/roulette/ - Tech

Tech board tryout

Mode: Reply

Max message length: 8192


Max file size: 20.00 MB

Max files: 3


(used to delete files and postings)


Remember to follow the rules

(5.75 KB 256x256 t56756756.jpeg)
Let's talk VPNs Comrade 01/27/2020 (Mon) 15:36:01 No. 17
I was using riseup.net as a VPN, but, now cloudflair (The upstream provider for the site) is blocking it. Furthermore, it's come to my attention that riseup boofed their canary after the FBI requested server logs. They are glowin the darks, for real, and confirmed. What VPN would you suggest anon? What VPN, if any, do you use. I was thinking of routing all my traffic over tor, but, currently the site still blocks tor traffic. Help me out guys, I feel naked, thanks.
>>17 Tor. The fact there are blatant paedophiles using the service to distribute 🧀 🍕 shows that the state is at least finding it difficult to police
>>17 >it's come to my attention that riseup boofed their canary after the FBI requested server logs Source? When did this happen?
>>21 https://en.wikipedia.org/wiki/Riseup It's true, anon. >In 2011 Riseup was said to be the only one of several subpoenaed groups to resist subpoenas related to 2008 Bash Back protests.[17] >In 2014 the Google I/O conference was disrupted by protests. The protest outside was led by Fletes and Erin McElroy from Riseup.net and the Anti-Eviction Mapping Project.[18] >In 2014, Riseup Network was one of several claimants against GCHQ in international court. Devin Theriot-Orr of Riseup.net said, "People have a fundamental right to communicate with each other free from pervasive government surveillance. The right to communicate, and the ability to choose to do so secretly, is essential to the open exchange of ideas which is a cornerstone of a free society."[19] >In mid-November 2016, an unexplained stealth error appeared in Riseup's warrant canary page, and they did not respond to requests to update the canary, leading some to believe the collective was the target of a gag order.[20] On February 16, 2017, the Riseup collective revealed their failure to update the canary was due to two sealed warrants from the FBI, which made it impossible to legally update their canary. The two sealed warrants concerned a public contact of an International distributed denial-of-service attack extortion ring and an account using ransomware to extort people financially. The decision to release user information has been criticized in the hacker community.[21] The canary has since been updated, but no longer states the absence of gag orders.[22]
>>17 Mullvad, paid in cash and registered from an Internet cafe.
I heard that if you visit website "A" without Tor and then start visiting website "A" with Tor, your identity can be revealed? Therefore you should only use Tor to visit one set of websites and clear web for a different set of websites. Never mix. Is this true?
>>67 Through cookies, fingerprinting, logging into the same accounts... All of that can reveal you. Which is generally why you should use a browser dedicated to TOR (the TOR browser) and use completely different accounts when using it, if any at all.
>>41 I need one compatible with linux, anon.
>>20 Those pedophiles are the state
get N O R D V P N with the promo code "cockandballtorturefanatic69"
>>107 Please god no. Don't remind me of fucking nordvpn
Can anyone recommend a VPN that isn't tor? Thanks
>>111 Ghost vpn is a cheap and good one
>>106 Please provide evidence for this assertion.
>>17 Riseup is not glow in the dark. They stopped updating their canary like they should've, everyone using it should have understood to tread lightly. Once the NDA broke they made a blog post explaining it. It wasn't a broad search for all user data, but rather a search for data from a ransomware seller's email. If your security can be broken by a mail server being seized, your opsec is fucking terrible and you should reevaluate the risks you're taking. If you're being a fucking retard and sending unencrypted clearnet emails with sensitive information no email provider will save you. Protonmail is not a solution either. Learn how to tor + gpg. >>71 Tor is not an acronym. >>111 Before I recommend this, I want to make it clear that vps are only good for a few things: torrenting and hiding your personal traffic from your ISP. Don't use a vpn for illegal things you dummy. Here's how you get a vpn and not expose any personal information of yours except for your ip address. 1. Obtain crypto. If you cannot break the money trail between you and the crypto learn how to opsec. 2. Buy a stolen account from a reputable vpn company. 3. Use vpn. Usually these accounts are cheap as fuck (like a 2 year plan for $5). Vpn companies shouldn't care about what IPs are connecting to the account. Most don't give you a way to check how many connections you have at one given time either. Chance of getting caught is low, unless you're a retard and change the password. Vpn companies are not invulnerable to data leaks. Just recently NordVPN had their member's personal information leak. Emails, usernames, etc. associated with the account. A stolen account user is unaffected. For those that are actually into opsec, this also provides a clean way to get a vpn to tunnel tor traffic through. Utilizing qubes is great in this regard. E.g. sysfirewall - provides clearnet -> syswhonix - provides tor > sys-proxy - provides proxied internet -> targetvm This makes getting to sites that block tor exit nodes easier. It makes it so you don't have to give a vpn your actual ip to get to unrestricted clearnet. Of course, for all intensive purposes, illegal activities most likely should not be conducted this way.
(16.97 KB 480x360 hqdefault(3).jpg)
>>148 Look it up yourself you dumb motherfucker.
>>158 This is /pol/-tier posting. Please post sources for your claims instead.
>>67 It can be revealed but that depends on what you do. If you login to the website with the same user account both with and without Tor then obviously yes. Otherwise not necessarily because Tor Browser does quite a few things to make your fingerprint minimal and generic. Especially if you block javascript ("Safest" security level setting). I recommend reading some articles on fingerprinting and how people can reveal their identity through their own mistakes. You should have a good idea of how all this works. Usually it's a combination of things that gives you away, which is why compartmentalizing is essential.
>>157 >Tor is not an acronym. Yes it is. Tor stands for "The Onion Router."
>>207 Spoonfeeding common public secrets seems harmful. And regarding these sort of dangerous accusations, the sources that are missing are more telling than the ones that are publicized. https://en.m.wikipedia.org/wiki/Westminster_paedophile_dossier Also the whole Epstein debacle. Just search through his address book if you want to visit some of his "associates"
>>270 IIRC "TOR" was an acronym at first then they decided to use it as a name in itself, so they now spell it "Tor". So you're both kinda right.
>>104 Mullvad has an opensource linux client.
I just leave this here https://thatoneprivacysite.org
>>356 >privacy website >can't even maintain its SSL certificate
>>377 >He falled for the CA meme
>>356 I don't think anybody realistically uses that chart for VPNs. I prefer this page instead: https://www.privacytools.io/providers/vpn/


no cookies?