home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 110,365 of 112,125   
   Nomen Nescio to All   
   Re: Question about Tor and it's 'onion'    
   11 Jul 24 10:02:25   
   
   XPost: alt.privacy.anon-server   
   From: nobody@dizum.com   
      
   On 10 Jul 2024, karl@bogus.net posted some   
   news:f41b782176c52d7e133a68938267df62@dizum.com:   
      
   > On Wed, 10 Jul 24 23:45:28 UTC, you wrote:   
   >>   
   >> On 7/10/24 18:29, karl@bogus.net wrote:   
   >> > Why does this onion choice supposedly make Tor more secure?  If a Tor   
   >> > relay point can be compromised, cannot an onion relay also? Does not   
   >> > this onion double the work of having to keep check on two types of   
   >> > relays instead of only the Tor relay network?   
   >> >   
   >> > I don't understand the necessity of this onion thing.   
   >>   
   >> It's a user's choice whether they want to inject their remailer message   
   >> into the remailer network via a Tor hidden service like Mixmin's   
   >>   
   >> 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25   
   >>   
   >> or whether they want to inject it directly via the SMTP server of the   
   >> entry remailer, say fleegle.mixmin.net:25   
   >>   
   >> The former method hides your IP address from the the entry remailer.   
   >>   
   >> The later method reveals your IP address to the entry remailer.   
   >>   
   >   
   > In other words, all my non-onion Host Manger entries in QSL will not   
   > hide my IP.  Somewhere, years back, I thought that was the reason for   
   > Tor being written.   
      
   Your understanding is pizza sliced.  You're stuck on "onion" and you need   
   to read the help file in QSL as it pertains to the following, "Proxy Host   
   Profile", "Proxy Manager", and "Tor configuration" to get a better grasp   
   how QSL needs to work with Tor.  It's very simple.   
      
   If you use QSL with Tor, you must configure a proxy setting that enables   
   Tor when sending.   
      
   Think of it this way.   
      
   An onion address will not work without Tor, it can't resolve.   
      
   On the other hand.   
      
   A typical "A" record host name or CNAME (smtp.gmail.com) will work just   
   fine without Tor in QSL, however it exposes the sender IP (Yours) to the   
   receiving smtp server.  If you want to prevent the smtp server from seeing   
   your IP address, configure a Tor proxy entry and use it when sending.   
      
   > So, all Tor does is function somewhat like a VPN. It protects my IP   
      
   Not really.  A VPN is point-to-point, where as Tor is routed across   
   multiple hops to and from.  There are other finer details such as where   
   DNS resolution occurs, locally or remotely, others.  Also a remote website   
   can run scripting attacks on your VPN connection and determine your real   
   IP address easier than you'd think.   
      
   A VPN is not anonymous.  The entry point will always know what your IP   
   address is and log it.  Screw around and they'll dox you in a heartbeat if   
   a government agency asks.   
      
   > from being known by the sites I visit, plus from a site trying to   
   > download something to me which I didn't ask for - If I don't screw up   
   > Tor's basic settings.   
   >   
   > Finally, Tor's onion choice does hide my IP from the entry remailer.   
   > (?)   
      
   QSL's proxy choice using Tor does that.  Anything configured to use Tor as   
   a proxy will do that.   
      
   >> --   
   >> SEC3   
   >>   
   >> YAMN Help Tutorial - https://www.sec3.net/yamnhelp/   
   >   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca