I would like to be able to use email and irc. I don't see anything bad with using those especially with unique pseudonyms. Also if I were to fetch my rss feeds, youtube would easily be able to tell that the circuit I'm using belongs to me because I like a unique combination of channels.
I see, thanks. As I feared, it's not a completely new genre to satisfy my autism.
Jayden Brown
cryptostorm works
Camden Foster
not them but you see, anything can be 'backtraced' if you use a certain IP address, dns requests, isp local logs/cached content, mitm logs (cuckflare, ssl/tsl are to be considered obselete at this point), browser fingerprint (webgl, js, canvas, ua, flash, clipboard/autocomplete, fonts), screen resolution, router/OS backdoors, other users in the network (actually it's the botnet apps that grab MACs on a shared network then phone them all to botnet), and habits (websites, preferred timezones, words per minute). as said, if you like channels like filthy frank
and listening to some anime playlist then typing on that seemingly harmless searchbox at 70wpm then your browsing habits can definitely be backtraced to you even if you have a very country-dynamic IP addresses or chains of proxies. One mistake on your side is all it needs. If not, it'll be marked as unlinked metadata waiting for confirmation.
The engine they use to build metadata is like sudoku puzzle solver. Even the way you write and pick words 'can' be backtraced.
Building metadata costs only a few electrons. If there is profitability, it's already out there and if your gut doesn't feel anything at this point then you've been drinking lots of booze this holiday..
The only method to mitigate your browsing habits is to browse normie content you won't even look at 80% of the time, impersonate/spoof/masquearade as other specific people (faking your info with hackershit names will make the backtracing botnet tingle).
Ryder Martinez
You just have to visit one niche thing to ruin all your traffic obfuscation.
Jack Lewis
Unless you're required to register a nick, you can use a different nick every time you use irc over tor. Don't use an irc network that requires you to register a nick. There's no reason to use a consistent pseudonym except for egoistic reasons. Ego is the enemy of good opsec when it comes to anonymity.
As for email, it's awful for anonymous communication. Awful for privacy, too. Either you're emailing people you don't normally correspond with, in which case it doesn't matter if you register a new email address over the hidden service at cock.li every time you need to email someone, or you're emailing people you do normally correspond with, in which case it's futile to use tor. And if you want private emails, you'll probably end up using gnupg, which adds yet another identity layer. Email was not designed for anonymous or private communication, and it shows.
If you've ever fetched those rss feeds without tor, and then you fetch them over tor, you've already deanonymized yourself. Even if they're not exactly the same feeds, but an unusual combination of interests, like speedrunning videos and knitting tutorials, it won't be difficult to connect your pre-tor activity with your tor activity.
In the end, it comes down to your threat model and risk tolerance. Given your original question, I kind of assumed you were concerned about state-level adversaries, but given your normieshit use cases (email, irc, Youtube), I guess my assumption was incorrect.
Jackson Cruz
You didn't even try to answer my original question. You just derailed the conversation saying that identities shouldn't exist when you are using tor. If exit node gets marked as being you it could flag other traffic coming from that exit node from also being potentially from you. I was trying to get a confirmation on whether it was a good idea to make a new circuit for every "identity" you have so that if one circuit is deanonymized to being a specific identity it wouldn't matter because they are already tied together.
Leo Anderson
Fucking LARPers I can guarantee the odds of you running that script by mistake are higher than you actually needing to run it EVER. No matter how improbable it is.
Julian Walker
Fucking posers.
Also the #1 recommended distro in that pastebin is compromised.
Juan Ortiz
or you could use zombie computers to fetch the information for you over a virtual tunnel to beat the botnet you have to harness the botnet.