Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Share tech news, updates, or what's on your mind.

Sign up to Post

I am a heavy Twitter user and now I am hearing that the Indian government is hiring data experts and buying a surveillance/spy software to find people's whereabouts like in China. Because they don't like the dissent. There are many activists out there (myself included) who would like to be secured to the hilt against this new government spying software too.

What should I do beside running TOR.
Can they trace my phone number?

Any answer would be appreciated.

Vic
0
Cloud Class® Course: Ruby Fundamentals
LVL 12
Cloud Class® Course: Ruby Fundamentals

This course will introduce you to Ruby, as well as teach you about classes, methods, variables, data structures, loops, enumerable methods, and finishing touches.

Good afternoon All

I am looking for community help to get me started on a Dell PowerConnect X4012 (2switch stack) configuration for 3 Dell XC servers with Nutanix on them.  I also have a TOR switch stack of 2 x Dell 3024 switches.  I have found in the past best practice documents for configuring Dell kit for VMware but I can't find anything conclusive for the above.

What vlans am I going to require for Nutanix AHV HCI?  

Any help gratefully received.

Thanks
0
Hello,

I have found myself in serious problems with the police as I have been accused of hacking my ex partners internet - I can categorically say I have not.

I received an Android Manifest from my ex - which I accepted out of ignorance. The next day Spybot and Droidsheep appeared on my system and there was a Google takeout that appeared on my machine from her g-mail account - the same day.

The police are saying that I initiated this and I cannot prove otherwise! They say the have contacted Andreas Koch - the inventor of Droidsheep and he said it could only be downloaded by the owner of the phone/computer - numerous articles I have read on the net say it can be downloaded through many sources without my consent.

Since the Spybot and Droidsheep/W32 download, I have been hacked over 30 times and have even got a Brutus cracker which has appeared and they say I was trying to crack her password - I dont even know where this has come from!

Could you please, if you can, clarify Droidsheep and Spybot can be introduced onto my system, through the acceptance of an Android Manifest accepted request and can it activate programmes such as Brutus!

I would be prepared to pay for an official report. It is me who has had money stolen from my bank - along with the 30 hacks, accused of hacking - which I do not have the technical knowledge to defend. In my opinion, it was the acceptance of the Android Manifest request that has caused all this - but again I do not have the …
0
I'm seeing something in a SIEM that I can't seem to wrap my head around. I have an internet facing ASA that is configured to deny spoofed IP addresses (I don't manage these devices). Shortly after feeding syslog events from this device into the SIEM, I started seeing "Traffic from Tor Exit Node" and "Deny IP Spoof" events in the SIEM. I bring up both items as I'm not sure if they're related.

Anyway, when I look at "Traffic from Tor Exit Node" events where the source IP is the known Tor exit node (most of them), there is no corresponding destination IP address or destination port. I've crafted a few stories in my head involving nmap scans through Tor but I can't convince myself of anything I've come up with. Anyone have a plausible explanation?

Thanks,
TR
0
Just over two weeks ago, a client of mine had a Cryptowall 3.0 infection, starting from a workstation. It was quickly contained, and we restored from backup, and all is well now. One residual side effect caught me completely off guard, however.

Every Windows workstation on the domain began having the help_decrypt files launch at startup. We found those files in the startup folders on the local C drives of the workstations, as well as in many other folders on C. No files on any of those computers were encrypted, however.

I have never seen nor heard of a crypto variant showing this behavior. Did it find the C$ shares on the network?
0

Tor

Tor is free software for enabling anonymous communication. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.

Top Experts In
Tor
<
Monthly
>

No Top Experts for this time period. Answer questions to earn the title!