Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > Security Matters
test
Security Matters Personal security is of the utmost priority. Discussions regarding every aspect of personal security within the hobby can be found here.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 649
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 398
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 283
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70819
biomed163610
Yssup Rider61217
gman4453331
LexusLover51038
offshoredrilling48791
WTF48267
pyramider46370
bambino43176
The_Waco_Kid37382
CryptKicker37228
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 06-12-2014, 03:14 PM   #1
want2c
Valued Poster
 
want2c's Avatar
 
Join Date: Nov 8, 2013
Location: okc
Posts: 1,264
Encounters: 33
Default Join the TOR Challenge

Tor relays are also referred to as "routers" or "nodes." They receive traffic on the Tor network and pass it along. Check out the Tor website for a more detailed explanation of how Tor works.
There are three kinds of relays that you can run in order to help the Tor network: middle relays, exit relays, and bridges.






Tor helps you hide your IP address and prevent browser fingerprinting, making it more difficult for online trackers and even governments to surveil you.

Tor is used by political activists, whistleblowers, journalists, domestic violence survivors, and average people around the world who need to shield their identities as they read and write online.




https://www.eff.org/torchallenge/
want2c is offline   Quote
Old 06-12-2014, 06:58 PM   #2
jframe2
Valued Poster
 
jframe2's Avatar
 
Join Date: Aug 5, 2010
Location: World Citizen
Posts: 886
Default

I posted the following in another thread and and just cutting and pasting it here.

"Actually we DO NOT need a bunch Eccie users turning their computers into Tor Relay's.

No offense to people that are not a bit tech savy, but the worst possible thing would be for someone to use the same computer for their Hobby/Eccie world and their civie life and open it up as an indiscriminate Tor Relay.

Tor ONLY assists in communication between parties, it does not prevent evil-doers from attacking the computer acting as a Tor relay. You need to be careful in your settings to assure you are not compromising your own PC if you are acting as a relay."
jframe2 is offline   Quote
Old 06-13-2014, 10:26 AM   #3
ck1942
Meet & Greet Organizer
 
ck1942's Avatar
 
Join Date: Dec 17, 2009
Location: "Hobbyverse"
Posts: 7,112
Encounters: 181
Default

Well said, jframe2!

What we really need to remembers, both providers and hobbyists, is personal hobby security as well as personal RW security. Giving out or collecting and keeping too much info is what usually gets any of us compromised.

And TORs work best with computers, not so much with cellphones or smart phones or tablets.

Thing is, while a TOR may hide your IP -- TORs don't necessarily conceal the data traffic.

So what you see me typing here, even if via TOR, is still very visible to anyone passing by. And, if there's a sniffer intercepting the traffic between my keyboard and this website, all of the traffic can be very visible to the interloper, and although the IPs may be disguised, those can be resolved or solved eventually.

Keeping your keyboard(s) secure is way more important, imo.
ck1942 is offline   Quote
Old 06-24-2014, 02:26 AM   #4
BigTitsNut
Registered Member
 
BigTitsNut's Avatar
 
Join Date: Apr 9, 2012
Location: St. Louis
Posts: 5
Exclamation TOR routing

Actually TOR encrypts traffic between each relay point but traffic from your computer to the first TOR network relay may or may not be encrypted and the traffic from the last TOR network computer to the website you wanted to look at. It's true that it's not perfect but it's better than leaving a complete plain text trail online that can point back to you like a big neon arrow..

See https://www.torproject.org/about/overview.html.en
BigTitsNut is offline   Quote
Old 06-24-2014, 01:19 PM   #5
Solitaire
Pending Age Verification
 
Solitaire's Avatar
 
User ID: 235014
Join Date: Mar 11, 2014
Location: Knoxville TN, Lafayette LA
Posts: 524
My ECCIE Reviews
Default certain needs

so... if I'm reading you right... for sake of example - if I am at a public library, and I use TOR: 1. will it allow me to access sites that would otherwise be blocked? and 2. would the administrator be able to see what sites I am accessing while on their network, and 3. If not TOR, then what program would facilitate this?
Solitaire is offline   Quote
Old 07-05-2014, 03:28 PM   #6
GneissGuy
Thank God it's Firday!
 
GneissGuy's Avatar
 
Join Date: Dec 12, 2009
Location: Austin, TX
Posts: 2,698
Encounters: 12
Default

Quote:
Originally Posted by ck1942 View Post
So what you see me typing here, even if via TOR, is still very visible to anyone passing by. And, if there's a sniffer intercepting the traffic between my keyboard and this website, all of the traffic can be very visible to the interloper, and although the IPs may be disguised, those can be resolved or solved eventually.
If your computer is set up right, and you use it right, TOR basically prevents anyone from snooping on your web browsing unless they have access to the segment of the network between the TOR exit node and the website you're going to.

For instance, your ISP can't see your data, your passwords, or even which web site you're going to. They can tell you're using TOR.

The above applies to people snooping on your WiFi, "rogue" WiFi hotspots, etc.

It doesn't cover every risk. It's not necessarily unbreakable. It's not perfect, but what is. It's valuable.

Note that the above comments are about the protection given by using TOR, not about whether you should run a TOR node yourself as part of "the TOR Challenge."
GneissGuy is offline   Quote
Old 07-05-2014, 03:32 PM   #7
GneissGuy
Thank God it's Firday!
 
GneissGuy's Avatar
 
Join Date: Dec 12, 2009
Location: Austin, TX
Posts: 2,698
Encounters: 12
Default

Quote:
Originally Posted by Solitaire View Post
so... if I'm reading you right... for sake of example - if I am at a public library, and I use TOR: 1. will it allow me to access sites that would otherwise be blocked? and 2. would the administrator be able to see what sites I am accessing while on their network, and 3. If not TOR, then what program would facilitate this?
If you're logged into their computer, they can log and see everything you do, including logging your passwords. They probably won't allow you to run TOR on their computer. It's even possible that one of the other computer users has put spyware on the library computer and is logging all this stuff.

If you're using their WiFi or network with your own computer, they can probably block your access to TOR and other proxy services. They probably have such services on their blocked IP address list.
GneissGuy is offline   Quote
Old 07-05-2014, 04:21 PM   #8
GneissGuy
Thank God it's Firday!
 
GneissGuy's Avatar
 
Join Date: Dec 12, 2009
Location: Austin, TX
Posts: 2,698
Encounters: 12
Default

Adding TOR gives you a lot of added protection to some threats, but it's not perfect.

Assume you log in to a web site through a valid TOR network with a valid TOR client.

Also assume your computer isn't compromised. (i.e. no spyware on your computer.)

Data goes through multiple computers, referred to as relays or nodes.

Your traffic (data) is encrypted by your computer and goes to an input relay. That relay node re-encrypts the data and passes the data to another "intermediate" relay. I think TOR sends the data through at least two intermediate relays. The last intermediate relay encrypts the data and sends it to an "exit" relay or TOR exit node.

The last exit node sends the data unencrypted to the web site.

When the exit node responds and sends data back, it sends unencrypted data back to the exit node, and it encrypts it and forwards it back through the same chain.

If you log into www.bob.com through TOR, the data between the exit node and www.bob.com is visible and readable to anyone just as if you connected to www.bob.com directly.

Anyone snooping at www.bob.com, the TOR exit node, or anywhere between those two nodes can see all your traffic. However, they cannot see your originating IP address.

Anyone snooping on your network, on any of the TOR relays other than the exit node, or any of the network cannot see your data or that coming back from the web site. They cannot see which web site you are connecting to.




Note that the link between the last node and the web site is in the clear and can be read by anyone who can see that data. The way to fix this is for the web site to support https. This encrypts all traffic on top of what TOR does. https prevents snooping on the last link in the chain and keeps anyone from snooping unless they have access to the internals of the computers at www.bob.com.

There are some potential weaknesses in the above system.

There could be some sort of hidden malicious code built into the TOR system.

There could be some sort of flaw, either malicious or accidental, in the code.

There could be a weakness, either malicious or accidental, in the math for the encryption used.

There are some more esoteric ways to attack a TOR connection, but they usually require quite a bit of resources on the part of the attacker.

Probably the biggest risk is a rogue TOR exit node. If the TOR exit node is compromised, it can see all your web browsing just like a wiretap at the web site's ISP can. That's why https is so important.
GneissGuy is offline   Quote
Old 07-07-2014, 05:59 AM   #9
jframe2
Valued Poster
 
jframe2's Avatar
 
Join Date: Aug 5, 2010
Location: World Citizen
Posts: 886
Default

GeneissGuy has put together a very good and descriptive bit on what/how TOR works.

We can now only hope that people will read all the messages and think about what it means before they start the "what if" questions.

Hats off to you GG.
jframe2 is offline   Quote
Old 07-12-2014, 03:24 PM   #10
Gollum
Gaining Momentum
 
Gollum's Avatar
 
Join Date: Jan 11, 2010
Location: Florida
Posts: 42
Encounters: 8
Default

TAILS works pretty good for TOR online anonymity on the go (e.g., a laptop). It takes some amount of tech savvy, however, to use it properly.

https://tails.boum.org/
Gollum is offline   Quote
Old 07-13-2014, 10:13 AM   #11
Doglegg
Valued Poster
 
Doglegg's Avatar
 
Join Date: Jan 10, 2010
Location: In the Land of Holilee.
Posts: 1,504
Encounters: 10
Default

Thanks to GneissGuy and Gollum, the information is accurate.

In order to use a 'LiveCD' operating system on a public computer, e.g. Library/Hotel, access to the BIOS is necessary to change the boot parameters from the computer hard drive to the CD-ROM or USB. This requires the computer to not have a locked BIOS. Some do, most do not.

After using a 'LiveCD' OS a few times it would get easier.

Having searched through a few hotel computers, it is fairly easy to pick out the working girls, the sites used and their advertisement pictures. Good stuff for the curious.

The key to proxy blockers is having a secured virtual private network to a VPN router/server. It appears the product Gollum linked does this to a TOR network.

It is very possible that this will work until the proxy or firewall updates block the IP of the VPN, in which case an update of the product will have to provide a new address to bypass the blockade.

Thanks for sharing the info.

Dogg
Doglegg is offline   Quote
Old 07-13-2014, 11:26 PM   #12
DangedDragon
Gaining Momentum
 
DangedDragon's Avatar
 
Join Date: May 27, 2014
Location: USA and/or Philippines
Posts: 53
Default

Quote:
Originally Posted by Solitaire View Post
so... if I'm reading you right... for sake of example - if I am at a public library, and I use TOR: 1. will it allow me to access sites that would otherwise be blocked? and 2. would the administrator be able to see what sites I am accessing while on their network, and 3. If not TOR, then what program would facilitate this?
Having set up systems for libraries and schools several times...here's what "should" happen.

1. Tor may be blocked. Some libraries actually install Tor for private browsing, which is a topic frequently discussed in their IT forums.
2. Yes - They log websites visited, review reports, and adjust firewall/proxy/filter setting appropriately. (Note: Many libraries DO NOT censor adult access, but may filter out images from certain adult sites.)
3. NONE

In general librarians are very anti-censorship, preferring to give complete access to adults, but with a protective eye towards other patrons.

Libraries and schools "can be" very strict on their rules, logging, and filtering. Schools more than libraries. Libraries are virtually required to log and filter if they accept federal funds, which most do. Schools are in the same boat. If they accept federal funds they are filtering and logging. (Note: the filters may be very lenient..) I cannot comment on University settings, since I never setup any of their systems.

They can pull reports on which computer accessed what sites at what time and cross reference it to the person who "checked-in" to that computer. I have never seen LE request them to do it, but I know it can be done because I taught a couple librarians how to pull the reports, and yes, they do review those reports frequently.

Hotels could install similar systems, but I never had any request it. They usually wanted to focus on only two factors. Protect our office systems and make it cheap. Same with fast food and restaurants where I installed systems..cheap without logging was the rule.

If you are wondering about bypassing those filters, just be aware that will still get logged. It may show up as VPN traffic, or another type of traffic, but that will key a good admin to keep a closer eye on that user, which often leads to screen recording.

Libraries are a horrible place to do anything questionable.
DangedDragon is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved