ZOG has been funding Tor

Surprise! Everyone with a fucking brain here has been saying this for years. Now here is the proof:

Tor, free software which enables anonymous communication over the internet, is a “privatized extension of the very same government that it claimed to be fighting,” claims journalist Yasha Levine, who obtained 2,500 pages of correspondence about the project via Freedom of Information Act (FOIA) requests.

rt.com/usa/420219-tor-us-government-funded-bbg/

archive.is/V4C6o

Other urls found in this thread:

en.wikipedia.org/wiki/Onion_routing
techrepublic.com/article/hi-five-unleashed-the-first-linux-capable-risc-v-single-board-computer-is-here/
twitter.com/yashalevine/status/969702907988889601
blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915
twitter.com/SFWRedditVideos

...

==Any of you idiots who think you've been outwitting ZOG by using Tor, when you were told over and over it was developer by the US Navy and run by a gaggle of Jews, how do you feel now== ?

Holla Forums was right again

Everyone fucking new that Tor was originally developed by the Navy and was funded via Government Grant. What is possibly new in this information?

How? How is it possible? With the source open, and the very structure of the network itself, I fail to see how the Tor project could ever "help" the US Government with infultration.

Tor gets US funds because it's a DARPA project. Just like the original internet. Whooo. Glad your bongs get what you pay for with this state TV.

As if your little nigger brain can't figure this shit out

Use outlet wifi repetitor that was rooted and put in library as a cheapo free shell then connect it to a box you hacked then pass encrypted connection to Mullvad or cryptostorm through Tor

easy peasy

It's no secret Tor receives government money, they even have some US agencies in their donors' page. As for why, it's good for some agencies and bad for others. For the FBI it's bad since it's much harder to locate a Tor shitposter than anyone else, for the CIA it's good since it makes it easier to get chinks/etc to view their propaganda.

Your nigger ass is now the only on person on Holla Forums, correct asshole? I just had a conversation with an asshole 2-3 days ago telling me how secureTor was just by virtue of the use of nodes.

==Advice== as soon as you use therm "we" on here, any old fag writes you off as the asshole you are.

Nothing is funnier to me than a nigger using the term "we" and trying to convince everyone on the board he is a "real hacking genius." Trust me on this one asshole–despite influx of new fags, you are surrounded by people who know more than your darkie ass could ever aspire to know…

oh man, the term "oldfag" lost it's umpf after the Holla Forums days.
but nah, I don't really care what some oldfag on internet thinks of me just fyi


you are the only one from here that got banned from the most common wave of 4chan bans, my friend not me.

Tor fulfills it's purpose here. When Anons get banned for wrongthink by corrupt mods, they can use tor to undermine them.
Would I use it to buy under aged prostitutes and drugs, no. Would I use it to shitpost, yes.

>t. Yasha (((Levine)))

It is, but the alternatives are not there or involve hacking, compromising others to cover their ass. Some bought VPN are cute for evading censorship in certain countries, but are at best pseudonymous.

The most likely attack vector are still manipulated binaries and after that server under control of ZOG. If China, Russian really had interest in angering, spoiling the game of ZOG, they would open several high bandwidth exits and relays, not sharing the data.

(checked)

Nothing new, TOR was developed for safe communication for spooks. That doesnt mean that you shouldn't use it.

The only question at this point is, what can we use now? Can we use anything to stay user?

It hasn‘t changed anything.

The more people it use the more difficult it is to deanonymize.

That scare stories serve a purpose, to keep the normies away from crypto and anonymizing networks.

Fuck. I'll admit I'm barely out the two year lurk. I've been using TOR. What's a better service to use?

If I were to hazard a guess, it's for outward infiltration; serving as a vehicle to open lines of communication (and to spread US propaganda) into more closed societies (like China, or Mudslime countries)…. The Asian presence on Zeronet is pretty big.
If you look into the BBG, and its predecessor the USIA, the explanation above fits given their stated mission and how they've been utilized in the past.

It's speculative. Besides, the people who have the back door keys are not the people who would prosecute you in court over it. Two hands of the government.

many of us already knew

...

wasn't the Australian government hosting child porn sites too?

Top sekret source: Wikipedia
en.wikipedia.org/wiki/Onion_routing

How about I slap your shit.

Drown yourself in semen.

Drown yourself in semen.

Drown yourself in semen.

Oh hey! Good on you. I see I'm having an effect.

...

Drown yourself in semen.

So maybe Jim was right and the only people who use 8ch TOR are paedophiles and and jews. Maybe, you know, the guy who is single handedly shouldering the weight of 8ch and getting pounded in the ass from all sides isn't such a bad guy.

A hothead, sure. Easily offended, you betcha. Looking to make get in on the clickbait game by controlling the news on 8ch, absolutely. But he has always warned against Tor and only continued to allow it because the Holla Forums kikes screamed and cried about DDoSing 8ch if he didn't.

Don't you think we should start paying a bit more attention to Holla Forums? I mean they do unironically worship a paedophile jewish communist.

Great going, faggot. No one believes you.

Well they gotta run the drug trade, gun running to mexico, and of course buy underage prostitutes for politicians. All this bribery and black-mail and murder needs to have some level of secure communication. I just use tor for shitposting and because I don't want my ISP to be able to sell my shitposts to advertisers. For this purpose tor is absolutely perfect. I already assumed the NSA had all my shitposts before I went to tor, and now I don't care if they have them, but I assume they do.

This is a good post. Too many people treat OPSEC like it's a switch or one-size-fits-all approach. Privacy, security, and anonymity are all three DIFFERENT things and necessitate different set ups depending on how highly you rank which aspect and exactly who you are trying to avoid. Every responsible user out there should know exactly who they consider their primary concern is and what they are hoping to achieve; whether it's their ISP, government, intelligence agencies, or tracking and whether they want to protect their identity, integrity of their informtion, or contents of their information that they send.

No shit sherlock its run by a fucking rabbi

….Sigh….not this Levine asshole again.

It is acknowledged by Tor themselves in the past they received gov money and wanted to move completely away from it. Dingledine and Applebaum also admitted to countless audiences in conferences over the past 7 years they give training to feds etc. Go you tube some Tor talks where they go into detail why.

Nothing here is new.

I say again, how could we have known? How could we have guessed a service created by the U.S and nearly named after Jewish holy scrolls could have been a honey pot?

I tried it on a few separate occasions a long time ago. It was really slow tbh. It was unbearable.

It was made essentially for the reason you state. Specifically, for certains to dodge certains. The latter being the in us aye.


Well, you need better hardware…

…which should come out this year…
…the computer will be like this:
techrepublic.com/article/hi-five-unleashed-the-first-linux-capable-risc-v-single-board-computer-is-here/
… only better…
… and you'll need 2, so you can install both server & client of whonix (or similar, if they don't port it)

…and you'll need better services. This is very promising, indeed a bit of a miracle for what it can accomplish (meaning tor is practical for ordinary people):
OnionShare.org

… but there will be an uncensorable alternative to the chans…
…it's coming…
…this year, I believe…

It's faster than AOL was…

Plain old FUD. Notice how most of the reasons people give to avoid her are not logical.
It's not as if getting a donation magically makes the protocol weaker.

I cant say i expected it but im not surprised either.
They really do ruin everything dont they

HOTWHEELS WAS BEHIND THIS

It's pretty much like guns. It's not inherently good or bad, though they'd have no place in utopia. In the real world, there are bad people, and that calls for guns, in many cases (eg. guards at prisons carry them, though many in the prison committed offenses using firearms).

He advocated for Tor use on the site, but did he do anything malicious?
Is 8ch itself a honeypot? I don't even know who owns it now. Isn't it Jim, from 2ch?

I don't think this site will last much longer tbh…

I already use Voat more - 8/pol/ has gotten better since they stopped stickying every fucking thing to get posted, but still has generally lower quality content.

Since /pol mods are niggers, they ban even good contributors sometimes, which can force one onto Tor.

No internet is private, but the key is a shit ton of noise and random shit. Keep your pattern consistent.

Not only that, this is a peaceful forum, and this is idle discussion for fun, so why is it an issue who's watching? I'm not doing anything wrong, nor should anybody here.

