Silk Road forums
Discussion => Security => Topic started by: painbow on December 01, 2012, 02:45 am
-
I guess my ISP won't be able to see my activities but they will know that I'm accessing Tor network rather frequently.
i'm not sure if it's a bad idea to browse SR from home.
-
I guess my ISP won't be able to see my activities but they will know that I'm accessing Tor network rather frequently.
i'm not sure if it's a bad idea to browse SR from home.
Not be rude but try searching the forum and doing some reading before starting threads which have be covered ad nauseam.
-
Unless your ISP is actively blocking connections to the Tor network (in which case you would need bridges), you have nothing to worry about.
-
You can do VPN ---> Tor so your ISP does not see the traffic since it's encrypted on your local machine and decrypted at the VPN provider (after being routed through your ISP).
-
Where the hell else are you going to use it? Cafe? Ha ha....
Tor it up, Tor it up... ;)
-
I couldn't even access tor project without using proxy. So my ISP has some issues with tor :)
-
download tor with obfsproxy, and even better make your own obfsproxy bridge and connect to it
now local spying won't matter. and yes, it does matter if your ISP can see you're using Tor, just ask Jeremy Hammond the lulzsec hax0r that ended up in prison because the FBI agents parked down the block triangulated his wireless signal and timed when he signed on to tor and when his nym popped in on Sabu's snitch IRC channel
-
You can do VPN ---> Tor so your ISP does not see the traffic since it's encrypted on your local machine and decrypted at the VPN provider (after being routed through your ISP).
Wouldn't the VPN provider be able to see my activities? or would it be all encrypted via Tor?
-
I just called my friend working at my ISP and asked if it's ok to have i2p & tor relays.
She told me no problem.
SO IMHO if your ISP doesn't mind you are ok to use Tor.. anyway its usage does not even prove you browse anything anonymously.
-
You can do VPN ---> Tor so your ISP does not see the traffic since it's encrypted on your local machine and decrypted at the VPN provider (after being routed through your ISP).
Wouldn't the VPN provider be able to see my activities? or would it be all encrypted via Tor?
They can see your real IP that way, but no, they can't see what you're doing over tor.
-
The only thing US ISP's care about when using TOR is that if you are running a bridge that is passing illegal traffic back and forth (torrents of copyrighted material, etc.). Just like everyone else said VPN then TOR if you want to be super safe. TOR on the go is good, hopping between cell networks, proxies, vpn's, and the TOR network.
-
So is using tor at home without any other protection going to cause a red flag at ISP? Not using wireless and not transferring any large files. I keep getting my internet connection dropped today.
-
download tor with obfsproxy, and even better make your own obfsproxy bridge and connect to it
now local spying won't matter. and yes, it does matter if your ISP can see you're using Tor, just ask Jeremy Hammond the lulzsec hax0r that ended up in prison because the FBI agents parked down the block triangulated his wireless signal and timed when he signed on to tor and when his nym popped in on Sabu's snitch IRC channel
Oh snap!
-
I guess I will be hooking up with a cable when doing SR
-
and yes, it does matter if your ISP can see you're using Tor, just ask Jeremy Hammond the lulzsec hax0r that ended up in prison because the FBI agents parked down the block triangulated his wireless signal and timed when he signed on to tor and when his nym popped in on Sabu's snitch IRC channel
It's not like they were going around pen tapping every Tor user until they found Hammond. They knew who to pen tap in the first place. If used properly, Tor will prevent you from being identified. Hammond got busted because he ran his mouth and revealed too many personal details. So don't do that, on this forum or anywhere else.
Hammond also had a persistent presence on the IRC channel, which made a low tech correlation attack on him easy. That is considerably harder if you're posting on a forum or sending emails, or just browsing around.
Lastly, Hammond was involved in multiple hacks on high value targets, including stealing a million dollars through fraudulent credit card charges. LE won't be doing that kind of investigation on people buying a few pills over the internet. What happened to Hammond should not be in your threat model.
-
What if your using a neighbors internet ???
-
Then they will know you're within 100 feet of that WIFI.