as blind to the big picture as an individual capitalist is.
>>

 No.407472

>>407435
Why the fuck is tor not on FDroid already? Like Jesus…
>>

 No.407478

>>407444
What you're missing is your physical location. If you want to go all the way then don't connect from your home and spoof the MAC address of your network card. Many people got caught because of ignoring this.
Another thing, be consistent with your time schedule. If you connect spontaneously whenever you feel like then your time zone can be guessed. Now add power outages or things like that, and they can narrow down your possible locations further.
>>

 No.407507

Bump.
>>

 No.407517

So if I'm fucked either way and I'm not doing anything illegal, there is no point in me being paranoid, right?
>>

 No.407520

>>407517
Even if I was just shitposting here I would feel better knowing that glowies can't spy on me, but at the end
of the day it's up to you.
>>

 No.407587

>>407517
Personally I just feel more relaxed if I know glowies will take ages to decrypt all the layers, gather all the relay and server logs, connect all the dots and tie every little data point back to me.
Or I could just hand them everything on a platter right now by using clearnet lol.
>>

 No.407642

>>407433
I know how Tor works. Consider reading the article >>407363 instead of repeating talking points. The issue is how the Tor nodes can be and have been compromised and the evidence of law enforcement and spy agencies snooping Tor and being able to crack it.

>>407437
It's more like are you worried about corporations spying on you to do marketing and your data going in a fuckhuge pile that spy agencies have to then sift through or do you want your activities to have a "this is suspicious" beacon attached to them from the start, and the system probably feeding much more specific personal data directly to the feds.

>>407451
This is only accounting for the above-board data collection we know exists on the clearnet. The issue is there is reason to believe Tor is compromised too, but much more directly by authorities. The question isn't whether you're going on a list, but moreso how short that list is.
>>

 No.407645

>>407517
feds will break into your house and install a hard drive full of CP on your computer if they want to
worrying about incrimination is a meme
avoid doing things that make you a target or a threat, not things they could use to "get you" because even if you give them those, they will probably still make shit up to nail your ass to the wall
>>

 No.407650

Is tor more secure if I live in a Non-NATO country?
>>

 No.407710

>>407650
Depends on the country. If the use of Tor by itself could get you into conflict with your own government then use a bridge to connect to Tor.
As for NATO glowies themselves, they want you to use Tor, for them you're a potential """opposition""" to your government lol. Which is why Western social media and MSM have their own onion domains now, like Facebook or BBC, it's intended for brainwashing people from non-NATO countries.
>>

 No.407717

File: 1627506824322.jpg ( 269.26 KB , 1920x1080 , hoxha fbi.jpg )

>using technology that is literally funded by the cia to own the cia
big thonk moment
>>

 No.407719

>>407717
Then what's the best course of action? Everyone is shitting on tor but they don't offer alternatives besides shutting down your internet.
>>

 No.407725

>>407719
the alternative is not talking about illegal shit online or on the phone
>>

 No.407730

>>407725
No one here is going to talk about illegal shit (I hope no one is that retarded) I just want to browse some sites like this one without the admins giving my entire info to the glowies.
>>

 No.407742

>>407719
bruh they can track you based on things like how quickly your PC renders a page and the resolution of your browser window
assume they have everything
but also, because they get everything in a dragnet they don't really have the ability to sift through most things
your personal shit will just sit in a file until you do enough things IRL or online that flags you for investigation, and then they will look through your shit to see if you need to be looked at more closely
usually this is a pretty high threshold
>>

 No.407760

How likely is it that some of the PDFs shared here are glowed?
>>

 No.407771

>>407725
Leftism isn't illegal ding dong. Doesn't mean it isn't persecuted and monitored by other means.
>>

 No.407923

>>407642
>>407363
>https://restoreprivacy.com/tor/
The article is right that Tor is not a silver bullet, but only retards claim that. You still need a good OPSEC. The user's stupidity is by far the biggest vulnerability. As for issues listed in the article, none of them are fatal and most of them are not even related to Tor itself.

>1. Tor is compromised (and not anonymous)

>effectively by watching communications as they enter and exit the Tor system, rather than trying to follow them inside.
This is a time-based attack where you correlate the existence of traffic through time at guard nodes and exit nodes. However that requires a very long term tracking of all connections going to all guard nodes and leaving all exit nodes in order to achieve statistically confident enough time-related matches. It's theoretically possible (just like decrypting any encryption is) but too expensive to be done en masse in practice.
>One type of attack, for example, would identify users by minute differences in the clock times on their computers.
This only works if your system clock is widely out of skew. If your system uses a proper time sync (and most do these days) then identification is practically impossible. Note a couple of things: Tor converts everyone's system time to UTC, your clock doesn't have a consistent enough skew, and even then that would only allow glowies to tie all your connections to one person (or rather machine), but who this person is is still unknown.
>Carnegie Mellon University
Yes, this is an old story and they used the timing attack I've described above. IIRC the attack was used on a limited sample, it was a proof of concept in a lab setting, not applied in the wild where the network is much larger.
>honeypot scheme
Attacks the vulnerabilities in the browser, not Tor network.

>2. Tor developers are cooperating with US government agencies

Never, absolutely never trust a tool because "ourguy" developed it. Do not trust anything, operate AS IF everyone is out to get you or betray you. Do not have faith, do not be a believer, rely only on the technical side of things. If there is a technical vulnerability, it doesn't matter who made the tool, their intentions won't save you. This is basic OPSEC. But all that conversely means that even a tool developed by your enemy can be used for your own purpose if it's a good tool.
(Personally, I think Torproject team are idealistic libtards with good intentions, they effectively "sell" their tool to glowies in order to get the money to keep the project going while offering the tool for free to the rest of the world. The source code is open for all the see, I've contributed some bug fixes myself as an outsider. But my point above is that their intentions are irrelevant anyway.)

>3. When you use Tor, you stand out like a glow stick

Again, OPSEC. Kim was a retard, don't shit where you sleep. It's something to be aware of but not a serious problem at all. It was the setting itself that was wrong not the tool. Just by going to a nearby Internet cafe instead of doing it literally from his own dorm room he would probably get away with it. Of course he could also take further measures to make this probability even higher. No reason to limit yourself.

>4. Anybody can operate Tor nodes and collect your data and IP address

Now this is just getting more and more ridiculous.
Only entry node knows your IP while your data is at that point 3+ times encrypted (4 times if you use HTTPS, or more if you're smart enough to further encrypt sensitive messages with PGP). Furthermore you can use bridges to hide your IP from the entry node as well as hide the fact that you're using Tor (obfuscation proxies). Not all of them are public knowledge. You can run unofficial ones as well.
Only exit node can see your data, but only if you connect over HTTP. It's up to users to pay attention to what they're doing. Again, use PGP if you want to hide your messages. And just general OPSEC to reduce your metadata fingerprint.
Which just leads to me to repeat the same basic principle again: never rely on trust, act as if all Tor nodes are compromised.

>5. Malicious Tor nodes do exist

See 4.

>6. No warrant necessary to spy on Tor users

Again, another variation of the same principle. Don't rely on the benevolence and legality of your government's actions. Don't rely on the law. Faith in your government is the stupidest thing ever.

>7. Tor was created by the US government (for a reason)

Glowies use it to stay anonymous when investigating or inflitrating, they don't want their IPs to say "hey, I'm connecting from a police department". See also 2.

>8. Tor is funded by the US government

See 2 and 7.

>9. When you use Tor, you help the US government do spooky stuff

"When glowies fund Tor project they help rushun hackers do spooky stuff. Why doesn't burger congress know about this???" Anonymity through mass uniformity, the more the merrier, that's a basic design principle of Tor. Btw, the structure of this criticism is ethical consumerism.