The truth about the internet is nothing is anonymous ever.

I got banned and use Tor. Pol bans too many people too often.

voat is also centralized.

Centralize = censored. That's just how it is. We await the uncensorable platform.

Unpossible, the rachel poster is from sweden.

your celebrity obsession is pissing me off shillfuck

SSSSHHHHIIIIIEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEETTTTTT

nothing to see here my small-minded friends.
This is all public info that has been known for years. The US government came up with the idea and funds tor (among other sponsors) because SURPRISE tor is a useful tool to government spooks as well. It is only effective if the goyim use it to provide cover for their own traffic.

Point to a backdoor in the sourcecode you technologically illiterate disinfo niggers. I'll wait.

Also the person who wrote this is criticism is both a kike and has been trying to discredit tor for years
>(((Yasha Levine)))

Proof of kikehood
twitter.com/yashalevine/status/969702907988889601
Typical tricks

It doesn't matter who funds it. The tech is sound and open source.

OP what is it like having an IQ of 65?
you mean because they also fucking developed it?

How the hell this is news now. All of that has been common knowledge since the fucking tor was launched.

Tor was literally called "Project Honeypot."

Every update to the TOR browser fixes major known security flaws, the current release will be updated soon to fix even more major security flaws.

blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915

tl;dr TOR browser has always had huge gaping security holes.

...

>(((people)))
No. I'd say not enough.

There have been several research projects proving that a majority of TOR traffic can be deanonymised by amateurs at low costs by various methods.

Remember when gov took down silkroad and hundreds of other criminal and pedo sites off the onions?
No problem to find who is hiding in TOR.
It's a very effective honeypot. Even if proven it's not anonymous people still use it in belief they are anonymous.
And people without knowledge keep parroting the words that TOR is anonymous.

It's very useful to intercept terrorist communications. Therefor it's still funded.
And also to have an eye on all kinds of people that want to hide for various reasons.

Why not provide reference to some then, my shekel-loving humanoid?
If tor was anonymous, people like you would go around lying to people about it not being anonymous to get them off of it.

We all know that browsing without tor is not anonymous so we only stand to gain.

tor actually advertised that they were getting funding from several government sources from the very beginning. I believe it was DoD, Naval Intelligence and the CIA. The point they tried to make was that these groups have an interest in making the technology work and from keeping the others from having a backdoor. Therefore, tor the only solution was for all of them to agree not to ask for backdoors… something like that

tl;dr - ur a retard; everyone knows this

except, when you reminded people of this little fact, shills come out of nowhere screaming you're insane and should just trust Tor because ???

now some new privacy tech has come out and it's not pushed as much, probably because they're expanding the honey-pot

The truth is that anyone who claims Tor isn't safe is either a shill or a club wielding caveman who can't computer. The only alphabet interference with Tor was when the NSA paid an entire college department to deanonymize a single target. Just how even the best bank vault can be cut or broken into, even Tor can be fucked with by people with massive resources and funds.

Tomorrow, the CIA could simultaneously take over every single Tor node in the world at the cheap cost of billions of fucking dollars. Then they could deanonymize every single person using Tor. Is that going to happen? No.

Unless you're ordering cheese pizza or trying to make boom booms, no one gives a fuck and won't bother to take the necessary steps to get you.

anything to make it harder even "low costs" is better than nothing
anyone who uses it to do blatant illegal shit is an idiot to begin with

In theory it is sound and secure. In practice…
But I digress, because this is not the site to serious discus serious issues. This is the site of strong opinions and Duning-Krueger


No, there haven‘t any

Hidden onion sites and TOR browser user are two different topics.

No problem to finding the technological illiterate.

Yeah, we know terrorist communicate over the internet since Bush told us after 9/11. Still not a single case, except for retards googling “how to make a bomb”.

The biggest retards are those “having nothing to hide”, followed by those who think that by avoiding suspicious behavior, like encrypting their communication, they will not be object of snooping.


And gives the opportunity to distribute special versions to “people of interest” as TOR has done before.

You mean like the browser it is based on, any browser. What‘s next, water is wet?

True words

==DAILY REMINDER FAGGOTS: I2P IS THE ONLY SAFE DARKNET AT THIS TIME.

Tails on an encrypted USB stick on a PC without native OS over an Internet connection that is not attached to your name with an anonymously paid VPN and spoofing your MAC addresses. Regularly (like ever 30 minutes) deleting internet history, cache and cookies should be obvious. Also cycling your hardware regularly is not wrong. Use p2p channels to buy and sell hardware and don't tell the seller or buyer your name, nor meet at your place of work or your house. Best, have some third party you trust and let it do the deals.

Pro tip: Have a bait rig, which is basically a normie connection to the internet. Another possible layer of security is using a phone with an anonymous mobile connection as hub, hooked to a plug in an attic, public space (attics of universities/schools are great, if you live near one) and connect over it to the internet through an encrypted wlan to make it nearly impossible to find your location

Tor is an open protocol. Look at its fucking specs and tell me how the government is spying on its users. There are no backdoors in the open specification. If the government was using a different protocol, it wouldn't be compatible with Tor. That's not to say there aren't hypothetical breaches of privacy in Tor, but they would require massive funding that only the government could afford. That being said, Tor is still far better than nothing, but you should be mindful of the risks.

So, why are governments funding Tor? It's simple: plausible deniability. They use Tor themselves, and benefit from it just like we do.

The reaction to this his is fucking hilarious. Tor is used by intelligence agencies, which is why they fund it. This has been common knowledge since day 1 of Tor. It was developed by the US Navy in the first place. Of course Mossad uses it because it's the most convenient way for their agents to organize an assassination in Tehran.
When the hell did the Tor project ever claim to be fighting the US government? It originates with the Navy!
The article says nothing about security holes in Tor and provides no real reasons why someone shouldn't use it.

The secret is in the routing.

TOR is based on Oninon routing. That means a message, IP paket is send encrypted to a server. Within is another encrypted message and the address of another server to send to. The first server can not read that message because it is encrypted with the key of the second server. The second server receives the message incorporating an encrypted message to a third server. Normally that TOR chain stops there and the third server fetches the requested page and sends it back the same way it received it.

The anonymity is in the idea that there a three independent server under control of different entities.

Problem starts if that is not the case or an entity has panoptical overview over the whole network, can follow the way of all packets at all times. The later one are the famous timing attacks. If there is to much and irregular latency this becomes difficult.
It is much more easy to deanomize if you own the network, In and Out are on your own server.

I noticed that notorious encryption hostile France has recently gained some very high bandwidth TOR server, attracting lots of traffic.
Another observation is that the TOR browser preference routing are very often in just one country, have entrance and exit in the same country.
While there are TOR server all over the world, the routings are most of the time very local, 5eyes, US centric.
Routing the trafic over the slow privat conection of an Argentinan user would spoil correlation attack quite a bit, same as routing it through a Russian FSB owned server.

One can spoil correlation attacks a bit by operating his own (relay) server, mixing own traffic with that of strangers.

There is no need for "proof", it was never a secret. What? TOR was a Navy project that for years has also been funded by left wing groups. The project even publishes its funding. There is nothing secret about any of this.

However it is still basically safe for browsing TOR services (i.e. not the open internet), if they haven't been compromised. It can be used for browsing the normal WWW, but then it is more susceptible to traffic correlation attacks. To be attacked as such, a relatively powerful group, probably the government, would have to be spying not just on your internet connection at home but also of the server running the web service you're connecting to. The point is they would see web traffic (like an HTTP request) leaving your computer, then arriving at the destination. They would not necessarily be able to decrypt the traffic (it depends), but the statistical correlation is legitimate evidence in a court hearing, especially if it's just to get a further warrant. With a certain amount of traffic, they can prove with an extremely high statistical probability what you were doing.

The other major style of attack on TOR is by running a compromised service, either a hidden service or normal web service. If they can feed arbitrary code (e.g. Javascript) to your browser, they can accomplish a lot, because browsers form huge attack surfaces. A dedicated distro like TAILS is mildly safe against such things, if you run the latest version, but something like Whonix is better if you have the skills for it.

The people who claim that TOR is compromised, or easy to compromise, don't have nearly enough expertise to understand what they are saying. If you could explain how it's compromised, write a CS research paper about it.

Was there anyone actually falling for tor after that?

When do we permaban rachposting along with torpedoposting?

everytime there's a tor promo thread like this, it goes back and forth the same way
ctrl+f 'freenet' 0 results.

1 mention of i2p. tor is compromised, it was built that way, when the government wanted to do a big bust they took down silkroad and then manufactured (parallel construction) evidence to say 'thats how we did it!'

i2p is the best bet but freenet works perfectly. Freenet is nothing like tor, tor is promoted and other options are never mentioned by msm/shills because the other options are not inherently compromised, they aren't foolproof, you have to take more steps than just install/run it but these are steps you should be taking with tor or anything else.

for point to point communication you don't need tor or anything else you just need a clen computer and clean internet connection and 2 layers of encryption. you can use fucking gmail. if you want sell drugs or host a database of cp then zog would prefer you use tor (and use it badly) hence the huge youtube like(minus the video streaming) cp sites on freenet.

tor is just useless, it has too many shady connections to government and jews why risk it when other options exist ? why use the only tool that has been promoted by the msm and shills?


captcha was urr mad.

it is good that freenet and i2p exist but they are largely useless unless you are a pedophile. if the day comes Holla Forums can only exist on freenet etc and we still haven't killed everyone of these snakes and their traitors then the war is over and we chickened out.

Keep telling yourself that.

That doesn't mean it's defacto safe, but it has been audited near-constantly since it's popularity boomed. This entire thread is retarded and if we had a BO that was actually competant (and white) it would have been deleted or anchored.

So you trust the auditors? They could miss something, they could lie, the source they audit could be missing exploitable code.

Do you compile the source your self or use the binaries? How can you know that the binaries are built using the same source?

You don't know any of this but you act like Tor is 100% safe, you even want this thread deleted because of how butthurt you are. You say it's retarded to question Tor, you're a fool.

Tor may contain exploitable code, either way there are attacks that can be used to semi-deanon people. If you actually care about privacy you must consider all possibilities. That's not to say Tor is completely useless.

If Tor is compromised it's not like they'll use it to go after the little guys. If it's there it's for people who are serious threats to (((them))), national security, or whatever. They wouldn't use it to go after people for drugs or CP, they wouldn't want it known.

Does this mean pedos, hitmen, weapons traffickers, drug traffickers, and human traffickers are going to be caught or just those ebil nazis trying to get back at jewish banks?

I already said why you should trust it. Putting a backdoor in Tor would threaten the operational security of the government entities in question. Naval Intelligence doesn't want the CIA to have a back door, who doesn't want the State Dept to have a backdoor, who doesn't want Naval Intelligence to have a backdoor. Contrary to popular belief, these entities spend massive amounts of time spying on each other. Hell, most of the CIA doesn't trust anyone in the CIA other than their own few buddies in their department. Whether this strategy worked or not is anyone's guess, but the logic is sound. You anti-tor shill completely ignore this argument, and its really pathetic.

as far as we know, the only people who have been identified while using tor are (a) people who got hit with a virus, which sent out a beacon which identified their browser. Tor claims these individuals failed to update their browser and if they would have, this problem would have bene fixed and (b) people who used the browser to login to accounts that could be traced to their real person, and then engaged in illegal activities w/o resetting their identity on tor.

There was also some question about the CIA (or NSA, I can't remember) attempting to corner the market on exit nodes and thereby attempt to use time correlations to identify individuals, but its not clear whether this ever worked, and supposedly tor staff took care of this problem by restricting who could run nodes. Again, no system is perfect, and whether these strategies worked or not is anyone's guess. But, calling it a honeypot is a gross generalization, and you have absolutely no evidence that this is the case.


tl'dr - learn first, then speak douchebag

sage for the retarded scaremongering

False. To date, there are no active exploitable surfaces. The security of the software comes not from any particularly original thinking it employees, but the number of trained eyes that have examined it.

False. Meetings between individuals have zero influence over the mathematical foundations that Tor is built upon.

