TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  

April 01, 2016

TOR vs VPN | WHICH TO USE

Source

The Tin Hat ... lol
https://thetinhat.com/tutorials/darknets/tor-vpn.html

 

TOR vs VPN | WHICH TO USE


Tor & VPN described as often conflated
-- but Tor & VPN are different
-- which is more suitable depends on context


Essentially:

Tor:  for activists & 'secret squirrels' / not for video downloads
[caution:  not bullet-proof]
vs
VPN:  for (not vital) everyday anonymity / good for downloads


VPNs

-- take connection
-- encrypt connection
-- pass connection through server
-- contact goes via VPN server to connection site sought
-- ie:  it provides encryption & diversion of your online traffic



A.
    -- what you are doing & who you are connecting with not visible
    -- eg. public wifi:  those watching get jumbled info sent to random server
    -- same applies to Internet Service Provider (ISP)


B. -- site visited does not know your geolocation (privacy enhanced)
    -- this permits by-passing geographic restrictions on services

Note:

* what you do through VPN is know by operator of the VPN
* VPN services claim not to log activity


 but this is only a representation that may be dishonoured

* eg. if VPN provider is issued with a court order for info on your activities
* VPN provider would likely find some way to link your activity back to you
* So:  VPN = good for low risk situations
* BUT not so good for anonymity against a state actor


Tor Browser
-- works differently
-- instead of connecting directly to server
-- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes')
-- before being decrypted & sent to destination
-- FIRST SERVER - knows your location
-- SECOND SERVER - only knows data from FIRST SERVER
-- THIRD SERVER - only knows that data from SECOND SERVER
-- anonymity is provided as the third server cannot know origin of data

-- majority of Tor servers not 'malicious' (do not log activity)
-- nearly impossible to associate end-data of chain to origin
-- very effective / takes significant state actor effort to de-anonymise

-- bonus:  encryption by Tor to prevent - eg. ISP from seeing your traffic
-- caution:  decryption at last server ('exit relay')  = point of vulnerability
-- it is at this point your data can be spied upon
-- therefore regular HTTP unencrypted connection relay of data (a no-no)
-- can be read in its entirety at the exit relay by the operator of the exit relay
-- however, using an add-on like HTTPS-Everywhere
-- equals safely encrypted data

-- with HTTPS even malicious server could not de-anonymise
    * unless content contains personal info (email, name, address, etc)

 

COMMENT:
I'm confused.  If HTTPS is supposed to be an encryption add-on
-- how can a malicious server de-anonymise if personal data is included
-- if encryption is supposed to be in place?
-- makes no sense to me:  that's not encryption


TOR - HIGHER SECURITY PRIVACY BROWSING
ANONYMITY vs SPEED

-- much slower than VPN
-- but far better re anonymity
-- avoid watching videos or downloading torrents
-- bad for entire network & extremely slow

-- best for high level anonymity needs
-- eg. high threat levels = law enforcement scenarios
-- journalists dealing w. sensitive sources, whistleblowers, political activists
-- those living under oppressive state surveillance etc

[comment:  all of us under US empire mass surveillance oppression ... LOL]
-- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright)
-- promises provided by VPN companies = not enough. Use Tor.
-- *do not treat Tor as if it were bullet-proof
-- with enough time, de-anonymization is possible by agencies such eg. NSA
-- using Tor = best bet, unless you are an NSA high-value target
-- using tor for low bandwidth static sites helps 'populate' the Tor traffic
-- & providing cover for those who need Tor for vital reasons
-- note:  Tor is only an ANONYMITY TOOL

-- without operational security (see OPSEC), anonymity tools rendered useless
-- watch bad habits - can reveal ID to the motivated adversary

-- keep torrenting to VPN

-- VPN - EVERYDAY BROWSING PRIVACY
-- VPN good for low-risk/bandwidth-heavy purposes
-- VPN's are good for VIDEOS & TORRENTS task


OPSEC
-- operational security
https://grugq.github.io/

The Grugq
-- teach operational security (OPSEC)
-- ie good security habits

http://grugq.tumblr.com/



Source:  The Tin Hat
https://thetinhat.com/tutorials/darknets/tor-vpn.html
 

No comments: