• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Guide: Surf anonymously with Tor

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Anonymity // Privacy // Spam

View previous topic :: View next topic  
Author Message
hakz
Just Arrived
Just Arrived


Joined: 03 Jan 2007
Posts: 0


Offline

PostPosted: Wed Jan 03, 2007 10:27 pm    Post subject: Guide: Surf anonymously with Tor Reply with quote

I found this on Metacafe, its pretty good, and funny as well listening to the guy try and pronounce Vidalia.

Tor is a network comprised of users that allow their computers as a sort of gateway, if you are using Tor and you are browsing a website, the data will go through many different computers and then to you or the website. The data is encrypted, so no one but you will be able to see what is being sent or received, not even the last gateway.

As you can see I did some research on this, if you decide you want to help out but you don't want your IP address to be used, you can simply choose to allow connections between Tor servers, which means you will never be the gateway between the website and the tor network.

I hope that made sense. I use Tor but my Internet connection isn't fast enough so I leave the option to be a Tor server unchecked.

The video guide above simply shows you how to use Tor as a proxy on Internet explorer, you can use Tor with any browser (as long as you know how to change proxy settings), or any sort of application that accesses the Internet using TCP.

oops forgot the link Rolling Eyes

http://www.metacafe.com/watch/347025/best_way_to_surf_the_internet_anonymously/

Admin note
Please don't double post, kindly use the edit as I have just done for you
alt.don
Back to top
View user's profile Send private message
mxb
Trusted SF Member
Trusted SF Member


Joined: 30 Mar 2004
Posts: 6


Offline

PostPosted: Fri Jan 05, 2007 12:07 am    Post subject: Re: Guide: Surf anonymously with Tor Reply with quote

hakz wrote:
The data is encrypted, so no one but you will be able to see what is being sent or received, not even the last gateway.


Well, I believe this is wrong.

If the connection to the website is not secure (e.g https) then the last gateway will be able to see (and potentially sniff) all traffic.

Thus, it is vitally important when using tor to check the server certificates and only use encrypted protocols (pop3-ssl, https) if you are logging in.

However, it is true that communication between nodes is encrypted so an intermediate node cannot intercept it.

Thanks,
Martin
Back to top
View user's profile Send private message
EricPuryear
Just Arrived
Just Arrived


Joined: 19 Aug 2005
Posts: 0


Offline

PostPosted: Fri Jan 05, 2007 3:14 am    Post subject: Re: Guide: Surf anonymously with Tor Reply with quote

mxb wrote:
Well, I believe this is wrong.

If the connection to the website is not secure (e.g https) then the last gateway will be able to see (and potentially sniff) all traffic.

Thus, it is vitally important when using tor to check the server certificates and only use encrypted protocols (pop3-ssl, https) if you are logging in.

That is very correct! If anything, I would be more concerned about unencrypted traffic through Tor than unencrypted traffic through my regular ISP. People use Tor because of the desire for anonymity, and I'm sure that unscrupulous exit node operators or their ISPs know this, and monitor Tor exit node traffic more than your average DSL or cable connection is monitored. There was an interesting thread about this, with specific reference to Gmail in Tor's mailing list: http://archives.seul.org/or/talk/Sep-2006/msg00312.html

Moderator note: please do not use nested quotes - capi
Back to top
View user's profile Send private message Visit poster's website AIM Address
harry_g
Just Arrived
Just Arrived


Joined: 12 Feb 2007
Posts: 0


Offline

PostPosted: Mon Feb 12, 2007 1:56 pm    Post subject: DSL;big ears Reply with quote

If I configure my browser as indicated, I can no longer connect to Internet through my DSL IP . Is Tor only for classical telephony?

I can't believe that the "big ears" would allow such an anonymity ! I think they are in the business...
Back to top
View user's profile Send private message
MakePB
Just Arrived
Just Arrived


Joined: 22 Feb 2007
Posts: 0


Offline

PostPosted: Thu Feb 22, 2007 4:48 pm    Post subject: Reply with quote

Actually when you use TOR everything from your PC to Tor exit node is encrypted and ISP can see only that encrypted data going to first TOR node but they do not have any idea about your final destination.

If you visit HTTPS site (without TOR) then are all data encrypted but ISP could see website you connect to.

If you visit https sites using TOR ISP could not see anything.
Back to top
View user's profile Send private message Visit poster's website
hax0r26
Just Arrived
Just Arrived


Joined: 20 Feb 2007
Posts: 0
Location: United States of America

Offline

PostPosted: Fri Feb 23, 2007 7:39 am    Post subject: Reply with quote

Quote:
Feb 23 00:40:04.968 [notice] Tor v0.1.1.26. This is experimental software. Do no
t rely on it for strong anonymity.
Feb 23 00:40:05.000 [notice] Initialized libevent version 1.1b using method win3
2. Good.
Feb 23 00:40:05.000 [notice] connection_create_listener(): Opening Socks listene
r on 127.0.0.1:9050
Feb 23 00:40:05.093 [notice] connection_create_listener(): Opening Control liste
ner on 127.0.0.1:9051
Feb 23 00:40:08.671 [notice] We now have enough directory information to build c
ircuits.
Feb 23 00:40:18.750 [notice] Tor has successfully opened a circuit. Looks like c
lient functionality is working.



High anonymity (elite proxy) - HTTP Servers of this type do not send HTTP_X_FORWARDED_FOR, HTTP_VIA and HTTP_PROXY_CONNECTION variables. Host doesn't even know you are using proxy server and of course it doesn't know your IP address.

Also, for additional security I would recommend disabling cookies in your web browser before configuring TOR to work with your web browser.

Cheers,
Back to top
View user's profile Send private message Visit poster's website
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Anonymity // Privacy // Spam All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register