Post
Topic
Board Politics & Society
Re: Advanced Tor Browser Bundle config. - Anti-Spying - Anti-ECHELON - Anti-FiveEyes
by
BitcoinFX
on 23/03/2014, 22:16:56 UTC
mamma mia, you have to learn about methods of work of secret service.

They infiltrate human rights organizations and privacy organizations, your strategy is wrong from the beginning.

and those who work for secret service surely have money to employ very fast servers. ordinary users who are not working for the gov, they employ slow servers. some of ordinary users can be snitches but many are not, they employ server from their pocket, they don't get funding from the gov or from riches who work for the gov.

solution is in employing thousands of small servers, not choosing the fastest ones. therefore tor network need more users who will donate bandwidth and servers.

by the way, there are 9 eyes, not only 5.
so, 5 eyes + Denmark, Norway, France, Netherlands.

additional material for reading (How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations): https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/

what they do at internet, they do the same in reality.



Whilst the title of this thread is perhaps sensational this topic is really about demonstrating how Tor can be used in different ways.

The configs that I have posted do make Tor faster for regular internet browsing and are also geared towards improving privacy, anonymity and security for the user, whoever they may be. Remember that this config also attempts to avoid known 'bad' Tor nodes as well.

These configs also take into consideration which Tor servers are the most useful when building fast circuits. The Tor network is actually not very big. The ideal situation is for more Tor users to be running Tor relays ! Join the Tor Network ! - https://www.torproject.org/getinvolved/relays

When using these configs the Tor software will still randomly select servers as the middle node and can also still make connections to all existing Tor servers (when not enforcing StrictNodes 1) These configs simply let the Tor client know what the preferred servers are to attempt to build circuits with.

As I've stated if you don't like an existing setting or you want to try to avoid building certain circuits then you can edit the config to that effect. My aim is to empower Tor users to get the most out of Tor for their intended purpose.

All countries, internet service providers, internet backbone providers are pretty much 'spying' on their citizens or customers and logging internet traffic and/or blocking various websites etc. Almost all Tor circuits will cross most major internet Tier pipelines at some point during your browsing session and being on the busiest routes can actually be beneficial to a users privacy.

Five-Eyes countries: https://wikipedia.org/wiki/Five_Eyes

ECHELON: https://wikipedia.org/wiki/ECHELON

Internet Backbone: https://wikipedia.org/wiki/Internet_backbone

Internet Censorship: https://wikipedia.org/wiki/Internet_censorship

You do make a valid point with regards to perhaps building a config that tries to avoid the major Tor nodes and main routes. It would ofc be much slower by comparison.

...

I in fact run a Tor Relay from my 'home' ISP on a static IP and have done so for a good number of years now.

Lastly, what happens on the internet is not always a reality or real life.