• Members of the previous forum can retrieve their temporary password here, (login and check your PM).

Skype

Migrated topic.
Thank you for this info, A1pha. I've used Skype before for... less than legal activities, and it's good to know it could be monitered.

I'm wondering if we are gonna have to resort to using carrier pigeons to remain anonymous.
 
The Electric Hippy said:
Thank you for this info, A1pha. I've used Skype before for... less than legal activities, and it's good to know it could be monitered.

I'm wondering if we are gonna have to resort to using carrier pigeons to remain anonymous.

I use to work for an isp and watched the feds come in and dig out data from our servers that even the owners didnt know existed and they were a couple of hardcore hacks.

If it is digital it can be traced no matter how anon. you think you are being.

What gets me is that now I am telemarketing calls from the same area code as one of the vendors that is promoted here.

Just saying.:shock:
 
Journeymann said:
The Electric Hippy said:
Thank you for this info, A1pha. I've used Skype before for... less than legal activities, and it's good to know it could be monitered.

I'm wondering if we are gonna have to resort to using carrier pigeons to remain anonymous.

I use to work for an isp and watched the feds come in and dig out data from our servers that even the owners didnt know existed and they were a couple of hardcore hacks.

If it is digital it can be traced no matter how anon. you think you are being.

What gets me is that now I am telemarketing calls from the same area code as one of the vendors that is promoted here.

Just saying.:shock:

How reliable is the Tor Browser for staying hidden? If I were posting here through Tor, would Uncle Same be able to tell it's me?

Edit: reworded my question
 
Elec.Hippy... I have no idea about the TORs ability to do what it says it does as I have no way to confirm what they are doing is strong or weak. I never got into the low level programming side of networking and the tcp/ip protocol.

I use it (tor) and am constantly using the new identity tab just to make sure I am not sitting on anyone ip address for along period. If I am online when most users are sleep then I use the new identity tab even more.

Personally, I would not doubt that "they" are here watching our every move no matter what country you live in.

But that is just my level of concern. Id rather be parinoid to the max and be on my toes with what I say then too loose.
 
The Electric Hippy said:
How reliable is the Tor Browser for staying hidden? If I were posting here through Tor, would Uncle Same be able to tell it's me?
There are so many variables in the equation that it is almost impossible to answer this question. Simple answer: It's pretty reliable but there are certain known vulnerabilities like control over exit nodes and digital fingerprinting.

Check your digital fingerprint: Cover Your Tracks
Test your anonymity: http://ip-check.info/

InMotion said:
Any replacements?
SILC
 
Following up on this, for any of you not paying attention to the Snowden affair.

NSA taps Skype chats, newly published Snowden leaks confirm
Ars

How Microsoft handed the NSA access to encrypted messages
The Guardian

I am truly puzzled by the reaction, or lack thereof, by my fellow Americans. As these documents continue to surface I see almost all the focus on Snowden while hardy none towards the gross violations of Constitutional and International Rights. If you're interested, Snowden made a statement today, 12 July.
 
TorChat, guys. TorChat.

There are issues when using Tor browser on regular internet protocols, http, php, etc., but anytime you are connected to an .onion protocol using the Tor browser (ie, TorChat), you are bulletproof. Just download the Tor browser, find your way to the TorChat website, and make sure the website in the browser ends with .onion

FYI, Tor and the .onion encryption protocol were created by the American military, which is why it is so good.
 
Ok perhaps bulletproof was the wrong word to use. The main vulnerability though is having your data mined, or decrypted (which would take some serious tech savvyness and most likely some degree of phishing to pull off). If you are using Tor correctly, they should have no way of viewing your communications or figuring out your real IP address. It's only when Tor is used incorrectly that an attacker can exploit the vulnerabilities created (through improper use). Using a regular Tor browser on your own computer at home is very safe (a lot safer than skype, anyway).

If bulletproof does interest you though, look into a bootable Liberte Linux OS flash drive, and then run TorChat.

Ok.. not quite bulletproof yet ...

Go to a free WiFi hotspot, load up Liberte Linux OS, log into TorChat ...

Ok... almost there.

Now use PGP encryption (peer to peer encryption) to talk on TorChat.

You are now officially bulletproof.
 
Also, about the exit nodes and relays.. it's pretty obvious by now that Tor is not under any US gov umbrella, otherwise the whole thing would have been shut down a while ago. Anyone can create floating points in the Tor network with enough know how. Yes, it is US gov technology, but its source has been opened and it is now being utliized by an oppressed world. Just check out the Tor project website, read their updates and see what it's all about.

It really boils down to using Tor correctly, and only visiting .onion websites which are trusted (like TorChat).

Lastly, there is quite a hefty learning curve to all of this.

It took me about 4 months of constant research to figure out the ins and outs of being bulletproof online. For example, you will have to find out what "using Tor correctly" really means, among other things.

I'm not going to go into it any more than I have...
I've provided enough information and the people who want to will figure it out on their own.

The best thing to be while big brother is watching, is anonymous.
 
causmic said:
It took me about 4 months of constant research to figure out the ins and outs of being bulletproof online. For example, you will have to find out what "using Tor correctly" really means, among other things.
Yup, agreed completely. And good posts above.

There is a steep learning curve to get it all right which is typically why I don't recommend Tor unless the user knows exactly what they are doing and the primary vulnerabilities. Tor can be an effective tool if used correctly but all too often I see people get a false sense of security from it while being unaware of the dangers and steps needed to protect oneself.

Looks like you know what you're doing and even if the US still had control of a group of nodes and relays it is still a pretty good layer of protection when used with other tools. That, and there is very little chance a state agency would reveal control of the nodes to capture some psychedelic users. They have bigger fish to fry.

Thanks again for the posts above. Good stuff.
 
a1pha said:
..and even if the US still had control of a group of nodes and relays it is still a pretty good layer of protection when used with other tools. That, and there is very little chance a state agency would reveal control of the nodes to capture some psychedelic users. They have bigger fish to fry.

Exactly. Plus, the more people using the Tor network, the more anonymous and secure it will be. Tor is a great place to start, and then you can add layers upon layers of protection ontop of it as your proficiency (and your paranoia) increases.

a1pha said:
Thanks again for the posts above. Good stuff.

I will gladly help my brethren wriggle free from the surveillance state that has risen up around us, in any way I can 8)
 
Back
Top Bottom