![]() ![]() And if you do want to stay hidden from said organizations, you should think much deeper about opsec than just use Tor. Its harder to counter this in windows than in, say, Linux or even a live distribution such as Tails.īut basically, if you're not trying to stay hidden from organizations with very large budgets, I'd say Tor on Windows works just as advertised. For example, parts of your browsing history may find their way onto permanent storage, maybe via the paging system or as deleted files etc. It might be possible, maybe even easy, to find out what you've been browsing in the Tor Browser due to Windows's less than ideal handling of user privacy while you're working with your computer. There's another problem if your computer is stolen. I think the FBI did exactly that a few years ago to identify visitors of illegal services provided through the Tor network. ![]() Once the Tor Browser is compromised, you really are in trouble because it then becomes possible to deanonymize you. So zero-day attacks which target the mozilla browser variants on windows will often work against the Tor browser bundle, too. The large number of installed Windows platforms makes Windows an interesting target for attacks. There are risks, most notably the following: If you use the Tor Browser to browse the net, I don't see how Windows 10's tendency to phone home would negatively affect your anonymity in Tor, since it will phone home in the clear, while your browsing will happen over the Tor network, so the two data streams have nothing to do with each other. But this is completely independent of Tor. It's true that Windows 10 sends an awful lot of data home to Redmond. If you don't feel safe, don't download anything illegally.I think much of that "Tor on Windows 10 is no good" is hyperbole. Anonymous Bittorrenting is not gonna happen anytime soon (and I hope it never will because it will form a haven for some of the worst criminal activities on this planet). It would be like having a second front door which can be opened with the same key.Īs I said you can protect yourself from a bit of datamining through websites using such a service as Anonimizer but thats pretty much where it ends. And not even that much cos they need about the same evidence to get your personal info from your ISP as they would need to get your real IP from such a VPN/Relay service provider. In the end you pay a shitload of money and hamper your maximum speed to make it a bit more difficult for the RIAA/MPAA/Local Law Enforcement. Besides this would make the owner of the IP you do use to connect to the internet/µtorrent users responsible for your activities unless they can prove it was you (which companies that do actually provide this service will make sure they can). Threats include any threat of suicide, violence, or harm to another. However because of the heavy bandwidth use of µtorrent there are almost no commercially viable solutions for this. Harassment is any behavior intended to disturb or upset a person or group of people. The only way to hide your IP from other Bittorrent users is by making a VPN connection or other secure relay system and connect to the Internet and thus other Bittorrent users using an IP that isn't directly linked to you. Web Anonymizer won't cloak you from other Bittorrent users and might actually mess up µtorrent because tracker communication is cloaked (depends on how Anonymizer works) but data exchange isn't. µtorrent uses a bit of http (for tracker communication mostly) but the actual sending of data doesn't go through http but Bittorrents own protocol. The web (aka world wide web) usually refers to the part of internet that is involved with websites / http. If you're file-sharing, they already treat you like a bad customer even if not like a criminal.Īs far as I can see Anonymizer is a web IP hider service. It pays to know in advance if your ISP will stand up for you especially if they think you're being falsely accused. That's basically how the MPAA and RIAA work. ![]() Or they could hand out a lot of personal details about you just in the hopes I go away and don't call lots of lawyers after them. They'd be basically forced to comply by law (even to a phony letter!) and at least deny you service. I could pose as a copyright cop and probably get them to force them to give me your real ip using a DMCA cease-and-desist letter. I had to BLOCK my own LAN and internet ip using µTorrent's ipfilter.dat just to prevent loopback connection attempts!Įver heard of NTT America, Inc.? That's probably connected with the service you're using. If they try the proxy ip instead of your real ip, it's probably not (port) forwarded.so you end up firewalled.Įven if the proxy works, µTorrent can be parroting out your REAL ip address.just like mine likes to report both its LAN and internet ip, which gets into my peer ip list for torrents I'm on. You connect to peers and seeds.they have to know your ip if they are to connect back to you. Have you ever considered that if you were completely hidden you couldn't run torrents at all? ![]()
0 Comments
Leave a Reply. |