New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
dont you not allow it is a double negative, so it's hard to say.
Yes.
As long as no exit is available from the box, it should be allowed by many people. Exit nodes are not due to high abuse rates.
However, keep in mind tha hidden services are not really hidden to the provider. If you have sensitive political content, chances are NSA will find out about it, you will be better hosting it at home and use Tor only to mask the source (IP).
OpenVZ providers might arbitrarily end any process named Tor
That's a pretty broad statement.
People should just read the TOS, or open a ticket if they have a question.
It is tor, the process name, and, yeah, some might, but I do not agree with that approach. Either it's not allowed and then the VPS is suspended, or it is and then the process stays.
If I find an exit node or any node on premium services, I simply suspend. And I do not look for process names, there are public lists readable by machines to check for those. A bridge and a hidden service is not listed, so, you should be fine.
Still need VPS for it
https://www.google.com/search?q=FBI+RUNNING+TOR
I question the sanity of anyone who thinks that using TOR will increase levels of privacy.
@Incero The most people did the follow thing:
1. Using Hasmail
2. Using outdated Firefox version (Exploits)
3. They given out to much about who there are.
So basically it wasnt a fault because of Tor, who said i want to host something ilegal?
Don't mind me. I don't know anything.
You don't need to announce publicly what everyone already knows. /s
Could have done better than posting a clueless FUD flamebait in a random unrelated thread while signing off by your corporate brand name.
I think there is nothing wrong with that, there are many DCs and ISPs as well as content providers which do not understand the need for anonymity of legitimate people. That is a fact and we cannot change that, no matter how many disclosures will be about spying and the like.
As long as "I do nothing wrong, so why would I need to protect my identity" works, they will have good business.
However, doctors, lawyers, priests, judges, political activists, military personnel, anyone which can be blackmailed and exposed Petraeus style as well as people which are required by law or by their professional creed to keep secret the identity of their customers, cult members, political group, etc, know it all too well and their numbers will grow as almost everyone else understands the need of privacy and the reasons the constitutions protect their right to privacy in the first place. Even after the constitutions will be changed, or especially because of that, people will still need protection.
Ummmm yeah. Ok, sarcasm. There's a tiny possibility I know a little something about networks: http://d.pr/i/4Swo/1QBPVc9r. But maybe not.
People who use TOR only attract more attention to themselves, I tried to relay that gently above, but I have nothing to gain by trying to help people here, so I politely bowed out with "i know nothing, don't mind me" after my first comment of:
"https://www.google.com/search?q=FBI+RUNNING+TOR
I question the sanity of anyone who thinks that using TOR will increase levels of privacy."
was shot down.
hth
"I have nothing to gain by trying to help people" -- Incero, LET, 2014. You keep going, that's getting better and better. You tried to troll our thread, but in Soviet Russia the thread trolls you right back. And I am not clicking that URL-shortened link which supposedly proves how awesome you are, or who knows, maybe it's just a Goatse picture there.
I wasn't trolling, you seem to be wound up for no apparent reason. I'm not here to push my brand, which is why I don't have a URL in my sig.
Take a poll of:
vs
Simply I was politely trying to tell you that anyone that thinks that TOR is a good idea, or that it is in any way secure is probably not actually at the datacenter and is oblivious to law enforcement action. More to the point the FBI and other LE run most of the relay and exit nodes and they're a massive honeypot. TOR is one of the guaranteed ways of making sure that all your traffic is mirrored and not anonymous.
Why are you so angry?
Because all of the above paragraph is a complete b/s and misinformed FUD. You are just plain wrong, and with you trying to propagate your twisted view of this subject here (which looks strange, since at the same time you admit "you know nothing"), you are trying to cause real harmful consequences for Tor (less hosts allowing it, etc) and for freedom on the Internet in general. Simply put, you are an enemy of freedom, so is it not normal to be angry at your enemies?
@rm_ in all fairness running TOR exit nodes is not safe in most places. Ask @William
1) Who said anything about running Tor exit nodes, or safety thereof;
2) Kindly look at this thread title;
3) and also at statements made, like "anyone that thinks that TOR is a good idea, or that it is in any way secure is probably [implied: not competent enough]" or "FBI and other LE run most of the relay nodes"; for the record they do not, it's a measurable matter of fact; etc, etc.
I think his point is that using tor is a good way not to have freedom as the FBI admitted to running the tor exit nodes, so your data in now going directly to the person you were trying to avoid. Then again the internets are just bits and bytes so who gives a shit right????
Btw I love freedom, thus why I am starting to encrypt all my traffic as it leaves my servers.
Not "running the tor exit nodes". (as in... all of them?)
FBI may run some of them. I do not believe it's even any sizeable chunk. The list of exit nodes is public, and the ones which push highest amounts of bandwidth are run by highly visible people and organizations, e.g. ipredator, torservers.net, Swiss Privacy Foundation, etc. And as any exit node operator, they may capture any unencrypted traffic that passes such exit node. Which is not news to anyone, that's why as you correctly noted encryption is the answer, and when using Tor, doubly so.
There can still be MITM attacks, but that is besides the point, you need to control all nodes on the way or at least all exits and all entrances to do some timing attacks but even so, it is much better than having your online history backed up at NSA. It MIGHT be nercepted in very few cases, but it IS in most cases if you do not use Tor.