a random os banner

/os/ - Online Security

News, techniques and methods for computer network security.


New Reply on thread #4
X
Max 20 files0 B total
[New Reply]

[Index] [Catalog] [Banners] [Logs]
Posting mode: Reply [Return]


Continuing from  >>/tech/597/
https://archive.is/INR3l
This is for non specific, general tips for anonymous web browsing and downloads, tips on browsers and browser configurations for the security concious that you don't want to make a new thread for.
This is good. Keep it comming.

We can come up with some best practices to increase security, minimize footprint and increase privacy.
http://www.floppymoose.com/index.html

Better Ad Blocking for Firefox, Mozilla, Camino, and Safari
also works with the Thunderbird email client!

Tired of distracting ad images cluttering up your web experience, or even your email? Here is a simple way to keep many of these ads from displaying in your browser. The technique below works for any Gecko-based browser (Mozilla, Firefox, Camino, Netscape7).  It also works for Apple's browser: Safari.  See the special instructions for Safari below.  And it even works with the Thunderbird mail client!  See Thunderbird directions below.  Also, check out the new notes on dealing with Flash advertising, below.  Finally, I've improved the ad blocking based on user feedback.  Already using it?  Grab the latest for even better results.

How to use userContent.css with: Firefox/Mozilla/Camino/Netscape
You need to place the userContent.css file in the chrome directory of your browser user profile.  The different browsers store your profile in slightly different places.  For macos X, the profile chrome directory locations are:

Firefox: home:Library:Application Support:Firefox:Profiles:profilename:randomstring.default:chrome:
Mozilla or Netscape: home:Library:Mozilla:Profiles:profilename:randomstring.slt:chrome:
Camino: home:Library:Application Support:Camino:chrome:

Restart your browser to pick up the styles.  Go to your favorite sites and see that many ad images are gone, but other images are still there!

How to use userContent.css with Thunderbird         New!
You need to place the userContent.css file in the chrome directory of your Thunderbird user profile.   For macos X, the profile chrome directory locations is:
home:Library:Application Support:Thunderbird:Profiles:profilename:randomstring.default:chrome:

Why should you use a custom user stylesheet with Thunderbird?  For the same reason you should use it with your browser: to block unwanted ads!  Many mail providers can place ads in your email.  Using this stylesheet you can block almost all of them.
Privacy is not Security is not Anonymity is not Pseudonymity is not your real identity, they're all different and needs to be defined separately and specifically.
Although there's no statistical user data like in panopticlick.eff.org or amiunique.org, this website can help you see what they see in somewhat better detail: https://www.browserleaks.com/
Install sic IRC client
$ sudo torsocks apt-get install sic
or
$ sudo torsocks pacman -S sic

$ torsocks sic -h onionirchubx5363.onion -p 6667 -n anon39572
Could someone explain to me how does Subgraph OS sandbox X11 and what the hell is the "Metaproxy" that they use?

Also, why do some people who use uBlock Origin don't use HTTPS Everywhere when uBlock Origin does not redirect to the HTTPS website when available? Isn't using HTTPS important and preferred in Tor?
 >>/47/
I guess they just forgot to install it or don't actually care about security/privacy and use uBlock for ad blocking.
http://ip-check.info/ (better than most privacy checker)
https://www.browserleaks.com/firefox
 >>/113/
That website's not that bad, but I can't help but to notice it's shilling for Disconnect and Veracrypt which is good for normies but I would avoid cross platform encryption methods.
It seems like manual Socks5 Tor proxy configuration on Icecat reveals that it's not using the Tor browser but if one uses FoxyProxy to manage Tor, it pretends to use the Tor browser. I use Clean Links, Decentraleyes, FoxyProxy Basic, HTML5 Everywhere, HTTPS-Everywhere, No Resource URI Leak, Privacy Settings, Random Agent Spoofer, Self-Destructing Cookies, uBlock Origin, and uMatrix extensions. I don't know if using torsocks icecat would mask Icecat as Tor Browser via ip-check.info
 >>/161/
I've never used OpenBSD, but what about iptables and forcing all TCP connections through the Tor proxy and dropping all other packets?
 >>/135/
add this to your user.js to make it look like tor browser

// Fingerprint
user_pref("general.useragent.override", "Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0");
user_pref("intl.accept_languages", "en-US, en");
user_pref("network.http.accept.default", "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8");
user_pref("network.http.accept-encoding", "gzip, deflate");
user_pref("network.http.accept-encoding.secure", "gzip, deflate");
user_pref("privacy.donottrackheader.enabled", false);
user_pref("general.appname.override", "Netscape");
user_pref("general.appversion.override", "5.0 (Windows)");
user_pref("general.buildID.override", "20100101");
user_pref("general.oscpu.override", "Windows NT 6.1");
user_pref("general.platform.override", "Win32");
user_pref("general.productSub.override", "20100101");
user_pref("general.useragent.vendor", "");
user_pref("general.useragent.vendorSub", "");
user_pref("general.useragent.locale", "en-US");
user_pref("intl.locale.matchOS", false);
hey niggers, I want to use links with tor pretending to be firefox or something. help me out famalam
 >>/tech/609/

######### Configuring Links for Tor

1) Press ESC
SETUP->NETWORK OPTIONS -> CONNECTIONS
[X] Async DNS lookup
ESC->SETUP->SAVE OPTIONS
2) ESC-SETUP->NETWORK OPTIONS->PROXIES
socks4A proxy : 127.0.0.1:9050
[X] Connect only via proxies or SOCKS
ESC->SETUP->SAVE OPTIONS
3) ESC=>SETUP->NETWORK OPTIONS-> HTTP OPTIONS -> HEADER OPTIONS

[  ] Send fake firefox
[  ] Send do not track request
[X] No referer

Fake User Agent: Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0

ESC->SETUP->SAVE OPTIONS

4) ESC->SETUP->CACHE
Number of formated documents 5->2
[  ]Aggressive cache ## uncheck this

ESC->SETUP->SAVE OPTIONS

###DONE

use s key to bring up bookmarks and save bookmarks and g key to enter a url. Now you're ready to use tor. Use your current tor browser to bring copy over your favorite onion links and save them into your links browser bookmarks manually one by one. Do the same for youtube pages and other Clearnet pages that you frequent.
 >>/185/
> get links 2.13

> go to setup>network>proxies

> put "127.0.0.1:9050" into the socks proxy field

> check "connect only through proxies"

> go to setup>network>http>header

> check "fake firefox"

> done
 >>/186/
Oh, you beat me to it. Should have refreshed before posting.

Keep in mind that checking "fake firefox" disables several of the other relevant options. It forces no referer regardless of your referer setting. Same for the user agent.
Using fake firefox and fake user agent just doesn't go well together as it seems that the old 38 of the fake firefox user agent overrides the custom fake user agent
I've checked with ip-check.info, it apparently knew that I was not using the tor browser
 >>/193/
Turns out, links v2.13 already has the new useragent, just haven't rolled out fast enough in certain distros. Now we can all pretend to use the newer Tor browser but with Links!
thumbnail of 52543627245.jpg
thumbnail of 52543627245.jpg
52543627245 jpg
(5.77 KB, 301x167)
https://news.bitcoin.com/bitcoiners-use-tor-warned/

TOR and VPNs will likely be illegal in the U.S. come 2017. FBI's reach extended globally

https://news.bitcoin.com/bitcoiners-use-tor-warned/
tor/src/or
 or.h 
#define DEFAULT_ROUTE_LEN 3
change this to
#define DEFAULT_ROUTE_LEN 5

 routerparse.c 
digest_algorithm_t alg = DIGEST_SHA1;

Leave this alone it will break the tor handshake between each router if you change it. Disregard my previous advice on this mod. 


If you know of any other good mods for tor post below or in the tor/vpn thread.

Thanks.
circuituse.c

Also change this 

 else if (build_state && build_state -> desired_path_len >= 4)

to be:

else if (build_state && build_state -> desired_path_len >= 6)
 or.h 

#define CBT_DEFAULT_RECENT_CIRCUITS 20
change to 
#define CBT_DEFAULT_RECENT_CIRCUITS 10

#define CBT_MAX_RECENT_CIRCUTS 1000
change to 
#define CBT_MAX_RECENT_CIRCUITS 100

or.h is a config goldmine.
I'm seeing that some of you use links2 with Tor. I do so as well, and I have been able to mask my browser as the firefox based Tor Browser. This includes changing the HTTP headers as well. Here is my script, save it in your /usr/local/bin directory. You can use websites such as ip-check.info and browserspy.dk to see whether the browser is masked or not.

#!/bin/bash

/usr/bin/links2 -address-preference 3 -async-dns 1 -http-bugs.bug-no-accept-charset 1 -http-bugs.no-compression 0 -http.do-not-track 1 -http.extra-header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\Accept-Language: en-US,en;q=0.5\Accept-Encoding: gzip, deflate\Connection: keep-alive" -http.fake-user-agent "Mozilla/5.0 (Windows NT 6.1; rv:45.0) Gecko/20100101 Firefox/45.0" -http.referer 1 -ftp-proxy 127.0.0.1:9050 -socks-proxy 127.0.0.1:9050 -only-proxies 1 -save-url-history 0 -smb.allow-hyperlinks-to-smb 0 https://check.torproject.org
Regenerate intermediate term signing key:

$ tor --keygen

This will ask you to create a passphrase and then generates the key, make up a strong passphrase before hand and store it somewhere
$ passgen
If you're forced to use Windows, and you want to browse the internet behind tor you can use the links2 windows binary, 

http://links.twibright.com/download/binaries/win32/

and chain it to the tor expert bundle binary.  I just tried this out and it worked fine.
 
http://torsiteyqk5ajx5o.onion/dist/torbrowser/6.0.4/tor-win32-0.2.8.6.zip
http://torproject.org/dist/torbrowser/6.0.4/tor-win32-0.2.8.6.zip

endtorrc works with this setup but you have to comment out the Sandbox variable.
and place the torrc, torrc-defaults, geoip, and geoip6 files in the directory C:\Users\user\AppData\Roaming\tor\
 >>/558/

I didn't post  >>/321/, but I'm glad someone did.  I incorporated the extra header bit into my setup and into the Endware scripts.  I personally don't enable the do not track button.  That seems to be the recomendation from JonDonym to not send that request. Thanks for pointing this out.  Perhaps I should write up new instructions for setting up links2.  I'll do that on the weekend.
Random trivial info: the tor browser uses 1000x600, so if you're using a hardened iceweasel or something pretending to be tor, change your window resolution to 1000x600 and doublecheck via ip-check.info
Repost of a good workflow from another user (Masonator?)
originally posted here  >>/pol/39627/

Rationale: Use the Tor network to obscure your originating IP, use an ssl proxy or socks5 proxy to obscure Tor network use
Stragtegy Flow:  Tor -> SSL Proxy -> Clearnet
Alternate Strategies: VPN ->Tor -> Clearnet  ; VPN ->Tor -> SSL Proxy -> Clearnet ; Tor -> Clearnet ; Tor browser on Tails

                    Proxychains Workflow 

################    Materials List   ##############################
you will need:
1) proxycheck.sh from >>>/os/
2) tor
3) proxychains
4) an ssl proxy

###############       Work Flow    ###############################

1) Go to a proxy site here is one for the sake of the tutorial:

https://txt.proxyspy.net/proxy.txt

2) Copy those proxies and paste them into this:

https://orcinustech.com/web-tools/proxy-checker.php

3) Export anonymous and or elite proxies

4) Make a text file called ssl_proxies.txt
5) Paste the exported proxies into ssl_proxies.txt
6) run this command: 

$ bash proxycheck.sh ssl_proxies.txt

this will weed out the proxies that give connection errors
you should have new files with the checked working proxies I would use ssl_proxies_yt.txt and pick one from there for the proxychains configuration.

7) Go to the config file of proxychains in /etc/proxychains.conf and make sure it looks like this. 

strict_chain
chain_len = 2
proxy_dns
tcp_read_time_out 12000
tcp_connect_time_out 12000
[ProxyList]
socks5 127.0.0.1 9050 # Tor socks5
http #PROXY GOES ON THIS LINE

The first proxy is tor and the second one is the working proxy that we should have a list to choose from at this point in the tutorial. It might take a few tries with the proxies but if you see that it is resolving dns requests in the output you are good to go.

8) Now with proxychains set up you are ready to open your browser lets say you use icecat run this command:

$ proxychains icecat

Now you are going through tor and able to browse the clearnet with the http proxy. 

WARNING : Anonymity may require other additional settings, including browser settings, user-agents, stylometry obfuscations etc. 
              However the strategy presented here is an opinion about a strategy that may be helpful in the process of anonymous tcp ip communications.
 >>/884/
> Congratulations you are anonymized.

This is misleading. Anonymity is much more than just "use this".

Stop treating Tor and other tools as a complete solution to anonymity.

Stop suggesting such complicated methods. The users who need this are better off using the Tor Browser with security settings on high, preferably on Tails.
Point people to information like the official Tor documentation, if you think they are lacking try to improve them.
 >>/887/
they also have to be fast so would buying proxies help or hurt anonymity past the tor hops? I guess that would depend if they accept bitcoin right?
 >>/884/
That's not really me, but a@a can be nothing more than an empty hollow identity for anyone that likes your stuff and is passionate about OPSEC, so yes it's a@a though it's masonnigger because he used to be easily identified by not articulating well enough and making common spelling errors that only he makes, hence, the stylometry suggestion.
 >>/888/
Hurt anonymity.
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#You-Tor-X
https://www.whonix.org/wiki/Comparison_Of_Tor_with_CGI_Proxies,_Proxy_Chains,_and_VPN_Services
 >>/889/ sorry to confuse you with Masonator

 >>/890/, good post, good summary from the Tor Project and Whonix. Thanks for posting that. 

I saw the following information in the same thread from pol: 

Heads: Devuan GNU+Linux non systemd version of Tails with only Free Software:  

http://fz474h2o46o2u7xj.onion 
https://heads.dyne.org/

https://www.dyne.org

I'll place this into the sticky.

Keep the tips coming in.
 >>/895/

First of all interesting video from Mr. Satan, with his eyebrow rubs.  3 eyebrow rubs, then 6 eyebrow rubs with his pentagram tatoo with an eye in it. On the upper right hand corner he has a triangle baseball cap, and the letters "Illu" ? below that.  Lux et Veritas (Light and Truth)? More like Lux In Tenebras (Light in the Darkness). 

Theoria Apophasis  https://www.youtube.com/user/kathodosdotcom .  Who is this guy supposed to be? Pro Photographer:

"Analyzing the nature of professional photography in its fundamental roots, getting past the gear-sniffing and measuring, and getting to the metaphysics and heart of true professional photography. There are NO UNTRUE photographs, only compositionally and technically inept ones. A professional photographer is a master of composition and light manipulation, it is no more complex than this."

I'm not sure what the source of his "This has been confirmed" statements are, but he seems to think that he's on the winnning team.
 
Secondly don't be transatlantic.  Build a city wide lan. Or better yet build a city wide BBS over modem in your locality. Restrict acceess to modem only by your local area code, and use some HTTPS or TLS scheme.  Disconnect ethernet from the BBS server.  Then have fun chatting with locals about local things.  If you do that, does your local government have the lawful authority to collect your conversations (phone tapping)?  Then you can be anonymouse by going to any building with a telephone connection and dialing the BBS. No TCP/IP just random building phone #. Wear a ski mask when you go there. That's anonymouse.

Basically I have faith in the encryption protocols, but I believe (assertion without proof) that all of the OS distributions of linux are vulnerable, and given the Intel AMT debacle that was disclosed recently, I'm pretty sure its worse than Ring 0, more like Ring -3 security intrusion. Get off of Intel. We need a new paradigm. Tor isn't going to help you if you're rooted at the hardware level.
This is legitimate. I'm not sure what to do with this right now. 

$ unar search_extract_links.rar
upacks to search_extract_links.dat

which is a text file containing http links
Contains 1265976 records.

$ cat -n search_extract_links.dat
...
...
1265955 http://www.turkhackteam.org/genel-guvenlik/1489040-06-04-2017-proxy-listesi.html
1265956 http://memoryhackers.net/konu-29-04-2017-l2-anonymous-proxy-list.mh
1265957 http://memoryhackers.net/konu-fast-proxy-guncel-fresh-20-04-2017.mh
1265958 https://www.ruyaforum.com/48-post9.html
1265959 https://baybilisim.com/01-05-17-l2-anonymous-proxy-list/
1265960 https://baybilisim.com/25-04-2017-l2-anonymous-proxy-list/
1265961 https://baybilisim.com/26-04-17-l2-anonymous-proxy-list/
1265962 http://www.forumsohbeti.com/guncel-proxy-listeleri/2429-07-04-17-fast-proxy-server-list.html
1265963 http://www.forumsohbeti.com/g-ncel-proxy-listeleri/2817-08-04-17-fast-proxy-server-list.html
1265964 http://www.forumsohbeti.com/g-ncel-proxy-listeleri/2430-07-04-17-free-proxy-server-list-1490-a.html
1265965 http://www.forumsohbeti.com/3054-post2.html
1265966 https://www.proxydocker.com/freeproxylist/Germany/Hesse
1265967 http://es.proxyservers.pro/proxy/207.154.231.208
1265968 http://proxydb.net/180.250.46.227/8080
1265969 https://freevpn.ninja/free-proxy/id/170529
1265970 https://proxyrox.com/proxy/180.250.46.227-8080
1265971 https://es.proxyrox.com/proxy/180.250.46.227-8080
1265972 http://proxylist.me/proxys/details/74086/indonesia
1265973 https://www.proxydocker.com/freeproxylist/Indonesia/Somewhere?sort=p.type&direction=asc&page=1
1265974 https://www.proxydocker.com/freeproxylist/Indonesia?page=2
1265975 https://orcinustech.com/web-tools/export-proxies.php?scanid=iSJoWDXn02T3clizwmXlk3H2IY0GWH0fAJE&results=all-proxies
1265976 https://orcinustech.com/web-tools/export-proxies.php?scanid=kL3Nge3r14sV83yPPkfA8F6SpxDHtMLNyPB&results=all-proxies

I'll leave the link up in case it's useful to someone else. 

I'll work on this list to prune it down to just the main root websites, as you mentioned there is duplication.  It may be useful at that point.  Right now it's too big. 

I'm not sure how this list was generated.  Could you elaborate on how it was created?  Thanks.
 >>/901/
Well I was looking through the list of proxysites earlier in the thread it lead to this forum https://www.blackhatworld.com/seo/proxie-scraping-links.464079/page-15#post-10005280 The huge list is for a program on windowss called scrapebox. Fuck windows you can use this for the same effect http://www.proxydb.net/leecher

the list it updates almost every day and gets bigger and bigger still a lot of dupes though. I thought it was useful.
 >>/897/
Most of the stuff he mentions is actually old info, or covered by Wikileaks, and of course, common sense. https://en.wikipedia.org/wiki/Upstream_collection https://en.wikipedia.org/wiki/Utah_Data_Center

The guy in the video had been harassed by the government because of his controversial book about magnetism. He also was one of the top guys in Apple customer support. Here's some example links: https://youtube.com/watch?v=rjkYccijTFA https://discussions.apple.com/docs/DOC-6031
$ lspci
...
....
Communication controller: Intel Corporation 9 Series Chipset Family ME Interface #1
....

Thanks Intel.

I've been experiencing weird shit on my computer for the last couple of months.  Strange lock ups etc. This might explain it.  MFW.
thumbnail of prxy_unq.txt
thumbnail of prxy_unq.txt
prxy_unq txt
(6.77 MB, 0x0)
 >>/905/
Here is the proxy website list run through 
$ sort -du 

Alphabetical sort unique

Cuts the file from 75MB uncompressed to 6.8 MB. lines from 1.2 Million down to 111,000.
Drop out of the gui into the shell in text mode. Have tmux, and links installed and configured for tor.

in what follows ; means follow the first command with the second command.

$ tmux
$ CNTRL + b ; SHIFT + " 
$ CNTRL + b ; SHIFT + "
repeat until there is a 2 line command window at the bottom of the screen. then let's remove the windows that we won't be using
$ CNTRL + b ; UP arrow
$ exit
$ CNTRL + b ; UP arrow
$ exit 
so now you have a large window and a fame at the bottom with a command line.

in the large window frame, start up links
$ links 

now you can browse and copy links and type stuff in the command window.  To get a new tab type:

$ CNTRL + b ; c

this brings up a new window that is clear, you can repeat this step to make more windows and switch between them using
the numbers 

$ CNTRL + b ; 0
$ CNTRL + b ; 1
etc

I like to open a window with endradio to listen to the news, while I browse the news and endchan, 8chan etc in the links text window.  If I need to download a youtube video or some file that I see I use oldtube or endtube or endget or endloads to download the content that I collect from youtube or from some other source.   I use this methodology to be productive in shells and environments that don't have a gui but that have the above tools.  Try it out in a terminal emulator first to get the hang of it, then use it in text mode for low profile security.
 >>/934/
That is much more complicated than it needs to be.
All that can be done with: tmux new links \; split-window -l 2
Which will
	Create a new session running links
	Create a new pane 2 line tall
 >>/935/
This is more efficient. It didn't work straight from the command line as presented though.  

I have to enter command mode to do this.

$ tmux new links
$ Ctrl + b ; Shift + : 
: split-window -l 2

Then repeat with a new window to multi tab
$ Ctrl +b ; c

As you can tell I don't know what the hell I'm doing. Another case of RTFM for Endwall. 

Thanks for the tip.
 >>/939/
> It didn't work straight from the command line as presented though.

Were you already in tmux? Try this, copy it exactly:
tmux neww links \; split-window -l 2
 >>/958/
Universal Plug and Play UPnP is a bad idea. If you get malware they can own your network. Open the ports that you want open and only those ports and protocols, block everything else.  The first line in your firewall chain on you router should be:
BLOCK ALL INCOMING 
BLOCK ALL OUTGOING. 
What ever way that is set up according to your router. 
Then slowly open things up, starting with DNS, then HTTP, HTTPS, then whatever other ports and protocols you need. This will take more time but it will give you more control. 

NAT Network Address Translation. This should be OK to turn on. 

UPnP No, NAT OK.

Those are my thoughts on it. I'm not an expert.  Open only what you need and don't let your software on your OS control your router at will, set it up yourself.
 >>/884/
With i2p isn't there an ip you can plug in like with tor (socks5 127.0.0.1:9050) I think port 4444?? If so then you can add i2p to the mix. I think it called an out-proxy. You can also use this to run i2pd with proxychains i2pd.I have found this proxychains setup useful because running i2pd with torsocks doesn't work.
 >>/958/
others are correct on UPnP

wifi is insecure, use cables as much as possible 

NAT should be enabled, but it isn't as important as making sure your router isn't compromised. There is FOSS router software available for maximum security, have a gander and lurk.
I use a cheap but private VPN service, with encryption and (allegedly) no IP logging reading the ToS.

I do not use wifi, that is insecure. My wifi chip in my computer (along with the bluetooth chip and camera) have been physically removed. Linux of-course.

I use Mozilla Firefox for the most part, sometimes Tor too.

One thing I do is make sure I manually program Bleachbit to scrub sqlite files in my browser directory routinely. Logs, caches, cookies etc: content-prefs.sqlite, cookies.sqlite, formhistory.sqlite, healthreport.sqlite, places.sqlite, signons.sqlite, webappsstore.sqlite (and their associated file formats) from my browser directory. Tor too stores these same kinds of databases, so any browser you use you'll want to learn what is in those directories and what they store.

Then, I also use Random Agent Spoofer to spoof my browser agent (spoofing metadata about what OS I use, what kind of browser it is, headers, get requests, etc.) and also allows me to disable webgl and geolocation in chrome.

I also use noscript and HTTPS Everywhere. Scrub noscript whitelist and reconfigure the list to your liking, whatever suites your browsing habits.

Go to  about:config  and learn how to use it, but be careful!!! There are some tweaks you can use to fortify and secure your browser, and to make it stop bragging about data.
 >>/1069/
I torrent behind tor. Not sure about doing this with I2P.

I use deluge with gtk and set the proxies to port 9050. Then add the torrent through a link, magnet or the actual torrent file. Then manually edit the trackers so that they are http only.  It should start downloading after that.
 >>/1079/
Yo, stop torrenting from behind tor right now. Either use i2p or a VPN, but for the love of god quit slowing down the network.It also doesn't even protect your identity.
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea
https://blog.torproject.org/why-tor-slow-and-what-were-going-do-about-it
 >>/1082/
The proxying works fine in Deluge. It's not leaking.  The trackers communicate by TCP, the traffic is TCP.   It works. The attack that is mentioned in the second article stem from applications that ignore your proxy and send traffic by UDP without tor.  That doesn't happen here.  Both the trackers and the traffic are proxied through Tor as TCP connections.  I dissmiss that complaint/claim.    

As for slowing down the networks, with download speeds at 250KB/s  I doubt it.  Thats about what I get using wget behind tor.   Rate throttle it if you want to be polite.
 Searching Youtube 

$ endjail
$ torsocks --shell
$ youtube-viewer

=>> Search for YouTube videos (:h for help)
>  Endchan
 1. EndChan/InifNow question and answer (by OdiliTime) [01:10:35]
 2. The Old 4Chan (by That Guy With A Voice) [01:48]
 3. The Voice Teens Philippines Battle Round: Clark vs. Chan - In The End (by The Voice Teens Philippines) [05:14]
...
=>> Select one or more videos to play (:h for help)
>  1
URL: https://youtube.com/watch?v=ParATBARwic
-> Channel   : OdiliTime
-> ChannelID : UC9YYaqKNOZa5ue-sxE0cuPA
-> Definition: HD
-> Duration  : 01:10:35
...
Copy the URL into a text file, list.txt , in leafpad, nano etc. and repeat
=>> Select one or more videos to play (:h for help)
>  :q

$ oldtube --list list.txt
$ oldtube https://youtube.com/watch?v=ParATBARwic

Using proxies:
$ proxyload
Format the first line of ssl_proxies.txt to remove everything but the ip address at the end (or just delete the first line)
$ protofix https ssl_proxies.txt | sort -R | sort -R >> sort_ssl.txt
$ endtube --ua-rand --proxylist sort_ssl.txt --list list.txt

Add proxycheck to the workflow to get working proxies only. 
$ proxycheck ssl_proxies.txt
$ protofix ssl_proxies_yt.txt | sort -R | sort -R >> sort_ssl_chk.txt

If you have a better workflow feel free to share.
 >>/1119/
Thanks for this, it's coincidentally at an opportune time and will be of use to a project I just started.
> ghostery phoning home
I did a quick sweep and didn't find anything, but I mostly skimmed. There's a few links I'm not too privy too and I didn't look deeper into any of the XMHL or send requests though, they're a mess.
https://pastebin.com/raw/czfymKNi
https://pastebin.com/raw/6mZmcSiH
IP greps bring back nothing of note: https://pastebin.com/raw/6mZmcSiH
https://pastebin.com/raw/puaX68W5
Did you make the image yourself? You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.
 >>/1126/
I didnt make the image I found it on one of the rebeccablack/tech/ archives. Ghostery I still never was crazy about because it is like noscript if it noscript was bloated and didnt work.
I always try and remember the addons I am missing when configuring a firefox fork and that was a good image to use back a year or 2 ago.
> You can mess with the settings on most apps, repack them, and run them your way instead of having them screw with everything.

That is something I will keep in mind because some addons stop working like "white noise generator" which did what "trackmenot" does but in a seperate window with tabs randomly switching to random webpages.

I have a few suggestions to add to the list
adnausium, dolus, tamperdata and http nowhere

if I did not lock the prefs.js I will use https://jm42.github.io/compare-user.js/ for about:config modifying.
 >>/1129/
> if I did not lock the prefs.js 
I just read up on this. It seems like locking is temporary and all you need to do to reverse it, is delete the lockfile. 
> I will use https://jm42.github.io/compare-user.js/ for about:config modifying.
These might be useful to you:
https://pastebin.com/pdEbeX1m
Full list of all prefs defined in Mozilla's source code for 52. Some of them are hidden/ i.e not set in about:config so there'll be no way to know about them. And: http://kb.mozillazine.org/About:config_entries
Is a nice util for quickly finding out what each does, and available settings.
 >>/1129/
And if you're using a beta version or one with a "MOZ_TELEMETRY_ON_BY_DEFAULT", telemetry is perma-on, so be careful.
firefox-52.0esr/modules/libpref/preferences.cpp
 >>/1130/
 >>/1131/
Thanks I always got confused about that. But you can never be too sure with firefox even forks have things like

camera.control.face_detection.enabled 

set to true on default.
I'm pretty sure Ghostery can be analyzed. I saw somewhere recently that they made it open source, so basically you can look through the source code if you want. Might be something worthwhile to do, but isn't necessarily something I would be able to do since I don't know shit about coding.
 >>/902/
Seems like ipproxyscraper works well for thesse links. It's a python script, so the source is viewable and it can be run on any OS.
https://sourceforge.net/projects/ipproxyscraperlinux/
lightweight rss readers 

I know there are simple scripts to read rss feeds. But as far as feed reader that is important because for example:

> manually clicking on a subscriber yt channel 

> updating an rss feed is a less footprint. 


Updating an rss feed id less of a footprint. I wonder if its worth it to obfuscate rss feed patterns like the trackmenot addon adds irrelevant searches to the browsers history? To do this you Just add a bunch of irrelevant feeds with your regular feeds.

Newsbeuter - simple terminal rss reader

NewsBoat   - https://github.com/newsboat/newsboat simular to newsbeuter but more intricate.

 >>/1220/
Really appreciate that program I never knew about it thanks for posting it. I usually use http://www.proxydb.net/leecher that has a 10 url limit the program you posted can do unlimited urls. With the files it crashes for me with big lists but if you curate a bunch of good links or rss feed xml pages even you can scrape a lot of proxies.
 >>/1224/
https://www.my-proxy.com/free-anonymous-proxy.html
https://freenetproxy.com/
https://coolproxies.blogspot.com.br
https://proxyfreaks.com/
https://oproxy.info
http://captchasniper.com/new/FreeProxies.txt
https://www.my-proxy.com/free-elite-proxy.html
https://sickproxy.com/
https://huntproxy.com/
http://www.white55.narod.ru/downloads/proxylist.txt
http://spys.me/proxy.txt
https://www.binary-zone.com/files/MyProxyList.txt
https://rootjazz.com/proxies/proxies.txt
http://cyber-hub.net/proxy/http.txt
http://cyber-gateway.net/get-proxy/free-proxy
">http://proxy.nghuyong.top/

here is a good list that works curate links like this from big lists from https://www.blackhatworld.com/seo/proxie-scraping-links.464079/page-34
 >>/1224/
whoops I described newsboat wrong its not more intricate
from the website 
> Newsboat is a fork of Newsbeuter, an RSS/Atom feed reader for the text console. The only difference is that Newsboat is actively maintained while Newsbeuter isn't. 


https://newsboat.org/
thumbnail of proxylistsorted.txt
thumbnail of proxylistsorted.txt
proxylists... txt
(9.99 MB, 0x0)
 >>/1225/
This source is good, but are they all http/s, or are there socks proxies involved as well? After running ipproxyscraper on it (which took hours, file related is my final result. Might save someone the effort), I got a list of IPs with ports, but no protocols specified.
David Beckham has admitted that a big part of him has questioned whether he was right to retire from professional football but that he has been too busy over the past four months to dwell on the decision.

Hey that's great news.  He's still in pretty good shape.  He'll be signed in no time. Hope he gets a good contract!
Check out the bleeding edge tor source code!!

The 6-hop mod BREAKS THE COMPILING


torsocks git clone http://dccbbv6cooddgcrq.onion/tor.git
 >>/1241/
You can still do the 6 hop mod but in src/core/or/circuituse.c after you change default_path_len to 7 delete the line under it that says
else if fourhop_cutoff

also in src/core/or/or.h you can still change default_route_len to 6 but there is no option to modify max_recent_circuits from 1000 to 100
It compiled for me and linked in 

src/app/tor

I haven't fully tested it yet though.

But you're correct the options have all been removed from or.h .  Also much of the code has been moved around and segregated into different sub directories.  

Keep an eye on this.  Also if you have any other good Tor mods please feel free to share.
circuitstats.h: * 1000 is approx 2.5 days worth of continual-use circuits. */
circuitstats.h:#define CBT_NCIRCUITS_TO_OBSERVE 1000
circuitstats.h:#define CBT_MAX_RECENT_CIRCUITS 1000
circuitstats.h:#define CBT_MAX_MAX_RECENT_TIMEOUT_COUNT 10000
circuitstats.h:#define CBT_MAX_MIN_CIRCUITS_TO_OBSERVE 10000
circuitstats.h:#define CBT_DEFAULT_TIMEOUT_INITIAL_VALUE (60*1000)

this seems to have been moved into src/cor/or/circuitstats.h
 
use grep to search for other missing / moved variables. Thanks for the tip  >>/1241/ ,  >>/1242/ .
 IRC Workflow 
STEP 0)  grab endsh.sh

https://raw.githubusercontent.com/endwall2/endtools/master/endsh.sh

requires torsocks and firejail

STEP 1) Install IRSSI

$ su
# torsocks -i pacman -S irssi
# exit

STEP 2) Modify config file
$ cd ~
$ cd .irssi
$ nano config

scroll to the bottom find the settings section,

settings = {
  core = {
    real_name = "LSnIudlVU3PkBGRuT9VXSOW2WFJ8";
    user_name = "XPDNanEmI6yIFnJf7XStT5wr1SKG";
    nick = "Endwall";
    hostname = "7N3lxpzNCuNgRAslLgsTCBVkPopY";
  };
  "fe-text" = { actlist_sort = "refnum"; };
};

find the settings section and put in random characters, use passgen, change your nick here manually.

$ passgen --bytes 21

STEP 3) Connect

// get a torsocks shell and enter irssi
$ endsh   
$ irssi
[(status)] /connect endchan.net 6667 
[(status)] /join #ENDCHAN
[#ENDCHAN] /window left
[(status)] /help
[(status)] /window right
[#ENDCHAN] /part
[(status)] /disconnect
[(status)] /quit
$ exit
$ exit

for a site with SSL connect with the command 

[(status)] /connect -tls irc.cyberguerrilla.org 6697

[(status)] /connect -tls irc.blackhats.ru 6697
[(status)] /join #SECURITY

[#SECURITY] /part
[(status)] /disconnect
[(status)] /quit
$ exit
$ exit

Note: this method doesn't seem to work with .onion addresses, as it attempts to operate on local host and is denied by torsocks.
I seem to remember being able to access onion irc servers but I used a different program (I can't recall which client). Feel free to add or fill in the blanks.
 >>/1357/

You can also set up proxying to 127.0.0.1:9050 in Hexchat.  This works when connecting to the .onion addresses.

Settings->Preferences->Network-> Network Setup

Fill in the socks5 proxy information.  Then Add the new server in the connection tab using the .onion address and port number.  Works.
Unless there is a discount for buying a vpn with bitcoin. It is not necessarily an anonymous transaction because you theoretically connect to your raw ip with the bitcoin purchased vpn.

Post(s) action:


Moderation Help
Scope:
Duration: Days

Ban Type:


99 replies | 4 file
New Reply on thread #4
Max 20 files0 B total