False. Tor is used by agencies to obscure their own investigative practices as well as to communicate with operatives embedded in dangerous situations & locations.

False. The weakest link is, and has been the server at the other end of the connection - not Tor. In 100% of situations, it has come to be revealed that Tor nodes were subverted by the software used to host content - not the Tor software itself.

False. Improper use of Tor is just as bad if not worse than not using Tor. Idiotic OpSec will get you caught with a false sense of security.

False, you dumb fuck.

The only truly safe method of electronic communication is mobile HF/VHF radio, preferably with a directionally fixed antenna to avoid unwanted scatter, using one time pads and codes. Unfortunately, this is technology is limited in its scope. Internet wise, TOR is decent at providing protection for most people.

Are you fucking retarded or just a fucking (((jew)))?

Yes, but decipherable by no one except the intended recipient when using an OTP. Why do you think number stations were used for so long retard? Its almost completely impossible to locate a mobile transmitter, even when trying to DF the source.

Are you fucking retarded?

I'm not saying you should use it as you would use Holla Forums. I'm saying that it is an excellent way of friend to friend communication.

...

Yes they 'took down' the websites

Silk road had hundreds of thousands of users and the spooks only managed to make like 200 arrests over YEARS- the people they caught probably being retards who used onion.link to access tor
Same with the thousands of degenerate pedofags which they weren't able to catch

Nothing is impenetrable but Tor is still 10x safer than any VPN- but only if you aren't a retard

Look at the source-tree yourself, and of course Tor is not 100% safe. That's retared. If you use tor, you need to use caution. Only retards assume it's 100% safe. Look at the news, the convictions though. More ofthen than not people are found through their own stupidity. These stupid acts include using Javascript, using similar alias and password, and similar word-choice.

I want the thread to be deleted because it is pointless FUD and OP is a faggot. Look at the damn op. "ZOG HAS BEEN FUNDING TOR OMG" when in reality the predesessor to Tor was made by the US Navy, and current development is fundded by the NSF and federal grants, and this was common-knowledge with never an attempt to hide it. If Tor does "help" the ZOG, it's through overseas campaigns similar to the CIA's "Radio Free" movement (for example, smuggling flash drives with Tails into DPRK/China/Vietnam). OP is weak and stupid, and the replies to this are all fearmongering.


Build the binary yourself then, faggot. Oh, no. You can't do that. You believe that Debian's apt is also compromised.

Just get GCC yourself, faggot. Oh, you can't do that because GCC is vunrable to a Trusting in Trust attack.

and so on…

Why bother hosting an onion site? Does that mean your trying to show all your regular retards how savvy you are? I think not. Your trying to fish in all ponds to see what floats to the top. The only reason you have a hard on for tor posters is because all your CIA niggers in there Florida bunkers can't get a grip on that IP. Anyways all you peace loving frogs keep up the good work. It makes for some hilarious reading.

/thread

Impossible. (((They))) told me it was anonymous.

nothing you can do digitally cannot be hacked

the only hack proof communication is pen and paper but if you mail it you have to use a foil lined envelope because USPS scans all the mail

cup and string verbal packet transmission (CASVPT) is the only way.

who the fuck do you think was selling the drugs on there?

the whole thing is CIA trying to save labor costs

mesh networking?

You could call it that.

to what end?
i use Tor because my ISP banned 8ch and few other sites so it's 100% delivers

if any of you think they are cosplaying some fucking invisible ninja for gov it's pants on head retarded, nobody going to decrypt your USB if they are on your ass youll give them all your passwords n shit

also downloaded gigs of PC-parts from tor sites for research years ago, still waiting for fibbie to come - such a honeypot wow

Yes, but today we're used with simple UI elements being bigger than a whole hard drive of years past. **Ok, in the 90's, hard drives were bigger, but working memory was still lower than an entire website today. Oh my, I'm glad I wasn't born in the stone age.

Tor is useful for hiding from site owners and non-milgov entities. We all know that it's not going to hide you from the NSA.

It sure booty blasts the kikes on this board though, they get so ass mad at the fact that Torposting is allowed, which makes me feel it's effective at hiding from the board owner even if this site's owned by a deep state clown.