do you need to hide your computer info in a tor? like when using a tor browser? asssit: I thought it was auto down and it's hiding my ip well, but want to make sure before I do some testing
????????????????????????????????????????????????????????????????????????????????????????????????????????????????? ?????????????????????????????????????????????????????????????????????? ????????????????????????????????????????????????????????????????? -BUD
no nothing like that, it's like having a proxy ip address, so instead of showing your computer say in Florida you show up in France
I see London I see France I see Nippies under pants.. Ask DXE he'd probably be up to speed on Proxy servers and the like
That was pretty funny. I got a friend who's up on all the PC stuff. I would think it wouldn't matter too much the gov can and does know what ever they want and hackers can screw the world with a key stroke.
No you don't. I've been using TOR for a while now. I have buddies that have been using it for years apparently. Only thing is for sites like this if you don't want to log in a million times you will have to check the remember me box. That will make that TOR associated IP basically static. Then if you disconnect from the TOR network and reconnect it will again ask you to long in. It's a good thing to at the very least refresh and click the onion for a new identity once a day. Though I have to admit I'm guilty of not always doing such... LOL Actually thinking back when I first started coming back on here I made a post about free online anonymity and security bringing up TOR and the updates that some of my IT guys were telling me about. Not a single person responded or inquired more. LOL This is TOR. https://www.torproject.org/ Designed by the military and so well they can't even crack it. They have to try and make exploits to target you specifically. This is how the silk road and other online black markets operated without prosecution. Of course with the help of bitcoin currency. The reports in the main media say the FBI will not disclose how they caught the guy who created it. But supposedly he some hacker threatened him. He paid for a hitman through his own site to take care of it. Then the FBI only knew is online handle. So then they kept in contact. Eventually they got him to agree to help make some program or app or some shit. Then after that had correspondence packages sent or delivered. And the guy slipped supposedly. What I eventually saw was the guy got a little to comfortable and used his real mailing address and name. After that it was done. Bot sure even if a bit of that is true. But I know I can change my location on a givin' whim it's supposed to be way better than a typical proxy according to the tech gurus.
The Tor does not stop those who truly want to know who you are. Google "Tor Stinks" and remember that stuff was leaked a year ago. There is also the idea that if they pressure the Tor developers they will give you up too. It really just slows things down for the end user. Posting on a pot grow site isn't likely to get the feds on your ass. They are kind of busy shooting at pro israeli protesters and trying to track down russian hackers who phish ssn's and credit card info from 1000's of people every day. Things like Applebee's getting ready to tank because of a credit card scandal get's them fired up. The best things you can do is not post at all and encrypt your hard drive. Shit you are more likely to get a no knock served on you by accident these days. There were over a million users and a few million transactions on silk road alone were there millions of busts? nope just a handful. Use tor if you are ordering a couple sheets of acid through grams but just bullshitting about smoking pot I mean really? -Steelnuts
For my own security I use a program called Anonymizer. Info below. Anonymizer Universal ® Powerful Privacy and Security Protection Whether you're at home or on public Wi-Fi, Anonymizer Universal keeps your online activities safe, private, and secure. With Anonymizer's personal VPN service, you can Connect with unlimited bandwidth & speed Access Wi-Fi hotspots securely Surf sites discretely and anonymously Protect against identity theft View online content without censorship Mask your real IP address & location Unlike other VPN providers, we believe that what you do online is your business, so you can trust that Anonymizer will never view, track, or keep logs of the websites you visit.
Having worked in IT - specifically networking and security for 30 years - I stay away from privately operated VPN (Virtual private Network) services that are specifically designed to mask their users identities. Just being a member of these services raises your visability. They are designed and marketed for one purpose - to evade the law. Be it to download copyrighted material, solicit whatever or simply try to remain under the covers - it raises YOUR exposure. Think about it - if enforcement was looking for something - they would first look at proxy users as they are TRYING to hide something. If you think the govt (local or national) cannot get your identity from a VPN flow, you are wrong. It is difficult but really in the scheme of things not that hard to do. Just as in any VPN setup, keys are exchanged when the tunnel is created. Standard IPSEC protocols are used here. The best way to stay under the radr is to do just that - stay under the radar Oh yeah - and I would trust google before some company called annomyzer - whoever they are One last thing - think about all those Pirate Bay users over the years that thought they were safe - once the site was busted (one of many times) ALL of those session and user logs became property of law enforcement. Do you honestly think this is any different?? EVERY bit of data that flows through those "secure" tunnels is logged and in most cases mined and sold.
Had a VPN for secure transactions in another life. The provider can still, and most likely does, record all your shit. Can't say I believe anybody who claims to not grab data, 'cept GK that is. The only reason I trust GK is because I got a set of keys to the backroom and KNOW what we do. More importantly, I know what we don't do. Tor is pretty much your best defense, albeit an incomplete defense. Since it's a data transfer security device, it does little to deter websites from digging into identifying information.
If you haven't watched any of Applebaum's lectures..you really should. He can scare the pants off you. And don't think it's only the US. The brits are neck deep in this shit too, possibly with even fewer limitations than the US NSA. http://www.zdnet.com/gchqs-dark-arts-leaked-leaked-documents-reveal-online-manipulation-facebook-and-youtube-snooping-7000031598/ They even have a web page that crows about how good they are at invading everybody's privacy and how easily they can disrupt private computers. http://www.gchq.gov.uk/Pages/homepage.aspx No matter how you look at it, from an internet consumer standpoint, we're pretty much fucked if things stay the same or continue. Government has found a backdoor into our virtual living room, because of archaic privacy laws that have been twisted to meet their needs, and is going to exploit it at every turn. Most folks don't know anything other than..."push button, screen lights up, punch keys, watch stupid video, send selfies, check porn.".....and that's the way the NSA, GCHQ and the other alphabet soup of citizen fuckers wants it to stay.
Man, that's all we should have to know. I don't want to have to be a techno junkie to play safe on the 'net. The single largest reason it's unsafe is because our governments are working to keep it that way for their own benefit.
And as long as people think they have an understanding of the system and can find a shadow to hide in the more they play into the governments hands. That false sense of security is their biggest tool. They don't want us to know, just to 'think' we know. Smart enough to do stupid shit. Like dxe said, if they're looking for shady characters they look in the shade, not in broad daylight. Be Cool, CG
I sort of disagree here. Tor or no tor, against "they" being law enforcement, can only assume. No warrant involved. They can ask, I guess. Hiding your IP AFTER a warrant? I would hope, MGMT is on top of that and, has a nuke switch.
Sad to say PD, once a server has been compromised there is no nuke switch because it's too late. Any info desired by the infiltrator has already been gleaned. That's the way it is for everybody. If a legal warrant or info request is served GK can be dumped by admin. Unfortunately, that's an old tactic that has little benefit in these times of government backdoors and spy programs. I will openly admit GK uses IP's. It's an essential piece of our security against spammers, hackers, multiple memberships and tracking any other tomfoolery that degrades the security or member enjoyment of our site. We do not use IP's in any other way except for security for the site. Once a member logs off GK we wipe your comp of any cookies or telltale signs you were ever here. The only lasting imprint of GK use on your computer is stored in your personal use history within your browser by the browser itself. Clean your browsing history and you're clean of GK references. Remember folks, as active growers MrGj and myself (or any acting site admin), and Webby as host, are first up on the list in the very unlikely event of Law Enforcement investigating the site. That's the way these things go. Admin gets popped, members go on to find another online home for things cannabis. With that in mind, we do everything within our power to balance site security with member security....not only for your sake....but our own as well. asssit: Now...Tor or no Tor, there is little one can do if actively targeted. It's like bringing a knife to a gun fight. You will lose. But it also doesn't mean it's time to roll over and make things easier. Even without a Tor there's ways to reduce exposure. IMHO there's only two ways to go with this shit. Either flood the spies (government) with so much info they can't absorb it, or, limit our personal exposure and hope for the best. In the former we're essentially sardines hoping for safety in numbers knowing somebody, somewhere, is going to get eaten. We just hope it ain't us. The latter, we're anonymous hermits buried in a cyber cave. Can't say either is the worst option because both pretty much suck.
in a nut shell there are at least hundreds of thousands of people who grow in the closet or are looking into it. Most of the small sardines are safe IMOP. Government and such are looking for the grower who sells and makes money at it. That's why grow houses get busted. Like Res said, Him and I and Webby would be looked at first here on GK if there was an issue. I'm really not worried. Plus it's a matter of time before it's legal in the USA. :redbong: