Guide "Tor"

  • Hello Guest! Welcome to ConsoleCrunch, to help support our site check out the premium upgrades HERE! to get exclusive access to our hidden content.
  • Unable to load portions of the website...
    If you use an ad blocker addon, you should disable it because it interferes with several elements of the site and blocks more than just adverts.
  • Read Rules Before Posting Post Virus Scans with every program.

Miss @ Security

Avid Poster
CC Dev Team
Determined Poster
Active Member
Jul 13, 2016
1,040
576
198
Hello everyone,

We have become accustomed to the Internet and are constantly sharing personal information: our food, our meetings, our travels and our readings. If someone tries to find out about you, they may know your identity, location, browser, any sites you visit, and other personal information that you do not want to share with strangers who might Use without your knowledge.

Introduction:
Tor "the onion router" is at the heart of freedom on the internet.


Millions of people depend on Tor for their security and protection of their personal data online. The Tor project is a non-profit organization dedicated to research, development and education on anonymity and online privacy. When browsing the web, the sites visited can record your IP address and therefore easily trace back to you through this. Hence, sometimes, the need to hide this IP address. Tor is a software that allows you to pass your connection through a network of "nodes", hiding your real IP. This is the onion routing. When you use Tor, the software will select 3 random nodes (or servers) to "set a circuit". The communication will then be successively encrypted 3 times, once for each server, before being sent to the first node Tor.

The advantage with Tor is that no node knows both sender and recipient. The first node knows only the sender (you). The second knot knows no one. The third node only knows the recipient. In addition, Tor will switch circuits regularly. You will therefore "move" on the Internet because your geolocation will be changed randomly. For a given communication, you will give the impression of being in England, the next in Australia, the third in South America, etc ...

To start quickly with tor:

In order to use the Tor anonymization network, it is necessary to configure the Tor software itself, but also the software that will use it, such as the web browser, for example. These settings are often tedious, so much so that it is difficult to be sure of the anonymity that results. This is why it is generally advisable for beginners, to use Tor quickly, to use either a live system dedicated to this purpose such as the excellent "Tails" based on Debian GNU / Linux, or to use a "kit Ready "like Tor Browser Bundle (TBB) which is a tool that allows to install and to use Tor very easily on a" classic "system. No setup will be necessary and all software required for browsing under Tor are included.

Install and configure tor:
The Tor Browser Bundle (TBB) Package lets you use Tor on Windows, Mac OS X or Linux without the need to install tier software. It can run from a USB key and comes with a preconfigured web browser to protect your anonymity. It is autonomous.

Windows


Run the file you downloaded to extract the Tor browser to a folder on your computer (or your USB key). All you have to do is open the folder and click "Start Tor Browser".


Linux


Extract the file to the destination of your choice. The default location is correct.
Click on TOR Browser to start.


Mac osx



Warning :

Caution: Keep in mind that the Tor Browser Bundle does not provide anonymity for the entire computer. Only connections to websites using the browser included in the TBB go through Tor. All other connections (client mail, RSS feed aggregators, other browsers, etc.) are not anonymised. In addition, navigation traces, such as cookies or passwords, will likely be saved to the hard drive as well as downloaded documents. It happens also that when browsing, one clicks on a link that automatically launches software (video player for example) that it will not pass through Tor. Clues about the nature of your navigation could then leak.

To use a system that connects to the Internet only via Tor and to be able to use Tor with other software, you will have to turn to Tails (the Amnesic Incognito Live System) which is a live operating system that you can start on virtually n ' Any computer, from a DVD, a USB key, or an SD card. Its role is to preserve your privacy and your anonymity.

Tails allows you to use the Internet anonymously and bypass censorship. All outbound connections to the Internet must pass through the Tor network.
Tails allows you to leave no trace on the computer you are using unless you explicitly request it.
Tails allows you to use cryptographic tools to encrypt your files, emails and instant messaging.



Tails is the tool hated by the NSA because it wants to democratize anonymity online.
Anonymous and onion irc for more security.



Anonymous uses anonymous networks hosted in the deep web .CyberGuerrilla IRC servers (* .onion) use Tor's hidden services to protect your anonymity. Tor offers its users a set of services by hiding the identity of the server that hosts them. They thus make it possible to hide the IP address, and therefore the geographical coordinates, of the servers using this hidden service. The security of a service on Tor can only be guaranteed if this service has been properly configured, has no vulnerability or configuration errors, and the Web application does not have any flaws.

If you have any questions I can help you


Just Be :anonimous:
 
  • Like
Reactions: Douglas Oliveira

Douglas Oliveira

Public Legend
Retired Staff
Local Legend
Local Hero
Local Celebrity
Community Elite
Community Veteran
Determined Poster
Active Member
Console ID Poster
Jun 5, 2015
3,915
7,501
1,268
Brasil
Hello everyone,

We have become accustomed to the Internet and are constantly sharing personal information: our food, our meetings, our travels and our readings. If someone tries to find out about you, they may know your identity, location, browser, any sites you visit, and other personal information that you do not want to share with strangers who might Use without your knowledge.

Introduction:
Tor "the onion router" is at the heart of freedom on the internet.


Millions of people depend on Tor for their security and protection of their personal data online. The Tor project is a non-profit organization dedicated to research, development and education on anonymity and online privacy. When browsing the web, the sites visited can record your IP address and therefore easily trace back to you through this. Hence, sometimes, the need to hide this IP address. Tor is a software that allows you to pass your connection through a network of "nodes", hiding your real IP. This is the onion routing. When you use Tor, the software will select 3 random nodes (or servers) to "set a circuit". The communication will then be successively encrypted 3 times, once for each server, before being sent to the first node Tor.

The advantage with Tor is that no node knows both sender and recipient. The first node knows only the sender (you). The second knot knows no one. The third node only knows the recipient. In addition, Tor will switch circuits regularly. You will therefore "move" on the Internet because your geolocation will be changed randomly. For a given communication, you will give the impression of being in England, the next in Australia, the third in South America, etc ...

To start quickly with tor:

In order to use the Tor anonymization network, it is necessary to configure the Tor software itself, but also the software that will use it, such as the web browser, for example. These settings are often tedious, so much so that it is difficult to be sure of the anonymity that results. This is why it is generally advisable for beginners, to use Tor quickly, to use either a live system dedicated to this purpose such as the excellent "Tails" based on Debian GNU / Linux, or to use a "kit Ready "like Tor Browser Bundle (TBB) which is a tool that allows to install and to use Tor very easily on a" classic "system. No setup will be necessary and all software required for browsing under Tor are included.

Install and configure tor:
The Tor Browser Bundle (TBB) Package lets you use Tor on Windows, Mac OS X or Linux without the need to install tier software. It can run from a USB key and comes with a preconfigured web browser to protect your anonymity. It is autonomous.

Windows


Run the file you downloaded to extract the Tor browser to a folder on your computer (or your USB key). All you have to do is open the folder and click "Start Tor Browser".


Linux


Extract the file to the destination of your choice. The default location is correct.
Click on TOR Browser to start.


Mac osx



Warning :

Caution: Keep in mind that the Tor Browser Bundle does not provide anonymity for the entire computer. Only connections to websites using the browser included in the TBB go through Tor. All other connections (client mail, RSS feed aggregators, other browsers, etc.) are not anonymised. In addition, navigation traces, such as cookies or passwords, will likely be saved to the hard drive as well as downloaded documents. It happens also that when browsing, one clicks on a link that automatically launches software (video player for example) that it will not pass through Tor. Clues about the nature of your navigation could then leak.

To use a system that connects to the Internet only via Tor and to be able to use Tor with other software, you will have to turn to Tails (the Amnesic Incognito Live System) which is a live operating system that you can start on virtually n ' Any computer, from a DVD, a USB key, or an SD card. Its role is to preserve your privacy and your anonymity.

Tails allows you to use the Internet anonymously and bypass censorship. All outbound connections to the Internet must pass through the Tor network.
Tails allows you to leave no trace on the computer you are using unless you explicitly request it.
Tails allows you to use cryptographic tools to encrypt your files, emails and instant messaging.



Tails is the tool hated by the NSA because it wants to democratize anonymity online.
Anonymous and onion irc for more security.



Anonymous uses anonymous networks hosted in the deep web .CyberGuerrilla IRC servers (* .onion) use Tor's hidden services to protect your anonymity. Tor offers its users a set of services by hiding the identity of the server that hosts them. They thus make it possible to hide the IP address, and therefore the geographical coordinates, of the servers using this hidden service. The security of a service on Tor can only be guaranteed if this service has been properly configured, has no vulnerability or configuration errors, and the Web application does not have any flaws.

If you have any questions I can help you


Just Be :anonimous:
Thank you Fallen :)
 

Miss @ Security

Avid Poster
CC Dev Team
Determined Poster
Active Member
Jul 13, 2016
1,040
576
198
Hello everyone,

We have become accustomed to the Internet and are constantly sharing personal information: our food, our meetings, our travels and our readings. If someone tries to find out about you, they may know your identity, location, browser, any sites you visit, and other personal information that you do not want to share with strangers who might Use without your knowledge.

Introduction:
Tor "the onion router" is at the heart of freedom on the internet.


Millions of people depend on Tor for their security and protection of their personal data online. The Tor project is a non-profit organization dedicated to research, development and education on anonymity and online privacy. When browsing the web, the sites visited can record your IP address and therefore easily trace back to you through this. Hence, sometimes, the need to hide this IP address. Tor is a software that allows you to pass your connection through a network of "nodes", hiding your real IP. This is the onion routing. When you use Tor, the software will select 3 random nodes (or servers) to "set a circuit". The communication will then be successively encrypted 3 times, once for each server, before being sent to the first node Tor.

The advantage with Tor is that no node knows both sender and recipient. The first node knows only the sender (you). The second knot knows no one. The third node only knows the recipient. In addition, Tor will switch circuits regularly. You will therefore "move" on the Internet because your geolocation will be changed randomly. For a given communication, you will give the impression of being in England, the next in Australia, the third in South America, etc ...

To start quickly with tor:

In order to use the Tor anonymization network, it is necessary to configure the Tor software itself, but also the software that will use it, such as the web browser, for example. These settings are often tedious, so much so that it is difficult to be sure of the anonymity that results. This is why it is generally advisable for beginners, to use Tor quickly, to use either a live system dedicated to this purpose such as the excellent "Tails" based on Debian GNU / Linux, or to use a "kit Ready "like Tor Browser Bundle (TBB) which is a tool that allows to install and to use Tor very easily on a" classic "system. No setup will be necessary and all software required for browsing under Tor are included.

Install and configure tor:
The Tor Browser Bundle (TBB) Package lets you use Tor on Windows, Mac OS X or Linux without the need to install tier software. It can run from a USB key and comes with a preconfigured web browser to protect your anonymity. It is autonomous.

Windows


Run the file you downloaded to extract the Tor browser to a folder on your computer (or your USB key). All you have to do is open the folder and click "Start Tor Browser".


Linux


Extract the file to the destination of your choice. The default location is correct.
Click on TOR Browser to start.


Mac osx



Warning :

Caution: Keep in mind that the Tor Browser Bundle does not provide anonymity for the entire computer. Only connections to websites using the browser included in the TBB go through Tor. All other connections (client mail, RSS feed aggregators, other browsers, etc.) are not anonymised. In addition, navigation traces, such as cookies or passwords, will likely be saved to the hard drive as well as downloaded documents. It happens also that when browsing, one clicks on a link that automatically launches software (video player for example) that it will not pass through Tor. Clues about the nature of your navigation could then leak.

To use a system that connects to the Internet only via Tor and to be able to use Tor with other software, you will have to turn to Tails (the Amnesic Incognito Live System) which is a live operating system that you can start on virtually n ' Any computer, from a DVD, a USB key, or an SD card. Its role is to preserve your privacy and your anonymity.

Tails allows you to use the Internet anonymously and bypass censorship. All outbound connections to the Internet must pass through the Tor network.
Tails allows you to leave no trace on the computer you are using unless you explicitly request it.
Tails allows you to use cryptographic tools to encrypt your files, emails and instant messaging.



Tails is the tool hated by the NSA because it wants to democratize anonymity online.
Anonymous and onion irc for more security.



Anonymous uses anonymous networks hosted in the deep web .CyberGuerrilla IRC servers (* .onion) use Tor's hidden services to protect your anonymity. Tor offers its users a set of services by hiding the identity of the server that hosts them. They thus make it possible to hide the IP address, and therefore the geographical coordinates, of the servers using this hidden service. The security of a service on Tor can only be guaranteed if this service has been properly configured, has no vulnerability or configuration errors, and the Web application does not have any flaws.

If you have any questions I can help you


Just Be :anonimous:

Mac osx
Unzip the file and drag TorBrowserBundle_en-US.app into your application folder.
Double-click TorBrowserBundle_en-US.app.
If you have problems read the "Start Tor on Mac OS X" documentation
 
General chit-chat
Help Users
    @ QM|T_JinX: :weed: