TeonX said:Connection to ancient-forums.com is https encrypted, that means as long as you don't give out logs to the german police nobody can be prosecuted.
TeonX said:Connection to ancient-forums.com is https encrypted, that means as long as you don't give out logs to the german police nobody can be prosecuted.
Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
NameHere said:Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
Excuse my interruption, but I wanted to ask you of this:
What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
I heard someone ask this somewhere else before, similar to this, but it wasn't an SS platform sadly. They didn't know about jews, I am just elaborating the question more.
Thanks!
Hail Satan!
NameHere said:Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
Excuse my interruption, but I wanted to ask you of this:
What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
I heard someone ask this somewhere else before, similar to this, but it wasn't an SS platform sadly. They didn't know about jews, I am just elaborating the question more.
Thanks!
Hail Satan!
NameHere said:What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
slyscorpion said:Tor as far as I know is mostly used for illegal things some of this stuff really bad even by standards of what's normally illegal and would give most people here nightmares if they saw it. This can be found on there on the tor thing. Maxine even posted on this. I dont know why we are being encouraged to use this. But if this is so it does mean that its very unlikely that anyone is tracking anything at all and it does means its probably pretty secure. Though I would be surprised if the Jews didnt run this for the reason I said.
I agree. Everyone should use one of these two when connecting to the forum.Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
They're both totally open-source. You can read and check the code with your own eyes.NameHere said:Excuse my interruption, but I wanted to ask you of this:
What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
slyscorpion said:NameHere said:Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
Excuse my interruption, but I wanted to ask you of this:
What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
I heard someone ask this somewhere else before, similar to this, but it wasn't an SS platform sadly. They didn't know about jews, I am just elaborating the question more.
Thanks!
Hail Satan!
Tor as far as I know is mostly used for illegal things some of this stuff really bad even by standards of what's normally illegal and would give most people here nightmares if they saw it. This can be found on there on the tor thing. Maxine even posted on this. I dont know why we are being encouraged to use this. But if this is so it does mean that its very unlikely that anyone is tracking anything at all and it does means its probably pretty secure. Though I would be surprised if the Jews didnt run this for the reason I said.
Pirate11 said:I agree. Everyone should use one of these two when connecting to the forum.Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
They're both totally open-source. You can read and check the code with your own eyes.NameHere said:Excuse my interruption, but I wanted to ask you of this:
What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
TOR bounces your connection a few times in a random way before reaching the destination. It's like that: <you><entry node><middle node><exit node><website>. Every node can only see the one previous node and the one right next and have no way to know what position they are (except for the exit node, who can't know where the request is from anyway). No one "gives away your personal information" because in the first place you provide none. Want proof? Either check documentation or browse the source code, it's free, open and maintained by volunteers.
Want to know what harms your privacy and tracks you down? That's Microsoft Windows, Google, Google Chrome and Android. Be safe
EDIT I ignored VPNs but have no time rn. Avoid free VPNs at all cost.
Pirate11 said:I agree. Everyone should use one of these two when connecting to the forum.Shrekelstein said:Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.
They're both totally open-source. You can read and check the code with your own eyes.NameHere said:Excuse my interruption, but I wanted to ask you of this:
What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
TOR bounces your connection a few times in a random way before reaching the destination. It's like that: <you><entry node><middle node><exit node><website>. Every node can only see the one previous node and the one right next and have no way to know what position they are (except for the exit node, who can't know where the request is from anyway). No one "gives away your personal information" because in the first place you provide none. Want proof? Either check documentation or browse the source code, it's free, open and maintained by volunteers.
Want to know what harms your privacy and tracks you down? That's Microsoft Windows, Google, Google Chrome and Android. Be safe
EDIT I ignored VPNs but have no time rn. Avoid free VPNs at all cost.
Syntax said:You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
Unfortunately you are wrong mate. This is HTTPS encrypted, the exit node can only see an encrypted request coming from the previous node to the normal internet. It can see someone on the TOR network wants to be connected to the forums, but can't see any of the data because it's encrypted. MITM attacks are much more complicated. TOR is perfectly safe and anonymous.Syntax said:You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
Syntax said:You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
Syntax said:If you aren't paying for a product then you ARE the product
Shrekelstein said:That's impossible as Tor is decentralized. There isn't any central organization or server that collects and stores any of your information, but its just a network of volunteers that act as relay servers. Tails is a Debian-based Linux distribution that uses Tor you write it USB drive and doesn't store anything about the current session in your hard drive. It's fully open source so if it contained something nasty in its code there would be a fork that removed that nasty part of the code, much like there is Ungoogled Chromium, a fork of Google's open-source Chromium project without any google spyware in it and with increased privacy functions.
NameHere said:What proof do you have that Tor/Tails isn't being controlled by the Jews? Or not giving away your personal information to who knows where?
Very few use it for illegal/pedo stuff. Even in onion-hosted sites (which you can only visit with Tor) most forums/sites dislike pedos or criminals and make that explicit so these types of people don't join. Most just use it to bypass restrictions/censorship and for anonymity. In general, any good piece of software that makes you completely anonymous will be used by a few people for illegal/nasty purposes and you can do nothing about that. However it doesn't mean that everyone who uses it uses it for that purpose. Tor users are distrusted by some countries for that reason, and if you live in such a country you can use an obfuscated bridge to access Tor so that your ISP will not know you're using Tor.
slyscorpion said:Tor as far as I know is mostly used for illegal things some of this stuff really bad even by standards of what's normally illegal and would give most people here nightmares if they saw it. This can be found on there on the tor thing. Maxine even posted on this. I dont know why we are being encouraged to use this. But if this is so it does mean that its very unlikely that anyone is tracking anything at all and it does means its probably pretty secure. Though I would be surprised if the Jews didnt run this for the reason I said.
Pirate11 said:Unfortunately you are wrong mate. This is HTTPS encrypted, the exit node can only see an encrypted request coming from the previous node to the normal internet. It can see someone on the TOR network wants to be connected to the forums, but can't see any of the data because it's encrypted. MITM attacks are much more complicated. TOR is perfectly safe and anonymous.Syntax said:You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
While VPNs are an alternative to TOR, you are trusting a private company anyway. There's a nice website that compares all VPNs characteristics but I don't remember its name. VPN providers cannot see either what exactly you are doing within a website, but can see that YOU specifically are connected to it (as opposite to TOR where the exit node only knows someone - generic - is). It's easier to track you down using a normal VPN.
Keep safe
Shrekelstein said:Even paid VPN's are the same thing as Tor. They can see all the info you put in. You have to take their word that they don't keep any logs or spy on you as it's impossible to know for sure. Free VPN's are worse, sure, but I mean, isn't all those sites shilling Nord VPN in their ads a little bit suspicious? This video explains it
https://youtu.be/FMScV1Mkaok
Syntax said:You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
Nope, they have strong encryption actually:Syntax said:Thank you for your information. This is very beneficial to know. If I recall correctly onion services do not have proper encryption and thus all information is plaintext. Perhaps that is where my confusion came from.
Source: Link to Wikipedia.Wikipedia said:Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination
There are VPNs who apparently have proven by a way or another that they do not keep logs.Shrekelstein said:Even paid VPN's are the same thing as Tor. They can see all the info you put in. You have to take their word that they don't keep any logs or spy on you as it's impossible to know for sure. Free VPN's are worse, sure, but I mean, isn't all those sites shilling Nord VPN in their ads a little bit suspicious? This video explains it
I think it might be Restore Privacy,Pirate11 said:There's a nice website that compares all VPNs characteristics but I don't remember its name.
"It is my desire that all my followers unite in a bond of unity, lest those who are without prevail against them." - Satan