How to lower probability of being tracked by advert sites ...

chaps23 said:
_https://www.torproject.org/projects/torbrowser.html.en

This program for anon browsing. No one will no what your up to, and if there are certain sites you cant access due to your country of origin you can bounce a relay off that country to gain access to the site, this software is excellent and all of us should be using it.

TOR happens to be one of my pet peeves as it's yet another thing that's marketed to people as being on the side of the "good guys", but people don't know anything about how it works, how and why it's vulnerable to attacks, and basically just suspend their brains while believing that they can avoid being monitored (which isn't possible at all since there are probably backdoors in every operating system--including open source operating systems--and the hardware of every computer ever produced).

_http://sheddingbikes.com/posts/1293530004.html
The Sordid Past And Present Of Tor

Tor by itself, without knowing its history, seems like a great idea. You point your browser at it and suddenly you can view web pages without people knowing that it's actually you. Great right?

The problem is that Tor's pedigree is less than stellar. First, it was originally a US Navy project then released to various "hackers" (a word which in a lot of ways is just synonymous with "NSA collaborator" or at least a wannabe). Whether the source code started there or just the idea, you have to ask why the hell the Navy would work on this and then release it.

The Navy of course gave some hand-wavy answer of wanting to use it, but the Navy just doesn't do something like this without another reason. Who knows what it is, but I this makes my spidey sense go off.

That's the first strike against Tor, but let's look at more reasons to not use Tor. How about the research that showed how easy it is to break in various ways. Those might be fixable, so how about that there can be super nodes that with just a small sample of traffic can figure out a lot of content?

Alright, maybe that can be fixed, but then you read about a semi-secret volunteer group collecting data from 12 ISPs and handing it to the government. This Project Vigilant apparently has 600-1500 volunteers who are all hackers collecting and analyzing data and handing it straight to the government without user consent. Project Vigilant also claims it:

tracks more than 250 million IP addresses a day and can "develop portfolios on any name, screen name or IP address."

Holy crap, that's a lot of traffic analysis. Given how small the "hacker" community is, that's also a gigantic percentage of hackers and security experts on the volunteer payroll of a group who's job is to illegally wiretap people and circumvent the law on behalf of the government.

(there are embedded links on the page not included in the quote)

There are also actual documented examples of nodes performing "man in the middle" attacks (inserting themselves in between you and your encrypted destination and capturing all the data that you believe is being securely transmitted between you and the end point):

_http://www.teamfurry.com/wordpress/2007/11/20/tor-exit-node-doing-mitm-attacks
I decided to do some more digging on the TOR network to see whether there really are exit-nodes doing MITM attacks. As a target site, I picked up my home computer that had an SSL enabled server.
...
I ran through all the exit-nodes in my current directory cache, connecting to my website and saving the certificate. After that I compared the certificates to see whether I picked up any that were different from the real SSL cert on my site. One certificate differed from the original:
...
So, what we have here is an TOR exit-node that is doing Man-In-The-Middle attacks on HTTPS connections.

Commentary on that:

_http://www.schneier.com/blog/archives/2007/12/maninthemiddle.html
EDITED TO ADD (12/6): The guy claims that he just misconfigured his Tor node. I don't know enough about Tor to have any comment about this.
...
jeremiah • December 6, 2007 2:35 PM
I love how programs that people believe will increase security, actually decrease it. Wait, no, that's hate. I hate those programs.

@Andy: he didn't just self-sign his certificate, he's using it to impersonate folks whose WWW connections are coming from his exit node. He impersonates the client for the server, and impersonates the server for the client, and he holds all the SSL keys that are used in the encryption. He is then able to see all the https traffic coming in and out of his exit node in clear text. Man in the middle.

He has everything he needs to fetch out all kinds of personal information, and using that information fraudulently is a breeze.

It's not possible to "misconfigure" a node in such a way--it's intentional and the issue is that TOR doesn't prevent it from happening.

And this is really the key that TOR isn't secure:
_http://www.i2p2.de/how_networkcomparisons.html
Benefits of I2P over Tor
Peers are selected by continuously profiling and ranking performance, rather than trusting claimed capacity

If one wants power in TOR, one sets up a node, claims that they have tons of capacity, and then get tons of traffic routing through it just because they said that they have lots of capacity and TOR and its users blindly believe it. Obviously this is one of the worst places to place trust and any alphabet soup agency can, and most assuredly does, setup such a node and then monitor all the people who think they're outsmarting those agencies (along with monitoring them in a million other ways).

So essentially, TOR doesn't offer any additional security, has known exploits and fundamental flaws, is known to be being exploited currently, and has government ties--its entire story is false, so I think the real reason that it's around is some nefarious thing.

The simple reality of computer security against TPTB is that there is none. For actual computer security, you'd have to build the hardware yourself from the ground up (and I don't mean assemble, I mean design and manufacture each individual part yourself), do the same with the software, AND never let it out of your sight so someone doesn't install something malicious while you're away for 5 minutes. Even then there are still plenty of ways for your data to be compromised--the problem is, there's always a weak link. It is possible to have security against some average joe hacker or identity thief or whoever, so some security steps are valuable for that reason, but there's no defense against the control system in terms of computer security and they already know everything you're doing.

As an addendum, to point out that probably every operating system has a backdoor in it:

_http://sheddingbikes.com/posts/1293530004.html
P.S. I have a long bet that SELinux is an NSA backdoor. Any takers?

I'm definitely one.

_http://en.wikipedia.org/wiki/Security-Enhanced_Linux
The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency.

It has been integrated into the mainline Linux kernel since version 2.6, on 8 August 2003.
...
NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities

Windows and Mac OS X are closed source operating systems, so putting a back door in them is trivial (I'd say there's basically a 0% chance that they don't have at least one). Linux is open source, but even it has had code written specifically by the NSA for almost a decade and this code is distributed with basically every version of linux out there.

It doesn't matter what lock you put on, they have a skeleton key (though again, context matters--a lock can potentially stop the average criminal).

And this is all just from what we know--it's essentially a given that they have technology dramatically past what we're aware of, which may render all of this even more moot.

chaps23 said:
No one will no what your up to

If they want to know, they'll always be able to know.
 
Most of this is done through cookies, the Adblock addon for most browsers blocks these networks without having to edit your hosts file.
 
Heimdallr said:
chaps23 said:
Also great for money laundering but I wont go there.

Why would anyone on this forum be interested in that?

Listening to Anarts post I wont go into detail but it was a joke hence the :P posted at the end. Basically able to recieve money for things with out paying import tax etc (not that I do this) and to buy things with out anyone knowing what you buy, just amazes me at the ammount of things possible on the world wide web. I'll be more obvious in the future for you convienience.

Heimdallr said:
chaps23 said:
_https://www.torproject.org/projects/torbrowser.html.en

This program for anon browsing. No one will no what your up to

Maybe for citizens, but for government it's child's play to see "what you're up to".


If for example you can not access certain information due to your country of origin you can simply relay through a country that is able to see hence VERY useful. I believe it is a massive envasion of human rights to limit information to certain countries and what we can watch & buy and so do alot of others with the help of TOR its made possible. Could you imagine if they approve this internet censorship thing in the AUS? who knows what will be blocked maybe even this website.... How will I talk to all you fine folks?

TOR happens to be one of my pet peeves as it's yet another thing that's marketed to people as being on the side of the "good guys", but people don't know anything about how it works, how and why it's vulnerable to attacks, and basically just suspend their brains while believing that they can avoid being monitored (which isn't possible at all since there are probably backdoors in every operating system--including open source operating systems--and the hardware of every computer ever produced).

The original purpose of this thread was "How to lower probability of being tracked by advert sites ..." TOR is still the best way to do this, and its still possible to browse anon Foxx and if used on a stand alone PC with no personal data whilst hacking you neighbours wifi (not that I condone such an action) of course 4D STS will always no what your up to and some higher forms of Gov agencies but the local police, companies doing "Market research" it serves its purpose as it advertises. People obviously use it for so many things they do not wish to be caught for 90% of wiki leaks data, child pornography, KFC's special herbs and spices..... etc etc :P
 
Just a quick note I was not joking about child porn that is a very serious and disturbing matter! the KFC part was the joke.
 
[quote author=Foxx]
Windows and Mac OS X are closed source operating systems, so putting a back door in them is trivial (I'd say there's basically a 0% chance that they don't have at least one). Linux is open source, but even it has had code written specifically by the NSA for almost a decade and this code is distributed with basically every version of linux out there.
[/quote]The most famous case with respect to Windows NSA backdoor access is the NSAKEY case, see: http://en.wikipedia.org/wiki/NSAKEY
Likely the only feature of Windows that works as intended. Read more: _http://www.voxfux.com/archives/00000059.htm
 
Foxx said:
chaps23 said:
_https://www.torproject.org/projects/torbrowser.html.en

This program for anon browsing. No one will no what your up to, and if there are certain sites you cant access due to your country of origin you can bounce a relay off that country to gain access to the site, this software is excellent and all of us should be using it.

TOR happens to be one of my pet peeves as it's yet another thing that's marketed to people as being on the side of the "good guys", but people don't know anything about how it works, how and why it's vulnerable to attacks, and basically just suspend their brains while believing that they can avoid being monitored (which isn't possible at all since there are probably backdoors in every operating system--including open source operating systems--and the hardware of every computer ever produced).

_http://sheddingbikes.com/posts/1293530004.html
The Sordid Past And Present Of Tor

Tor by itself, without knowing its history, seems like a great idea. You point your browser at it and suddenly you can view web pages without people knowing that it's actually you. Great right?

The problem is that Tor's pedigree is less than stellar. First, it was originally a US Navy project then released to various "hackers" (a word which in a lot of ways is just synonymous with "NSA collaborator" or at least a wannabe). Whether the source code started there or just the idea, you have to ask why the hell the Navy would work on this and then release it.

The Navy of course gave some hand-wavy answer of wanting to use it, but the Navy just doesn't do something like this without another reason. Who knows what it is, but I this makes my spidey sense go off.

That's the first strike against Tor, but let's look at more reasons to not use Tor. How about the research that showed how easy it is to break in various ways. Those might be fixable, so how about that there can be super nodes that with just a small sample of traffic can figure out a lot of content?

Alright, maybe that can be fixed, but then you read about a semi-secret volunteer group collecting data from 12 ISPs and handing it to the government. This Project Vigilant apparently has 600-1500 volunteers who are all hackers collecting and analyzing data and handing it straight to the government without user consent. Project Vigilant also claims it:

tracks more than 250 million IP addresses a day and can "develop portfolios on any name, screen name or IP address."

Holy crap, that's a lot of traffic analysis. Given how small the "hacker" community is, that's also a gigantic percentage of hackers and security experts on the volunteer payroll of a group who's job is to illegally wiretap people and circumvent the law on behalf of the government.

(there are embedded links on the page not included in the quote)

There are also actual documented examples of nodes performing "man in the middle" attacks (inserting themselves in between you and your encrypted destination and capturing all the data that you believe is being securely transmitted between you and the end point):

_http://www.teamfurry.com/wordpress/2007/11/20/tor-exit-node-doing-mitm-attacks
I decided to do some more digging on the TOR network to see whether there really are exit-nodes doing MITM attacks. As a target site, I picked up my home computer that had an SSL enabled server.
...
I ran through all the exit-nodes in my current directory cache, connecting to my website and saving the certificate. After that I compared the certificates to see whether I picked up any that were different from the real SSL cert on my site. One certificate differed from the original:
...
So, what we have here is an TOR exit-node that is doing Man-In-The-Middle attacks on HTTPS connections.

Commentary on that:

_http://www.schneier.com/blog/archives/2007/12/maninthemiddle.html
EDITED TO ADD (12/6): The guy claims that he just misconfigured his Tor node. I don't know enough about Tor to have any comment about this.
...
jeremiah • December 6, 2007 2:35 PM
I love how programs that people believe will increase security, actually decrease it. Wait, no, that's hate. I hate those programs.

@Andy: he didn't just self-sign his certificate, he's using it to impersonate folks whose WWW connections are coming from his exit node. He impersonates the client for the server, and impersonates the server for the client, and he holds all the SSL keys that are used in the encryption. He is then able to see all the https traffic coming in and out of his exit node in clear text. Man in the middle.

He has everything he needs to fetch out all kinds of personal information, and using that information fraudulently is a breeze.

It's not possible to "misconfigure" a node in such a way--it's intentional and the issue is that TOR doesn't prevent it from happening.

And this is really the key that TOR isn't secure:
_http://www.i2p2.de/how_networkcomparisons.html
Benefits of I2P over Tor
Peers are selected by continuously profiling and ranking performance, rather than trusting claimed capacity

If one wants power in TOR, one sets up a node, claims that they have tons of capacity, and then get tons of traffic routing through it just because they said that they have lots of capacity and TOR and its users blindly believe it. Obviously this is one of the worst places to place trust and any alphabet soup agency can, and most assuredly does, setup such a node and then monitor all the people who think they're outsmarting those agencies (along with monitoring them in a million other ways).

So essentially, TOR doesn't offer any additional security, has known exploits and fundamental flaws, is known to be being exploited currently, and has government ties--its entire story is false, so I think the real reason that it's around is some nefarious thing.

The simple reality of computer security against TPTB is that there is none. For actual computer security, you'd have to build the hardware yourself from the ground up (and I don't mean assemble, I mean design and manufacture each individual part yourself), do the same with the software, AND never let it out of your sight so someone doesn't install something malicious while you're away for 5 minutes. Even then there are still plenty of ways for your data to be compromised--the problem is, there's always a weak link. It is possible to have security against some average joe hacker or identity thief or whoever, so some security steps are valuable for that reason, but there's no defense against the control system in terms of computer security and they already know everything you're doing.

As an addendum, to point out that probably every operating system has a backdoor in it:

_http://sheddingbikes.com/posts/1293530004.html
P.S. I have a long bet that SELinux is an NSA backdoor. Any takers?

I'm definitely one.

_http://en.wikipedia.org/wiki/Security-Enhanced_Linux
The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency.

It has been integrated into the mainline Linux kernel since version 2.6, on 8 August 2003.
...
NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities

Windows and Mac OS X are closed source operating systems, so putting a back door in them is trivial (I'd say there's basically a 0% chance that they don't have at least one). Linux is open source, but even it has had code written specifically by the NSA for almost a decade and this code is distributed with basically every version of linux out there.

It doesn't matter what lock you put on, they have a skeleton key (though again, context matters--a lock can potentially stop the average criminal).

And this is all just from what we know--it's essentially a given that they have technology dramatically past what we're aware of, which may render all of this even more moot.

chaps23 said:
No one will no what your up to

If they want to know, they'll always be able to know.

After thouroughly reading through your post Foxx and the Blog that you got all of that information from (is it yours?) I think I have to disagree, When used properly and not like an amature TOR is the most secure browser on the web. Far more so that I.E, Mozilla, Safari & Chrome.

TOR is useful in providing anonymity when browsing websites, posting on chat forums etc. This is done by preventing the website from logging your true IP address. Whistleblowers also greatly use this service to remain anonymous when disclosing information about corrupt corporations or governments to prevent negative reprocussions. TOR can also be used to acces sensored information. This is particularly useful in coutries, such as China, where lots of websites are blocked by a tyranical government.

TOR happens to be one of my pet peeves as it's yet another thing that's marketed to people as being on the side of the "good guys", but people don't know anything about how it works, how and why it's vulnerable to attacks, and basically just suspend their brains while believing that they can avoid being monitored (which isn't possible at all since there are probably backdoors in every operating system--including open source operating systems--and the hardware of every computer ever produced).

There are various weaknesses in TOR as in any browser, you mention the Navy funded both the invention and development of TOR. They most certainly did, the reason for this was to create a browser where the governments spy's ect could access/communicate deep within enemy lines without being monitored.

_https://en.wikipedia.org/wiki/Tor_(anonymity_network)#Weaknesses
_http://en.linuxreviews.org/Tor

The above two links do run through someidentifyable weaknesses in the TOR browser but just as the cassiopaeans say "knowledge protects" the ignorant person using TOR will no doubtedly be more vulnerable, even more so than someone using I.E or Mozilla because the other people using TOR are usually very experienced I.T users and a much larger percentage will be hackers with intent to harm, steal data etc.

Quote from referenced site,

"What you need to be aware of when using Tor
Normal traffic on the normal Internet goes through many routers who can look at the traffic passing by them. The same is true for Tor exit nodes.
A Tor exit node could be spying on all the traffic exiting from that node. This potentially spying Tor exit node can not see who is sending the traffic and you remain anonymous. But, and always keep this in mind when using Tor, any evil Tor exit node operator could spy on the exit traffic in order to get, say, random passwords for webmail accounts, message boards and so forth.

Some argue that sending unencrypted passwords over (non-SSL) Tor-connections is less safe than sending them over a normal Internet connection.

This only applies when you are sending plain-text over Tor (and the Internet in general). It does not matter if a spying exit node sees that someone is reading Killtown, but it does matter if a spying exit node picks up your username and password at LibertyForum. Most webmail services use SSL encryption, most message boards do not."

It doesn't matter if they know what you are looking at because they dont know where you come from or who you are. They can only see the last relay the signal bounced off.

_https://www.torproject.org/
_http://en.linuxreviews.org/Tor

"Tor gets about 80% of its $2 million annual budget from branches of the U.S. government that support free speech and scientific research, with the rest coming from the Swedish government and other groups."
http://online.wsj.com/article/SB10001424127887324677204578185382377144280.html

"The Department of Defense use Tor-technology to communicate in the middle east, if the good guys can't not use DoD communications to find out where the highest ranking US General is then, sadly, they don't know where to drop atomic bombs."

Why would the governments support a browser that is insecure and then use it themselves as a secure military means of communication. If the government can "hack it" anyone can hack it.

_http://en.linuxreviews.org/Tor
You can access to "forbidden" information

There is a growing trend of censorship on the Internet at country-wide level.

China is the country most famous for having a gigantic firewall which both prevents users inside the country from having access to outside content and also logs who is accessing what.

Tor will automatically try to access a Internet service through many Tor servers until it succeeds in establishing a connection.

You will be able to access websites blocked by your ISP or your government through Tor as long as the tor exit node has access to the website.

This is the MAIN Reason I support TOR, I believe in Freedom of information and TOR is the best browser for this. I will stress that anyone wanting to experiment with TOR to DO YOUR RESEARCH Foxx has shown that lack of knowledge when dealing with TOR can be unwise.

I apologise to anyone reading this for the poor grammer and outlay of this post, I never was very good at english in school. :)
 
(_http://en.linuxreviews.org/Tor)
Tor users who visit your website / Internet services get end-to-end encryption

If you run a webserver and you also run a Tor-server on that server then Tor-users visiting your webserver will get end-to-end encryption of their (anonymous) connection. This is because Tor exit servers see the connection is going to a IP who is also listed as a Tor-server and automatically extends the circut to that server - giving the end-user a end-to-end encrypted connection (Tor users can test how this works by visiting this website with and without Tor; this server is also running a Tor-server).

How the Tor network works
How_tor_works.png


In bullet summary:
The clients Tor software incrementally builds a circuit of encrypted connections through the tor servers on the network.
These connections are encrypted as they pass by non-tor routers on their way between tor servers.
The circuit is extended one hop at a time.
Each server along the way knows only which server gave it data and which server it is giving data to.
No individual server ever knows the complete path that a data packet has taken.
The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Tor - the ultimate proxy

Tor forwards TCP streams and makes a SOCKS interface available. This means that you can use Tor stay anonymous when using most common networking software for IRC (X-Chat, irssi), web browsing (Firefox/Seamonkey/Opera/etc) and basically everything that supports a SOCKS proxy.

Extra protection is still needed

What good is an anonymous connection if the first thing you do is to post your real name and location when you visit a website?

You need to use extra filtering software like privoxy between your browser and your Tor software. This is because web-browsers actually give away a truckload more information than they need to.
1. Web browser leaks relevant information when it contacts
2. Privoxy, who removes it and contacts
3. Your local Tor, which goes through the Tor network and reaches a Tor exit node, which unwillingly connects to
4. a NSA spy node at global exchange, NTNU Norway and other meeting points who monitors the connection (and sees it as coming from the exit, not you) while it's going from the exit to
5. the web-server you want to visit.

It is important to realise that to remain anon on TOR you need to never give away your real personal information, access any personal emails or log into any non TOR server websites that you have created a personal account on.

Just cutting some more interesting pieces for all you readers out there to get a grasp on the TOR system.
 
FWIW, I use this:
  • mvps Host file (already mentioned in the thread)
  • Search & Destroy (also mentioned)
Firefox Addons:
  • Addblock Plus (choosing the filter subscription "Easy Privacy+EasyList" [also mentioned]
  • Better Privacy (to truly delete the flash cookies or "Super-Cookies, that won't delete by default)
  • Ghostery (to block ads from 3rd parties[ad netowrks,behavioural data collectors,web analytics])
--
NoScript(not necesarily to stop getting tracked, but more on only allow Java,Javascript that you trust)

Also I've heard a Firewall it's of great use. For mac I've seen its highly recommended "Little Snitch" (Firewall for mac). But again is what I've heard(take it as a grain of salt).
-------------
About TOR, I don't have anything to back up my claims so might as well be taken as a grain of salt too, but from what I remember when I read about it, the conclusion I had was that it's not totally secure nor infallible; but it seems you guys already know that.

There's also a Sott article about it, if it helps, but again TOR is not totally safe (OSIT) HTTPS and Tor: Working Together to Protect Your Privacy and Security Online

IMO, it could be better getting a VPN service when surfing, where your data is encrypted and your real IP address is not seen (or so I understand it at this moment), but this also not infallible regarding your data being in good hands, as there are some news about the VPN providers giving information to the authorities mostly because they were inquired by the gov to provide the info of the user they were alleging to, because the user was dling pirated things.
Overall ,supposedly and at my current understanding, is good using a VPN service.
Though theres also good/bad providers, and of which one is better, I don't truly know yet.
 
Fwiw, we use this: _http://www.abine.com/dntdetail.php

DNT stands for Do Not Track (Me). It seems to block most sites and even tells you in categories what kind of sites were trying to track you. Since December 12, it claims to have blocked 64, 000 websites from tracking the activity on this computer.

Who's tried to track you? Total # blocked
Social networks 11,479
Tracking companies 52,899

They also have two other softwares called DeleteMe and MaskMe here
 
Also more suggestions:


  • Firefox Customisation
    -Security Tests Sites
    -Addons for Cookies and Privacy
    -Hosts file
    and more



  • Firefox about:config edits
    -Turning off DOM Storage (HTML5 cookies[?])
    -Referrer Control (If you visit a link from a site, the destination site knows from where you were referred)
    -User Agent String
    and more
 
TOR is completely useless and IS NOT ANONYMOUS. It is being advertised as a good tool to hide behind but in fact its not.
2 major reasons beside tons of more evidence

first - ANYONE (including FBI , NSA etc. etc.) can set up tor node and serve a service - this means that if they will have a lot of those nodes across the world , they will be able to sniff the traffic - which means that TOR users voluntarily give`em their data.

second - to browse an average website you need to turn on JavaScript and a simple script on a server side will get you IP address and log it - no way to avoid that if you want to watch a website properly.

And then comes THIS ---> http://lucb1e.com/rp/cookielesscookies/

And then comes crap-load of bugs in HTML5 , and then comes browser bugs , and then and then and then...... etc.

You would have to only use a network to read off it - read only mode, because most of the time it does not require accounts so you have a small chance that you get away with it. That is practically impossible even for advanced user. Also this means that you cant share your data which in turn pretty much kills an idea of sharing your knowledge through network - i`ll bet that is what they want , hence all that fear mongering.
 
Just small update.

This is quite good extension to your browser

http://www.ghostery.com/

And here is a nice website with straightforward presentation of licences on various websites

http://tosdr.org/
 
Back
Top Bottom