STEAM-GROEP
The Onion Router (TOR) Tor Project
STEAM-GROEP
The Onion Router (TOR) Tor Project
3
IN SPEL
18
ONLINE
Opgericht
13 februari 2014
Taal
Engels
Locatie
Germany 
OVER The Onion Router (TOR)

Protect your privacy. Defend yourself against network surveillance and traffic analysis.

First. Im not a developer at the Tor Project, just a fan of this.

Tor (previously an acronym for The Onion Router) is free software for enabling
online anonymity and censorship resistance.

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis.
Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored.

An extract of a Top Secret appraisal by the NSA characterized Tor as "the King of high secure, low latency Internet anonymity" with "no contenders for the throne in waiting".

The term "onion routing" refers to layers of encryption, nested like the layers of an onion, used to anonymize communication.
Tor encrypts the original data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays.
Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it.
The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address.

Since the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communication can be de-anonymized through network surveillance that relies upon knowing its source and destination.

Tor Hidden Services (.onion land)

Tor can also provide anonymity to websites and other servers.

Servers configured to receive inbound connections only through Tor are called hidden services.
Rather than revealing a server's IP address (and thus its network location), a hidden service is accessed through its onion address.
The Tor network understands these addresses and can route data to and from hidden services, even to those hosted behind firewalls or network address translators (NAT), while preserving the anonymity of both parties.
Tor is necessary to access hidden services.

Hidden services have been deployed on the Tor network since 2004.
Other than the database that stores the hidden-service descriptors, Tor is decentralized by design; there is no direct readable list of all hidden services, although a number of hidden services catalog publicly known onion addresses.

Because hidden services do not use exit nodes, connection to a hidden service is encrypted end-to-end and not subject to eavesdropping.
There are, however, security issues involving Tor hidden services.

Tor Project[www.torproject.org]
Tails (Live Debain based OS that routes all traffic through Tor)[tails.boum.org]
Tutorial for newbs to accses .onion Sites (Darknet)[www.deepdotweb.com]
POPULAIRE DISCUSSIES
RECENTE AANKONDIGINGEN
Just some free games :)
Chronicles of Mystery: The Scorpio Ritual: W2INZ-NAKV6-GF3YB

Universe Sandbox: EN68J-2AH6K-9392P

Nuclear Dawn: I4VGI-Z5H09-VAINT

Some Origin Codes I have stumbling arround :)

#DEAD SPACE 62P7-P2Y6-R4JU-TUUH-J6XN D3PX-7UN3-H62X-U77C-6BPB #BURNOUT PARADISE: THE ULTIMATE BOX 9STK-W6HM-LDJQ-BUH2-V8BB 7NK3-BSBL-QDWF-JRWS-V54R #CRYSIS 2 MAXIMUM EDITION 3SLU-W6RE-MRJA-GYJY-SH33 #MIRRORS EDGE DYYG-V7WR-F9MB-PTGW-4KUG 456N-L9W2-9694-G7S3-MNY5 3DTT-T5D5-FQZX-WLAN-KD4N


Save Exit Nodes!
ExitNodes $Fingerprint here,$Fingerprint here,$ to add Fingerprints StrictNodes 1 forces Tor to only use these Exitnodes

Add at least 20 Nodes to be secure, if lower use the randoms which can be controlled by NSA

Fingerprints here
http://www.privacyfoundation.ch/de/service/server.html
https://atlas.torproject.org/#search/chaoscomputerclub
http://www.torservers.net/exits.html

TOR itself can't be broken ATM, you can ONLY be tracked through Browser Exploits or Unsafe Behavior!

The NSA hates Tor ^^

http://cryptome.org/2013/10/nsa-tor-stinks.pdf

Learn how Tor works:
https://www.torproject.org/images/htw2.png

Learn how Hidden Services Works:
http://cache.boston.com/bonzai-fba/Globe_Graphic/2012/03/08/globegiftastic__1331188442_1190.gif

3 opmerkingen
prp 30 okt om 12:54 
free silk road
I trane ufc 13 feb 2014 om 11:20 
Freedo is in the group. Awesome!
mynt<> 13 feb 2014 om 11:13 
Feel free to use the forums ;)
3
IN SPEL
18
ONLINE
6 IN CHAT
Meechatten
Opgericht
13 februari 2014
Taal
Engels
Locatie
Germany