a1pha said:
anonenium said:
we need to have a hidden access points for this website, hopefully among them is a node inside the tor network that will allow us who already are using tor to not use an exit relay to get into this site.
it would be a fairly simple matter to do and i implore everyone here to please raise this question with trav when you see him.
Maybe you missed my other post. I will copy it here for posterity.
a1pha said:
a1pha said:
dreamer042 said:
Am I just being ignorant, or are others being overly paranoid?
Guess who the target is on these days: users of anon networks.
Interesting development:
Use of Tor and e-mail crypto could increase chances that NSA keeps your data
While the documents make clear that data collection and interception must cease immediately once it's determined a target is within the US, they still provide analysts with a fair amount of leeway. And that leeway seems to work to the disadvantage of people who take steps to protect their Internet communications from prying eyes. For instance, a person whose physical location is unknown—which more often than not is the case when someone uses anonymity software from the Tor Project—"will not be treated as a United States person, unless such person can be positively identified as such, or the nature or circumstances of the person's communications give rise to a reasonable belief that such person is a United States person," the secret document stated.
Procedures used by NSA to minimize data collection from US persons: Exhibit B – full document
Two more things to consider-
Tor isn't bulletproof, even if the server is a hidden onion service. Theres numerous sucessful attacks that show otherwise. Granted, its a good tool, but like what was said above, using it attracts attention to yourself. Then more resources are put towards determining why you are attempting to conceal your communications.
That would only work if you convinced the whole country to go along just to piss off the feds. And probably require restructuring the tor network for such a massive increase in scale. The point being, using tor, is now reasonable suspicion to monitor your communications according to the US Gov.
And my 2nd point-
Tor was created by the US government, more specifically US naval research, and darpa. IT currently receives 80% of its funding from the us government. I'm not saying the us government influences tor or has back doors into the network, but what, they praise it for use by dissidents in other countries (egypt, china, iran, etc, etc), but condemn and target the users of tor domestically?
Sounds about right to me. :!:
When the legitimate enemies they are looking for are using the same tactics the private citizens who wish to remain anonymous for non illegal or malicious reasons, you dont want to be an innocent private citizen in that scenario.
Especially when you may/may not disagree with your government on other grounds, but not willing to take up arms against innocent victims of the state/civilians. Like recreational drug users, like political dissidents to the culture of corruption in dc. I even read the text of martial law and emergency continuity of government legislation passed in the last 30-40 years or so. In times of social unrest, they're free to use these systems, these databases, to target civilians who politically dissent the governments actions.
IE-
Rex-84
National Emergencies Act
You want to know what the difference between a totalitarian state and the US government is?
Nothing, if we've been in a perpetual state of emergency with iran since the carter administration, renewed by the Obama administration, then technically they could suspend the constitution, or already have.
And if thats not the case, its just a matter of time folks.
Back on subject, i'd stick to a vpn and ssl on a sterile os. SSL/VPN's are widely used, and provide some cover in the crowd. Tor is a very, very, small crowd to pick from, but harder to find. 'I'll go with safety in numbers.