Jump to content

internet surveillence self defence ( safe and secure browsing )


majithia23

Recommended Posts

By the way I am wrong about HostMan including list or having lists you can download.. It updated today.. and after I installed it again.. and then uninstalled it.. LOL.. ( I already have over 13,000 entries.. ) I went through it.. so just to rectify.. and I still trust SpyBot's more because of the updates it has.. and broader spectrum concerning the browsers..

Link to comment
Share on other sites


  • Replies 37
  • Views 4.3k
  • Created
  • Last Reply
  • Administrator

Wow. First time I'm hearing about ItsHidden and it seems good. I would like more reviews.

About UlltraVPN, well I haven't been using it recently. But it's good enough. ;)

Link to comment
Share on other sites


I use these lists with PeerBlock.. ( from iBlocklist )

Tor

Wireless

Hijacked

Level 2

Level 3

Proxy

Nexus23 - IPFilterX

First big error , using all of these lists you are banning 85% of Internet ranges . Why that ?

Just ipfilterX is enough .

@DKT27 - uTorrent and any other program can be used with Vidalia.. as your nodes change, and your time on the network increases you will get faster speeds.. there will be times when the overall speed drops however... on your connection unless it changed recently.. I would expect that you could easily max out n keep it there.. However speeds that are maintained for days at the top of say several MB/s won't be possible.. and I have noticed some speed increases after adding the Tor filter to PeerBlock... in some cases I have experienced even normal usage as if I was on my regular network.. both with browser and other programs.. so it may just depend on your nodes and available bandwidth being shared globally..

Second big error :

Never use such a program like Peerguardian or Peerblock with list loaded so to block connections while Tor is active and running .

According to this article :

These tools would not be able to ban the "use" of various Tor nodes in the circuit just by looking at outgoing connections to the first hop,

since the Tor client tunnels into connections from the first hop to the further hops. So if you want to make statements like "don't use Germany

in the circuit", a tool that monitors the client's network won't be able to do that.

But more importantly, Tor's anonymity comes from having users blending together by making

choices over the same set of data using the same weights. If a given Tor user started choosing paths differently, she would stand out, and

actually get *worse* anonymity. This particular field of path selection is not well-understood and full of pitfalls that might be extremely bad.

So I would worry that if you provided a feature like this for your users,

it would end up harming them in unpredictable ways.

Hope that helps,

Roger

Spark

Link to comment
Share on other sites


Second big error :

Never use such a program like Peerguardian or Peerblock with list loaded so to block connections while Tor is active and running .

As the article says, peerblock/peerguardian cannot block tor nodes, so using tor along side peerblock/peerguardian doesn't do you any harm. In the first place, I don't think heath28m means blocking tor nodes by using peerblock/peerguardian, he is just making a point that bittorrent can be torrified, that's it!

So if you want to make statements like "don't use Germany

in the circuit", a tool that monitors the client's network won't be able to do that.

Agree, if you want to specify exit/entry nodes you have to reconfigure torcc, no other way.

EDIT:

@Spark - the next time you want to make a point pls. do it in a much lighter way ;)

Link to comment
Share on other sites


I use these lists with PeerBlock.. ( from iBlocklist )

Tor

Wireless

Hijacked

Level 2

Level 3

Proxy

Nexus23 - IPFilterX

First big error , using all of these lists you are banning 85% of Internet ranges . Why that ?

Just ipfilterX is enough .

@DKT27 - uTorrent and any other program can be used with Vidalia.. as your nodes change, and your time on the network increases you will get faster speeds.. there will be times when the overall speed drops however... on your connection unless it changed recently.. I would expect that you could easily max out n keep it there.. However speeds that are maintained for days at the top of say several MB/s won't be possible.. and I have noticed some speed increases after adding the Tor filter to PeerBlock... in some cases I have experienced even normal usage as if I was on my regular network.. both with browser and other programs.. so it may just depend on your nodes and available bandwidth being shared globally..

Second big error :

Never use such a program like Peerguardian or Peerblock with list loaded so to block connections while Tor is active and running .

According to this article :

These tools would not be able to ban the "use" of various Tor nodes in the circuit just by looking at outgoing connections to the first hop,

since the Tor client tunnels into connections from the first hop to the further hops. So if you want to make statements like "don't use Germany

in the circuit", a tool that monitors the client's network won't be able to do that.

But more importantly, Tor's anonymity comes from having users blending together by making

choices over the same set of data using the same weights. If a given Tor user started choosing paths differently, she would stand out, and

actually get *worse* anonymity. This particular field of path selection is not well-understood and full of pitfalls that might be extremely bad.

So I would worry that if you provided a feature like this for your users,

it would end up harming them in unpredictable ways.

Hope that helps,

Roger

Spark

:lmao: Well you forgot to mention the four others ones too.. total today is 1,683,147,591 entries and just a note these lists block only suspicious, or bad IP ranges and addresses... within each specific area.. and are updated/changed on a daily basis.. so technically.. I am not blocking 85% of all addresses.. and even though some may use the Tor network for safety.. ( just like all of the normal ones ) .. not all are safe therefore if its found to be used for hacking.. or other maliciousness the connection is blocked..

I connect to the Proxy I am running with my Internet Options.. and all traffic is monitored/filtered/scanned in and out.. Now some of those lists available can and will include a few specific addresses that are added, that will have to be allowed for your network to function properly; but this just makes sense, being that networks are not all configured the same.. Nether are ISP's/DNS and so on.. I don't usually have any issues.. when I do.. then there is a problem that needs to be changed and its not always on my end.. :)

IPFilterX by Nexus23.. is a great list ( used to be TOO good..LOL ) but its there to make sure and is usually only used for the paranoid.. which isn't always a good thing..

I do however experience maximum Network utilization and instant response with all of these things in place and my network properly tweaked.. Even with Vidalia.. I usually use it normally but when it counts I throw on the Tor button.... A few of these settings are a little tighter and can cause some issues.. I usually have not one issue with having great anonymity in the tests I have run and the quote seems to be of concern, but I am willing to bet that an expert on Tor would disagree being the nature of Tor's creation and what it does and has to do.. even with blocked bad proxies and nodes/whatever... regardless of nay specific route.. what you miss in the presentation of the idea is that .. in order for that concern to be true... then there would be only one path.. which could be taken... Going with the idea.. that is stated on Panopticlick.. using the equation to deduce that origin of and narrowing the possibilities while excluding some.. would not exclude.. the ultimate function of the network in general.. IMO.. I see it to be more of a sub-network.. which still achieves its goal and quite readily.. :)

Link to comment
Share on other sites


:lmao: Well you forgot to mention the four others ones too.. total today is 1,683,147,591 entries and just a note these lists block only suspicious, or bad IP ranges and addresses... within each specific area.. and are updated/changed on a daily basis.. so technically.. I am not blocking 85% of all addresses.. and even though some may use the Tor network for safety.. ( just like all of the normal ones ) .. not all are safe therefore if its found to be used for hacking.. or other maliciousness the connection is blocked..

I connect to the Proxy I am running with my Internet Options.. and all traffic is monitored/filtered/scanned in and out.. Now some of those lists available can and will include a few specific addresses that are added, that will have to be allowed for your network to function properly; but this just makes sense, being that networks are not all configured the same.. Nether are ISP's/DNS and so on.. I don't usually have any issues.. when I do.. then there is a problem that needs to be changed and its not always on my end.. :)

IPFilterX by Nexus23.. is a great list ( used to be TOO good..LOL ) but its there to make sure and is usually only used for the paranoid.. which isn't always a good thing..

I do however experience maximum Network utilization and instant response with all of these things in place and my network properly tweaked.. Even with Vidalia.. I usually use it normally but when it counts I throw on the Tor button.... A few of these settings are a little tighter and can cause some issues.. I usually have not one issue with having great anonymity in the tests I have run and the quote seems to be of concern, but I am willing to bet that an expert on Tor would disagree being the nature of Tor's creation and what it does and has to do.. even with blocked bad proxies and nodes/whatever... regardless of nay specific route.. what you miss in the presentation of the idea is that .. in order for that concern to be true... then there would be only one path.. which could be taken... Going with the idea.. that is stated on Panopticlick.. using the equation to deduce that origin of and narrowing the possibilities while excluding some.. would not exclude.. the ultimate function of the network in general.. IMO.. I see it to be more of a sub-network.. which still achieves its goal and quite readily.. :)

ipfilterX are 551,279,354 ips ,whose are pretty enough , yours 1,683,147,591 entries are paranoid and sure not ipfilterX itself .

However the evidence remains unknow because I still don't understand if you are using blocklists to block ip ranges on port 80 or not .

Link to comment
Share on other sites


When an IP is blocked.. ( Review your List Manager in PeerBlock.. View a list ) .. it does not matter what port... nether does IDS/Scanning/Filtering/Logging of the two cards and devices I have on my network...

One concern that did come to my attention are of Vista Ultimate and 7 Ultimate user who install or even have IIS 7 running on their computer and have no idea of it... That is something that I think people should be aware of.. running on port 80 of these systems where the option has been enabled.. If you go to http://127.0.0.1:80 in your browser and you bring up a teal colored square, which says ' Welcome ' in 15 different languages.. yours is running.. From what I read there are a lot of steps to making the server secure.. or rather ..atleast a lot of options... Tenable Nessus is a good program to make sure your webserver is secure.. 80 is the default port hit when you use an IP address to hit someones network or system.. depending on your port forwarding .. this may also hit your network device.. ( which could be compromised as well.. ICMP if I remember correctly ).. There are also other ports which are most common for instance Telnet ports.. THAT is what you should be more worried about..Worm and Bots.. quite a few use this...

It is also advisable to just scan all protocols.. not just one.. you need to broaden the scope in bringing it to the table.. there are quite a bit more things to worry about.. and plenty of documentation all over the net to be well informed.. :thumbsup: on that note you might well understand why I use specific list where in which the authors focused on one thing and doing that one thing very well.. To be truthful .. I probably don't need IPFilterX..

Link to comment
Share on other sites


all right guys ,

tell me one thing ----

i hv been using Tor to stay anonymous while normal browsing .

can or should we use it for accessing our mail accounts or any site requiring login details or any https access also ?

what i know from what ever i have read in the past few days ,

Tor encrypts and anonymizes your data .

but it is vulnerable at entry and more vulnerable at exit nodes , where the client running an exit node might evesdrop into an information exiting it . ( however will still not know who sent it , but will be able to get just the info , that is your login details .. )

am i right ?

so at the exit node the data is not encrypted ? or is it ?

and if we access our mail accounts like gmail which have https access , does it remain safe ?

or for that reason any https access ...

i hope i made my ques clear ...

@heath28m , @nivrid5, @(all network specialists ) ...

kindly guide friends ...

thanks .

Link to comment
Share on other sites


@majithia23:

Don't use Tor for very sensitive information. Either use VPN or your own connection.

Most experienced users only use Tor for browsing to achieve partial anonymity.

Link to comment
Share on other sites


+1 Biz

But if you really want to use tor in using your email/other transactions, better use https or other encryption techniques (FF uses SSL encryption, for password encryption use Roboform).

Link to comment
Share on other sites


@majithia23:

Don't use Tor for very sensitive information. Either use VPN or your own connection.

Most experienced users only use Tor for browsing to achieve partial anonymity.

+1 Biz

But if you really want to use tor in using your email/other transactions, better use https or other encryption techniques (FF uses SSL encryption, for password encryption use Roboform).

@Biz

thanks . got it .

i some times use ultra vpn .( dkt recommended it .)

but it is jerky on my network . ( sometimes work and passes anonymity test and sometimes doesnt ..)

2nd one i use is ItsHidden vpn . its overloaded . doesnt connects easily and also snaps during a connection . ( but when working , it is good )

do you know of any other vpn networks ?

@nivrid5

yes i use gmail ( which supports https by default . )

i know of roboform , but never used it . ( i access my accounts with a fingerprint from my laptop )

if i m not wrong ,it just manages and stores your passwords and login details .

how does it help in safe browsing ?

thanks .

Link to comment
Share on other sites


@majithia23

Roboform provides password encryption where it is virtually impossible for someone interested in stealing your passwords. RoboForm also generates random passwords which hackers will never ever guess. Also, it will be able to recognize phishing websites so you won’t accidentally log in to a fake website that looks that same as the website you normally log in to.

Link to comment
Share on other sites


@majithia23

Roboform provides password encryption where it is virtually impossible for someone interested in stealing your passwords. RoboForm also generates random passwords which hackers will never ever guess. Also, it will be able to recognize phishing websites so you won't accidentally log in to a fake website that looks that same as the website you normally log in to.

thanks nivrid5.

out of inquisitiveness i downloaded roboform and i m fiddling with it right now .

yes you are right , it does encrypts and stores your passwords safely .

but it is not of much use to me right now , ( bcoz the fingerprint software does this job pretty well ..)

but the good thing about it is the password generator and integration into firefox .

one other good password manager i found -- Keypass .

it also does the same job .

but is not integrated by default ( although it does have reported plugins ) and the auto fill feature requires a bit learning .

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...