>10. IP address leaks when using Tor

Browser vulnerabilities, not Tor network's problem. Disable JS, don't use extensions, use Whonix(!!!), etc.
And if you're poking the hornet's nest then for god's sake do not do it where you sleep. Leave your home, connect from a different IP, spoof your MAC address, have a consistent schedule, use a dedicated or a throwaway machine, etc.

>11. Using Tor can make you a target

No shit, everybody is already a target. Using Tor won't make you into a high priority target unless you anger the glowie. There are also ways to hide that you're using Tor, none of them perfect ofc, but it's possible to add some layers of cloak with bridges or other type of proxies.

I'll admit the article could actually serve as a very good intro for Tor users IF it properly explained why Tor by itself is not a full solution. Instead it does the opposite and tries to convince you that Tor by itself is the source of all problems.
>>

 No.407932

>>407923
Good effortpost CIA hates this guy.
>>

 No.407936

File: 1627513911193.jpg ( 75.68 KB , 1920x1200 , bbb43c4ef9f2aacdc7691485fa….jpg )

If I've always accessed and posted on leftypol via clearnet, but I start using Tor today, what difference does it really make? The glowies already know and have proof that I use this site, and even if I start covering my tracks now it won't change all the evidence that I've left in the past. This is why I'm hesitant to use Tor/VPN/Linux etc etc because I'm not really sure if it matters at this point.
>>

 No.407939

File: 1627514094463.png ( 376.16 KB , 800x892 , Operation_Trojan_Shield_Se….png )

>The ANOM (also stylized as AN0M or ΛNØM) sting operation (known as Operation Trojan Shield or Operation Ironside) is a collaboration by law enforcement agencies from several countries, running between 2018 and 2021, that intercepted millions of messages sent through the supposedly secure smartphone-based messaging app ANOM. The ANOM service was widely used by criminals, but instead of providing secure communication, it was actually a trojan horse covertly distributed by the United States Federal Bureau of Investigation (FBI) and the Australian Federal Police (AFP), enabling them to monitor all communications. Through collaboration with other law enforcement agencies worldwide, the operation resulted in the arrest of over 800 suspects allegedly involved in criminal activity, in 16 countries. Among the arrested people were alleged members of Australian-based Italian mafia, Albanian organised crime, outlaw motorcycle clubs, drug syndicates and other organised crime groups.
>>

 No.407989

>>407939
>be duped by sheer branding
Idiots, but they're not an exception.
>>

 No.408030

>>407936
>The glowies already know and have proof that I use this site, and even if I start covering my tracks now it won't change all the evidence that I've left in the past.
Past data is not everything, they can't intervene in the past. It helps them construct a predictive model but over time this model is going to have an increasingly abstract relationship to the present, not to mention that old data points are going to become more and more obsolete through time as your habits and plans change.

Use Linux because it's more user friendly. That's a good enough reason.
>>

 No.408123

>>

 No.408143

Reminder that, as has already been said but is worth reiterating one thousand times, the glowies needed to give Tor to the world so that they can stay anonymous, otherwise it's Tsr - The Spooks' Routing. I'm not saying that it's guaranteed to be perfect, trust nothing like that, but it's not a botnet.
>>407303
clownflare sucks
>>407742
Tor Browser tries to take into account these fingerprinting techniques

tips: don't change the size of Tor browser's window or install any add-ons. If your traffic looks exactly like any other tor browser and you share no identifying information then you have a chance at staying anonymous. If you need to use an account over tor, try to create it over tor and only ever sign in over tor.
>>

 No.408146

I feel like my trail and digital finger print are so large that now it's literally pointless. Convince me why I should do this.
>>

 No.408155

>>408146
Will your views change?
>>

 No.408157

>>408123
based whonix poster
>>

 No.408159

>>407936
>Linux
Try that regardless unless you have a special need for another OS. It's literally just better.

Corporate surveillance is a bigger issue for me than glowies. I avoid google/facebook/amazon stalking.
>>

 No.408162

>>407303
>just paste it into a notepad save and use when necessary.
<what are bookmarks
>>

 No.408166

>>407923
Also, I think the time-based attack on exit nodes doesn't work on .onion domains like leftypol because no exit nodes are required
>>

 No.408179

>>408123
What is this whonix? I'm downloading it but it's just a .ova file and I don't even know what the fuck this is.
>>

 No.408182

>>

 No.408183

>>408179
Have you used a Virtual Machine before? Basically runs an operating system inside your operating system.
>>

 No.408185

How do I get rid of the weird dead space around the website in the TOR browser?
>>

 No.408186

>>408185
Resize to the edge of that dead space. It basically rounds the window to the nearest (100px?) to reduce the chance of your browser size being unique.
>>

 No.408187

>>408183
Yes I've used them before, but how I'm supposed to run this? I use VMware Workstation, can I open this .ova with that and be safe?
>>

 No.408190

>>408186
>resize
Yeah, but how?
>>

 No.408193

>>408187
Should be fine, I guess. I don't use VMware (Virtualbox 4 me) but they have a documentation page on it:
https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.html.hostclient.doc/GUID-8ABDB2E1-DDBF-40E3-8ED6-DC857783E3E3.html
>>

 No.408197

>>408190
Grab the bottom right corner of the window and drag.
>>

 No.408203

>>408197
Oh, you mean with the browser not maximised? That's going to trigger my autism.
>>

 No.408207

>>408203
Yeah, did it give you a warning when you maximized? It's against recommended advice.
>>

 No.408208

>>408207
Nope, it opened that way.
>>

 No.408211

>>408179
the security nerds in the matrix chat I am in tell me that while tor browser is the only way to have a chance at anonymity, the browser itself is firefox which apparently has really bad security compared to chromium. whonix uses a hardened fork of Debian that routes all traffic through another simultaneous VM which routes everything through tor. no dns leaks or script kiddies can interfere. your computer is pinging things all the time, whonix can only ping tor network and does things like obscure your typing speed out of the box.
it's overkill but once you get it working it's like taking an extra minute to open up tor browser for much more security and privacy
>>408185
you don't unless you want to be fingerprinted. it adjusts automatically to the nearest 100 pixels in the hope that someone else is also using the same don't even change the size of the window
>>408187
i would use cringe virtualbox or based kvm
>>

 No.408215

Can I still use extensions such as adblock or is that some kind of security risk?
>>

 No.408222

>>408215
tor dev says
>uBlock origin is great for blocking ads and making the web faster. I use it in Firefox and most of the time in Tor Browser. However, using it will add to your fingerprint because now you are blocking ads … unlike most Tor Browser users. Tails does include uBlock origin by default, but you will not be able to blend in with this group of people unless you are also using Tails. If you are fine with being more easily fingerprintable*, then perhaps uBlock origin is fine.
http://tv54samlti22655ohq3oaswm64cwf7ulp6wzkjcvdla2hagqcu7uokid.onion/posts/about-to-use-SkxEFK1m/

i wouldn't use it if you want anonymity, not until they add it to stock tor browser
every extension you add makes your traffic that much more unique
'safer' security setting seems to block many ads, and if you use privacy front-ends for popular websites you can often avoid them completely
>>

 No.408226

>>408211
>the browser itself is firefox which apparently has really bad security compared to chromium
Somewhat right. It's always more complex than 'good vs bad', but there are many things Chromium does better security-wise. I think 'really bad' is exaggerating.
https://madaidans-insecurities.github.io/firefox-chromium.html
That article is from someone who actually contributes to Whonix, by the way. Skim over a few pages, it's good.
Also useful (reference from the bottom of that article):
https://medium.com/@thegrugq/tor-and-its-discontents-ef5164845908

t. I use Firefox and Tor daily. I use them for privacy and anonymity, not fighting tailored access operations.
>>

 No.408238

>>408211
And using whonix as a guest VM on windows 10 (already a NSA spying OS) is actually safe?
>>

 No.408254

>>408226
yeah madaidan is in the whonix and graphenos help chats. they shit on linux firefox extra hard, but they also have much higher standards than most people who aren't literally edward snowden need.
still, whonix just werqs ezpz so i use it
>>408238
in windows, yes using whonix is probably significantly more private than not using it, as everything in the whonix workstation is routed through tor, but idk really, I hardly use keylogger OS and I try to turn off internet if I do
whonix' documentation takes a steaming dump on windows
http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Host_Operating_System_Selection
>>

 No.408259

>>408238
Define 'safe'.
All advice is pretty silly without knowing you threat model. Who are you trying to protect yourself from? Site admins? Google? Your mom? National signals agency passive surveillance? A targeted criminal attack? A bear?
>>

 No.408290

File: 1627526165638.png ( 253.65 KB , 800x450 , ClipboardImage.png )

>>407363
Lol that website glows so hard

Whats with all the
>You don't need opsec silly goose! That's just for neeeeerds! You are a manly man and stand behind your actions!
>Use a VPN instead tee hee!
that crawl out every time Tor is mentioned?

>>408215
Using extensions will make your browser fingerprint much more unique, that said, you can keep separate tor-browser installs and leave one default. Obviously, just like with the clearnet browser you never crosslink, use the same logins or do anything that would correlate between them.

The creature comforts install for everyday stuff and the default install you use to plot a US capitol raid or to write mean, literally violence ,democracy threatening tweets to AOC.
>>

 No.408305

>>408259
i think they meant private, which seems a lot less clear to me concerning models because it's passive. i think all you can do is choose privacy-respecting tools and services
>>408290
state department FUD to discourage usage of tor
>>

 No.408306

>>408290
>crosslink
Haven't heard of that one. What do you mean?
>>

 No.408322

>>408305
>which seems a lot less clear to me concerning models because it's passive
Private from Google? Private from your ISP and government passively tracking? These have different solutions. The smaller your threat model, the less sacrifices you'll have to consider making. It's not worth going full /tech/ if you're just wanting to stop creepy Facebook ads and corporate survveilance.
>>

 No.408337

>>408306
You follow a link that blocks you for your location.
Your IP is not allowed any more free content.
You copy the address and paste on your already open tor-browser session.
You'd like to quote something on your Tor session post but you got the relevant content in a clearnet bookmark/feed.
You open the clearnet bookmark and copy it to your tor-browser post.
You made this cool meme/infographic and shared it on one identity claiming authorship and now you go and post it on the other.
>>

 No.408347

>>408337
Is copying https links from Tor to a clearnet browser safe?
>>

 No.408349

>>408347
>Is copying https links from Tor to a clearnet browser safe?
It's just like viewing them in the normal browser to start with. What are you concerned about?
>>

 No.408353

>>408347
You'd want to examine the URL and make sure it doesn't have any tracking identifiers like fbcid or whatever twitter uses etc etc

If you know what you're doing and paste it into a text editor to examine and possibly fix it first then maybe but just cutting and pasting is probably unwise and there may be timing attacks and screen size detection attacks that are possible but I haven't thought that through just throwing it out there as a possibility
>>

 No.408361

>>408353
This is a good point. Take a look at the whole link, things you don't understand shouldn't be trusted, especially ones that look like it's information about you (language, browser) rather than the page contents. Stuff after a '?' are options, and are often optional.
>>

 No.408376

>>408322
maybe I am a bad user, but I don't actually know who would find my DNS leaked IP address, and I'm not sure that dealing with that would be any different based on who is looking. this seems different from a security threat model where you make essential assumptions about your attacker and their capabilities. so the privacy threat model flowchart for me is basically 1) can I stop using certain products (google, microsoft etc) 2.A) do I want to hide my IP address while browsing, and 2.B) do I care enough to set up whonix 3) can I do basic opsec. I wonder what could be added to these steps
>>408361
>>408353
seems like there should be offline link cleaners for this reason. like offline ClearURLs
>>

 No.408762

If I make multiple posts on leftypol in one browsing session, does that leak information that all those posts are by one person?
>>

 No.408767

>>408762
assuming that you are still using tor it would all appear as the dedicated tor IP. The only way people could peice together what posts were from the same poster is through things like writing style, images and the timing of your posts
>>

 No.408771

>>408767
>>408768
What about the leftypol admins? I'm not accusing this place of being a honeypot, but hypothetically if it is, can they piece together our posts?
>>

 No.408777

File: 1627545832736.jpg ( 93.55 KB , 499x500 , 1627435287551.jpg )

>>408771
Even if they could piece together posts it wouldn't be any more effective that being able to learn typing habits via just regular anons on here. The amount of data is immeasurable, tbh. Everyone looks the same over the tor node: Everyone has an ip address of 127.0.0.1.
>>

 No.408789

>>408777
>>408785
Does leftypol have cookies that track users, even over Tor?
>>

 No.408791

>>408777
>Everyone has an ip address of 127.0.0.1.
The leftypol mods assigned tor addresses as the localhost address?
>>

 No.408793

>>408789
Idk but tor browser deletes cookies when u end session, can also hit 'new identity'
>>

 No.408794

>>408771
>>408785
As far as I am aware, the only information visible to any leftypol staff of a given poster is their specific IP address. Posting habits is the only way we would know if you are using TOR, since it uses the same address.
>>408789
I will ask the admins but I don't think so.
>>

 No.408800

>>408791
No tor assigns tor addresses as the localhost IP.
>>

 No.408802

The only vunerability that exists with tor is a birds eye view of the whole internet which ISP's have, but, that still can't de anon actual users. Only servers which it doesn't matter for us because our server is also available over the clear net.
>>

 No.408804

>>407281
There are no good VPNs. Get a web server and forward all traffic you use over your server via ssh. Or, use lokinet.
>>

 No.408806

>>407303
Leftypol blocks exit nodes. You must connect over the tor node. This is for security as exit nodes are notoriously compromised.
>>

 No.408807

>>408800
? If you visit https://browserleaks.com/ip on tor you will find the IP address of your exit node
>>

 No.408809

File: 1627547563060.jpg ( 63.54 KB , 768x1024 , 1626808578111.jpg )

>>407363
This anon is a fucking idiot. Again, more retards who don't know the difference between exit nodes and onion nodes.

>2017 - A vunerability was found in an outdated issue of firefox which the tor browser is based off of which retards going to CP sites were using. That is how the first crack happened. Still not actually anything wrong with the tor network itself.


>Tor devs cooperate with the FBI


Bullshit, lies and slander.

>When you use tor your stand out.

Unless you use a bridge, or, a VPS.

>Anyone can operate tor nodes

Anyone can operate anything. Learn how to identify honey pots and avoid them.
Furthermore, this makes zero fucking sense because, again, all ip's are 127.0.0.1 over a tor node/onion link and all data has been encrypted to that point. So no, they can't just "collect your data from your ip address" Even over exit nodes they still need access to your host machine and the exit node you are traveling to to identify you.

>Mallicious tor nodes exist


Irrelevant for reasons stated above

>No warrant neccesary to spy on tor users.


Other than being an out right lie it still doesn't even matter because you can't see what is going on.

>Tor was created by the USG


Who gives a shit. The internet was created by the USG

>Tor is funded by the USG


Yeah cause it works. It's funded by many people.

>When you use tor you help the USG

False, when you use tor you help people like us.

>IP's leak over tor

False, not if you know what you are doing or are using the TOR browser.

>Using tor can make you a target


So can being a communist.

Kill yourself CIA uyghur
>>

 No.408810

>>407418
I mean, they are safe as long as you use full disk encryption.
>>

 No.408812

>>408807
leftypol doesn't use exit nodes. This is what I am talking about. None of you understand what you are talking about.

You literally cannot access the site over an exit node. Furthermore, do you mean it will expose your IP? Cause your exit nodes IP is not your real IP?
>>

 No.408826

I think mods should make this thread a sticky, very good info and security tips.
>>

 No.408828

>>408812
I am tired and I forgot we were talking about leftypol the onion address. Interesting that it shows up as localhost, according to the one post. Yes it never leaves tor network, neither visitor nor site know each other's IP, etc. I believe the site and visitor 'meet' at some random tor server and it makes sense that tor network wouldn't differentiate between these for users or admins.
>>

 No.408858

>>408810
That's a different area of security. Tor helps with the Internet side of things. If you want (or need) to prevent physical access then other measures must be taken like FDE. It all depends on your threat model. If you think glowies won't be bursting into your room but want to hide from Internet surveillance then FDE is not necessary - although it's still a good thing to do just to be future-proof, considering it has very low impact on usability anyway.
>>

 No.408867

>>408789
Just assume every site tracks you, don't rely on trust. Compartmentalize your browsing across different sessions. That's what Tor browser's "New Identity" (Ctrl+Shift+U) is for. Make frequent use of it!

To explain the principle of compartmentalization further: whenever you browse the Internet in one browsing session, consider that as one single identity. If you now want to do something that shouldn't be tied to this identity, then reset the browsing session via "New Identity" function.

For example, I never mix browsing leftypol and local sites from my own country in one browsing session. Same goes for my hobbies - one hobby per session, nothing else in that session. That way cross-site trackers can't form a holistic profile.
>>

 No.408925

Is this book a good manual or is it out of date? I read the first few chapters but I'm a lazy indecisive cunt so I didn't continue
>>

 No.408986

>>408925
Idk, I took a glance and it seems like he gives advice without explaining the reasoning behind it, he doesn't talk much about the technicalities either. It probably contains some good tips, but don't follow it blindly without knowing why you're doing something and what it actually does.

The proper foundation for mastering any tool is a technical understanding of how it works from inside out, and why it does so - this in turn requires also understanding the technical capabilities of your adversary from inside out. Most of what I learned about Tor and OPSEC comes from a kinda of deliberate exercise in paranoia, mentally larping as a high priority target to get an idea of how surveillance works technically and how Tor network + Tor browser attempt to defend against it. I also learned a lot from their bug tracker over the years and generally following their development, so I'm aware of many ways Tor browser in particular is still not perfect. Unfortunately there's no neat overview of the current state out there, but this is a good starting point:
https://2019.www.torproject.org/docs/documentation
Here is a list of current bug reports about fingerprint issues in Tor browser:
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues?label_name%5B%5D=Fingerprinting


For general OPSEC there is a lot of good stuff out there, just search the web. I recommend reading Grugq's case studies of why people got caught and what they could've done to avoid it. Since Kim has been mentioned in this thread, here's Grugq's analysis of the case:
https://grugq.github.io/blog/2013/12/21/in-search-of-opsec-magic-sauce/
>>

 No.408997

>>407274
tor has been breached like 4 or 5 years ago
>>

 No.409027

>>408925
>>408986 (me)
Forgot to mention: there's a lot of good conference presentations on youtube. Studying gov/corporate surveillance and hacking has become a whole research field. Once an attack is out in the wild it is quickly analyzed and presented to the public. Which is why "0days" (vulnerabilities that nobody else discovered yet) are sold like gold to the highest bidder and usually become useless very quickly once they're deployed.

Tor project also has their own youtube channel where they present current development and future goals:
https://invidious.snopyta.org/channel/UCglZ5lXxOpxFF281h6WBj3g
>>

 No.409030

>>408997
Any claims not already addressed by >>407923 ?
>>

 No.409365

If I delete my google account,will all other accounts on other websites that are linked to be deleted alongside with it? Or do I have to manually delete everything individually?
>>

 No.409404

>>407274
>There's been talk recently about US intelligence agencies (CIA,FBI,NSA etc) spying and conducting astroturfing operations on various websites including Twitter, 4Chan, Reddit and obviously here /leftypol/.
There has been talk but has there been PROOF? What makes anyone think that leftypol is even remotely high profile enough for CIA or FBI? 8ch/pol went under the radar at least two murdering psychos posted their manifestos their IN ADVANCE and they were not stopped. Unless you want to argue that the Powers that Be (TM) were aware of this and chose not to act (no proof, again), you have to at least acknowledge that 8ch was a much larger site than leftypol is now
>>

 No.409410

>>409404
They do certainly conduct astroturfing operations here, the Cuba threads are proof of that.
>>

 No.409415

>>407298
Brave browser comes with inbuilt tor integration if you just want to click a button…god forbid you are using chrome.

>>407302
Also this comrade glowie. They have backdoors in everything. They've poured a ton of resources into cracking encryption networks, and many of these secure services are probably honypots to begin with.
>>

 No.409418

I do not run and hide like a coward. I stand and shitpost like a man. Let them snoop.
>>

 No.409429

>>409404
>There has been talk but has there been PROOF? What makes anyone think that leftypol is even remotely high profile enough for CIA or FBI? 8ch/pol went under the radar at least two murdering psychos posted their manifestos their IN ADVANCE and they were not stopped

It's a larp. Nobody commits any crimes on here, and our fabled revolution is roleplay fantasy. Feds primarily want to catch

1. High level drug dealers (so they can take their money and stuff)
2. CP traffickers (rightly so because it's gross)
3. Ebin haxxors (they can't because they're all in Russia and China)
4. Right wing retards/terrorists
5. Muslims (more out of fashion these days)
….
1000. /leftypol/ users

In that order
>>

 No.409437

>>409429
Ok fed.
>>

 No.409438

>>409429
Wrong I'm currently typing this message from a black site in Honolulu after our resident glowie got her hands on me.
>>

 No.409440

>>409404
>8ch/pol went under the radar
The FBI literally outted themselves as posting there
>>

 No.409453

>>409415
They've poured millions into cracking encryption

And they still can't do it. Just make sure you are using the most up today encryption algorithms.
>>

 No.409516

>>409453
Generally if they want to find a specific individual they can, probably because they made a mistake or doxxed themselves subtly and they used old fashioned detective work. Encrypting the data packets, proxying the network, etc, do not account for other types of fingerprinting . There are lots of different areas that need to be covered.

Tor isn't about just about encryption, it's about obscuring the destination of a network request by relaying it through a bunch of routers that reconstruct the data and forward it to another one without preserving a trace to the originating client.

Also the NSA hosts its own Tor Nodes, the entire concept of Tor relies on the assumption that the servers on the network can be trusted and what happens in it can't be tracked from outside networks past the exit nodes it hands the data off to at its endpoints. Tor is only secure for obscuring where the packet originated FROM its end destination. When tor nodes themselves have been compromised this is called a bad apple attack and it can get your IPs

Let it also be known that Onion routing was literally invented by military spooks to secure US Intelligence agencies network traffic in the 1990s.
Is this a cause of using the master's tools against them or are their known backdoors?

In theory all encryption is crackable unless it is irreversible one-way encryption. All useful encryption is designed to be decrypted at a secure destination but the very fact that it can be decrypted means that it can be cracked.
>>

 No.409522

>>409516
>obscuring the destination
obscuring the origin I meant

Unique IPs: 25

[Return][Catalog][Top][Home][Post a Reply]
Delete Post [ ]
[ home / overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / lgbt / R9K / dead ] [ meta ]
ReturnCatalogTopBottomHome