Source
The Tin Hat ... lol https://thetinhat.com/tutorials/darknets/tor-vpn.html TOR vs VPN | WHICH TO USE Tor & VPN described as often conflated -- but Tor & VPN are different -- which is more suitable depends on context Essentially:
Tor: for activists & 'secret squirrels' / not for video downloads
[caution: not bullet-proof]
vs
VPN: for (not vital) everyday anonymity / good for downloads
VPNs -- take connection -- encrypt connection -- pass connection through server -- contact goes via VPN server to connection site sought -- ie: it provides encryption & diversion of your online traffic
A.
-- what you are doing & who you are connecting with not visible-- eg. public wifi: those watching get jumbled info sent to random server -- same applies to Internet Service Provider (ISP) B. -- site visited does not know your geolocation (privacy enhanced) -- this permits by-passing geographic restrictions on services Note: * what you do through VPN is know by operator of the VPN * VPN services claim not to log activity but this is only a representation that may be dishonoured * eg. if VPN provider is issued with a court order for info on your activities * VPN provider would likely find some way to link your activity back to you * So: VPN = good for low risk situations * BUT not so good for anonymity against a state actor Tor Browser -- works differently -- instead of connecting directly to server -- your connection is encrypted, bounced around x3 servers ('relays' or 'nodes') -- before being decrypted & sent to destination -- FIRST SERVER - knows your location -- SECOND SERVER - only knows data from FIRST SERVER -- THIRD SERVER - only knows that data from SECOND SERVER -- anonymity is provided as the third server cannot know origin of data -- majority of Tor servers not 'malicious' (do not log activity) -- nearly impossible to associate end-data of chain to origin -- very effective / takes significant state actor effort to de-anonymise -- bonus: encryption by Tor to prevent - eg. ISP from seeing your traffic -- caution: decryption at last server ('exit relay') = point of vulnerability -- it is at this point your data can be spied upon -- therefore regular HTTP unencrypted connection relay of data (a no-no) -- can be read in its entirety at the exit relay by the operator of the exit relay -- however, using an add-on like HTTPS-Everywhere -- equals safely encrypted data -- with HTTPS even malicious server could not de-anonymise * unless content contains personal info (email, name, address, etc) COMMENT: I'm confused. If HTTPS is supposed to be an encryption add-on -- how can a malicious server de-anonymise if personal data is included -- if encryption is supposed to be in place? -- makes no sense to me: that's not encryption TOR - HIGHER SECURITY PRIVACY BROWSING ANONYMITY vs SPEED -- much slower than VPN -- but far better re anonymity -- avoid watching videos or downloading torrents -- bad for entire network & extremely slow -- best for high level anonymity needs -- eg. high threat levels = law enforcement scenarios -- journalists dealing w. sensitive sources, whistleblowers, political activists -- those living under oppressive state surveillance etc [comment: all of us under US empire mass surveillance oppression ... LOL] -- use Tor if adversary is "more dangerous than a DMCA complaint" (copyright) -- promises provided by VPN companies = not enough. Use Tor. -- *do not treat Tor as if it were bullet-proof -- with enough time, de-anonymization is possible by agencies such eg. NSA -- using Tor = best bet, unless you are an NSA high-value target -- using tor for low bandwidth static sites helps 'populate' the Tor traffic -- & providing cover for those who need Tor for vital reasons -- note: Tor is only an ANONYMITY TOOL -- without operational security (see OPSEC), anonymity tools rendered useless -- watch bad habits - can reveal ID to the motivated adversary -- keep torrenting to VPN -- VPN - EVERYDAY BROWSING PRIVACY -- VPN good for low-risk/bandwidth-heavy purposes -- VPN's are good for VIDEOS & TORRENTS task OPSEC -- operational security https://grugq.github.io/ The Grugq -- teach operational security (OPSEC) -- ie good security habits http://grugq.tumblr.com/ Source: The Tin Hat https://thetinhat.com/tutorials/darknets/tor-vpn.html |
TOKYO MASTER BANNER
MINISTRY OF TOKYO
|
April 01, 2016
TOR vs VPN | WHICH TO USE
WikiLeaks: Google & Al-Jazeera Encouraged Civil War In Syria
Article SOURCE http://www.mintpressnews.com/wikileaks-google-al-jazeera-encouraged-civil-war-syria/215163/
It took the Western alliance 8 years to set up opposition in the Libya and to attack Libya in 2011, in the guise of 'protecting' the civilians: a population that was then pitched into civil war that still continues.
PS ... |
Actual Crimes vs. 'Theoretical' Crimes - USA: Free Viktor Bout
Article SOURCE as marked Actual Crimes vs. 'Theoretical' Crimes USA: Free Viktor Bout
The US makes sure that it is not held accountable for the crimes it commits -- crimes against entire countries (eg illegal bombing Serbia; illegal invasion Iraq; massive civilian casualties Afghanistan; 500,000 dead children Iraq; destruction of Libya; proxy attack on Syria; destabilising Africa and Middle East (plus loss of life, displaced persons etc) and so on. Actual crimes.
IRAQ - 500,000 Dead Children
'WORTH IT'
Check out their over 30 CIA agents kidnapping and illegal transfer for torture from what is supposed to be a sovereign state: Italy (above).
|
Ukraine Intelligence (SBU) and CIA - Plot to Seize Russian FSB Officer Uncovered
Article SOURCE http://www.upi.com/Top_News/World-News/2016/03/31/CIA-trained-Ukrainian-spy-arrested-in-Russia/1101459427710/ Ukraine Intelligence (SBU) and CIA - Plot to Seize Russian FSB Officer Uncovered
|
Book: THE WIKILEAKS FILES - 24-hr Freebie: e-book
1-DAY FREEBIE
|
The Kitchen - Scallopini
Chicken Scallopini
(Very overdone ... oops)
Click to Enlarge
Click to Enlarge
Click to Enlarge
|
March 31, 2016
Google - YouTube - Filthy Censoring, Harassing Corporate American US State Dept. Embedded C*NTS
Google - YouTube
Filthy Censoring, Harassing
Corporate American
US State Dept. Embedded C*NTS
From Russia
With LOVE xxx
Code produced by 'Insert a Video'
[CLICK IMAGE TO ENLARGE]
Shows Upload While Editing No Show on Publishing (Example - Post) COMMENT Western CENSORSHIP & harassment. |
Subscribe to:
Posts (Atom)