/pol/ - Politically Incorrect

Where lolis are free speech and Hitler did nothing wrong

Index Catalog Archive Bottom Refresh
Mode: Reply
Name
Options
Subject
Message

Max message length: 8000

Files

Max file size: 32.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and postings)

Misc

Remember to follow the rules

The backup domain is located at 8chan.se. .cc is a third fallback. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 2.0.

Maintenance Postponed

8chan Ultimatum - Volunteers Needed
Modeling, Voice Acting, and Animation


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

Be sure to visit /polarchive/ for file libraries Remember to archive all links, and videos should be attached to posts or using a front end

(73.53 KB 1200x725 index.png)

Anonymous 01/09/2021 (Sat) 00:11:08 Id: 80e605 No. 6746
A reminder to everybody If you haven't already, go to torproject(Please use archive.today) and download and install the most recent release of the Tor browser. I'd recommend downloading and backing it up for multiple operating systems as well. Shit's getting crazy, who knows what will happen. And don't forget to bookmark the onion for this site.
>>7298 >You're a fucking retard. You sound angry, like if you were selling VPN. >They make you harder to track by making websites think you're in a different place than you may be That's nothing compared to Tor. Feds can ask any VPN for data and read your browsing history. Also your web browser settings are unique and they can track you even if you change IP with VPN. Tor Browser tries to make all Tor users look the same. >and let you bypassregion-locked sites. I don't know such sites expect jewish movie streaming shit. But yes, this is some use of VPN, probably the only one use that makes sense. >How the fuck does that not help anonymity or privacy? Little when feds can check who you are with one click. >You have to trust that the service works, that a website you go on to doesn't block your current or all Tor exit nodes, that they won't subvert it, and so on. You can read Tor source code and check it yourself. You can also commit a serious crime with Tor and see if you get caught. Try to do the same with VPN. >You can pay for some VPNs in crypto Crypto is also payment data. Cryptocurrencies like bitcoin are not anonymous, they are similar to credit cards and you are tracked. >and you have to connect to Tor with your real IP as well, unless you route your network through your VPN first or something like that. Only the first Tor server knows your IP. The last Tor server that makes the request to the server, does not know your IP. VPN always knows your IP.
>>7306 Not only does that not mean it won't happen, even if it did and people forked Tor, They would likely begin some kind of purge to get rid of "unsafe Tor forks", with maybe some amount of success. >>7308 >criticizing Tor means you're a glowie I don't think there's any need for you to worry about them if you're this fucking retarded. >>7311 >You sound angry, like if you were selling VPN. Because telling someone to use Tor instead of a VPN is fucking retarded, you should be using both; and frankly that is a ludicrous amount of fucking hypocrisy. >Feds can ask any VPN for data and read your browsing history. And I imagine that they could theoretically track down various Tor nodes and spy on what's being sent; the issue is less the possibility and more about if that happens, will the VPN refuse and actually does not keep any logs; a few VPNs have ran into issues and have either refused to give up information, or when that information was accessed, there were indeed no logs on it. >Little when feds can check who you are with one click. That does not explain anything. >You can read Tor source code and check it yourself. You can also commit a serious crime with Tor and see if you get caught. Try to do the same with VPN. VPNs are well-known to let you avoid getting into trouble with your ISP over torrents. >Crypto is also payment data. Cryptocurrencies like bitcoin are not anonymous, they are similar to credit cards and you are tracked. >cryptocurrencies like bitcoin ...then don't use bitcoin. Sounds like a pretty simple solution, there. >Only the first Tor server knows your IP. The last Tor server that makes the request to the server, does not know your IP. VPN always knows your IP. But that doesn't change the fact that Tor does get your IP address unless the connection goes through a VPN first. As far as I'm aware, neither of them you can connect to without exposing your IP in some way, so if that's actually true then you should change your priorities to which one is most trustworthy instead of being frustrated at the current state of it and make a very big mistake with In case some fuckwit like >>7308 cucks for Tor again, as much as I criticize it and am sticking up for VPNs, I'm not saying that Tor itself is shit (I just don't think you or anyone else should trust it due to the pictures I posted), I'm saying that it shouldn't be relied upon alone; Use it and a VPN, ideally one that, while been hacked, and had its "no-logging" policy to have been revealed to be true, and/or one outside out the 14 eyes, and if you can't find it free then look for one you can pay for with a more anonymous cryptocurrency.
>>7324 >Not only does that not mean it won't happen, even if it did and people forked Tor, They would likely begin some kind of purge to get rid of "unsafe Tor forks", with maybe some amount of success. Nobody brought up forks until now. That is a theoretical future problem, not a current one. If that happened and TOR was ruined and alternatives were shut down, maybe then VPNs would be the best solution left for a time. We're not in that hypothetical future yet, though. >VPNs are well-known to let you avoid getting into trouble with your ISP over torrents. He said "serious" crime.
>>7324 >criticizing Tor means you're a glowie Maybe you aren't, but you are manipulated by VPN sellers. They make profit from that shit so they pay people to shill the shit. >Because telling someone to use Tor instead of a VPN is fucking retarded Because? Tor gives anonymity and privacy, VPN does not. So use Tor only. >you should be using both For what purpose? Why aren't you posting on this site from Tor? >And I imagine that they could theoretically track down various Tor nodes and spy on what's being sent This won't do shit because from spying the last Tor node you won't see who sent the data. There are some complicated and expensive attacks to deanonymize Tor users, but they have weak success rate and are expensive. Deanonymizing VPN users is trivial. >will the VPN refuse and actually does not keep any logs; a few VPNs have ran into issues and have either refused to give up information, or when that information was accessed, there were indeed no logs on it. False. They sell the logs to feds because they can get more profit from that, if they refuse to give logs the feds will close their business. Even if they really didn't log, the feds can read traffic that goes into the VPN server and out. It won't be hard to find the person. >VPNs are well-known to let you avoid getting into trouble with your ISP over torrents. Torrents are not serious crime. If you leave empty beer bottle on pavement or grass, the police won't be checking fingerprints from bottle or doing any investigation. Torrents are lowest tier crime. >...then don't use bitcoin. Sounds like a pretty simple solution, there. Then good luck buying anything. >But that doesn't change the fact that Tor does get your IP address unless the connection goes through a VPN first. As far as I'm aware, neither of them you can connect to without exposing your IP in some way, so if that's actually true then you should change your priorities to which one is most trustworthy instead of being frustrated at the current state of it and make a very big mistake with Wrong. Tor guard node (first one) knows your IP, but the last one that connects to website doesn't know your IP. So they can't sell your IP to feds. With VPN, you are connecting with your IP to VPN server, which then transmits data to websites. The single VPN server knows your: IP, payment data, what sites you visit, what data you send (without SSL). They have all that and can sell it or give to feds. You have to trust a shady corporation that exists only to make profits. >In case some fuckwit like >>7308 cucks for Tor again, as much as I criticize it and am sticking up for VPNs, Because? >Use it and a VPN Why don't you? >and had its "no-logging" policy to have been revealed to be true This cannot be proven for any VPN. Also, even if they didn't log in the past, they can now on in the future.
>>7341 >Nobody brought up forks until now. I brought it up because it's become a common retort against the possibility of subversion and corruption of the Tor project. >That is a theoretical future problem, not a current one. If that happened and TOR was ruined and alternatives were shut down, maybe then VPNs would be the best solution left for a time. We're not in that hypothetical future yet, though. I never once said that VPNs were the best solution than even Tor, what I've been getting at is that VPNs are not something inherently shitty and untrustworthy. If you still want to use Tor, I would advise you to use both Tor and a VPN you've found to be worth using; just don't be retarded and dismiss one of your options right out of the gate. >>7347 > but you are manipulated by VPN sellers. Fuck off, I tell people to use VPNs out of my own free will. >Because? Tor gives anonymity and privacy, VPN does not. So use Tor only. That is terrible advice, you dumb cunt >For what purpose? To get the protections both can offer you. >Why aren't you posting on this site from Tor? Because I don't fucking trust them for reasons I stated. >This won't do shit because from spying the last Tor node you won't see who sent the data. Then they wouldn't spy from the last Tor node in the chain, only the first. >Deanonymizing VPN users is trivial. How so? >Torrents are not serious crime. If you leave empty beer bottle on pavement or grass, the police won't be checking fingerprints from bottle or doing any investigation. Torrents are lowest tier crime. Please tell me how one being serious and one isn't, changes things. >Then good luck buying anything. Non-bitcoin cryptocurrencies are starting to become more accepted. >Wrong. Tor guard node (first one) knows your IP, but the last one that connects to website doesn't know your IP. So they can't sell your IP to feds. You keep admitting that the first node knows your IP, therefore, They know your fucking IP. Just because it's not known to the last 2 nodes and the destination website, doesn't mean that it didn't get ever get to see it. > The single VPN server knows your: IP, payment data, what sites you visit, what data you send (without SSL). "Payment data" is too vague of a term to use, and this same information can be found on different Tor nodes. >They have all that and can sell it or give to feds. You have to trust a shady corporation that exists only to make profits. As I already stated, Tor is directly funded by the fucking feds. They are not any less shady. And again, they could likely get a hold of this data and use it for malicious purposes just as well. Not to mention that you should obviously look for a VPN who seems trustworthy, to reduce any issues with shadiness. >Because? Because I recognize the benefits of VPNs and aren't retarded enough to deny them. >Why don't you? Because I don't trust Tor for the reasons I've stated earlier (founders are subversives, they get funding from the government, and the images I and >>7201 posted earlier., >This cannot be proven for any VPN. I just said that it can, albeit that "method" would done inadvertently. >Also, even if they didn't log in the past, they can now on in the future. Why the hell would they suddenly keep logs on their users if they didn't before they got their own security breached? You're right to be skeptical about VPNs, but this almost blind trust in Tor that you simultaneously have is infuriating. Do your research on both (as everyone else should), go with whichever one looks most trustworthy, and pass who they are and why you trust them, on to others. Just don't be stupid and disparage one or the other when both have their uses.
>>7500 >I never once said that VPNs were the best solution than even Tor, This conversation started because someone was trying to argue that the people behind TOR being SJWs implies the service is bad. The argument was about if it actually means the service is bad or not.
>>7533 >This conversation started because someone was trying to argue that the people behind TOR being SJWs implies the service is bad. The argument was about if it actually means the service is bad or not. It was, but then it turned into an argument about Tor vs VPNs for some reason. And I never even meant to imply that the service was bad, I said as much to the contrary multiple times; I was stating that Tor itself is not trustworthy because of the founders' beliefs, not that it was a bad service in itself.
>>7533 The fact that SJW's are behind TOR doesn't mean that the service is bad, it means that SJW's are behind it. If the service is bad, you could say that this is probably because the SJW's are deliberately using it against those who are in the most need of the services they claim to offer. But you actually have to show how the service is bad, and what is wrong with it, speculating with "SJW's are managing it, so it must be compromised in some way" is going to get you nowhere, except as a reason to start looking into possible built-in problems. Now, when you find the issue, you can coordinate with other anons to make a truly safe version of the service by using TOR as a starting point to make something that does the same thing it was CLAIMED to do, but fixes the issues that were deliberately installed there to help catch the people the management doesn't like.
>>6746 Also: Make sure you have some dark (hard to trace/prove the existence of) assets made safe in the form of Monero. You can buy it on Bisq. Best way to buy stuff.
>>8174 Also: worried about the inflation of the Monero network? Buy some Bitcoin with the Monero you acquired (making it dark Bitcoin, no connection to you. The combination of chain-hopping and Monero cut off your tracks) and buy Ether and Dai. You can get interest on the Dai that beats inflation (Dai decentralized USD stablecoin, so it can't be frozen or seized, unlike UDSC and USDT and other centralized ones).
>>7247 You're a faggot for that idiocy.
>>7024 Using TOR over vpn now. Werks.
(48.18 KB 600x453 p1.jpg)

>>7247 I2P was created by Russians in Russia when Putin and KGB-FSB already controlled Russian IT. I dont recommend to use I2P. PIC - Shelomov (the real last name of so called "Putin", the Tsar of Russians) with his friends
>>7074 >about:config disable javascript by default, it's still set to >enable:true
>>10852 >I2P >MUH RUSSIANS!!!!111 All the more reason to trust it. Russians make good shit. End of story. And I2P has many advantages over Tor. The main one being decentralization. Tor relies on 12 servers worldwide to maintain integrity of the network. Without at least half of those 12 servers being up and running, Tor goes offline. Whereas on I2P ever user/client acts as their own server for maintaining integrity of the network. Furthermore, I have more in common with most Russians than I have with any leftist in my own counrty. I have more respect for Putin than the current illegitimate government in my own country.
>>6746 >The guy on the photo had similar ideas about Russia. Now he is in the Russian prison. Do you know why, my dear RUSSIAN TROLL? ;) Tell us
(14.03 MB 793x642 psr2.gif)

(24.71 KB 424x389 Tor Ball logic.jpg)

>>7201 >>7227 >>7238 This >>7247 I'll still continue using it but I find their priorities to be questionable at times.
>>7324 At least toss out some names of unpozzed VPN services <Shilling incoming...
>>7125 >There are even a few chans that are ONLY on Tor or ONLY on I2P, some are specifically NATSOC. I want that. Is it a good idea if someone posted them here or would it make the shill's lives easier?
But why is tor so laggy?
>>11450 Your connection goes through a series of nodes before reaching destination which is a much slower route than a direct connection
>>7201 this, unironically
t35t
So if I got this right, leftists developed Tor, but as far as people know there's nothing pozzed about it?
If you don't like how the Tor devs are such pozzloads, just use I2P. It's like Tor but made by Russians and better decentralized.
>>11494 does it still work? I heard the project is mostly dead?
>>11499 I tried using it and a lot of sites were down. I also didn't find any chan or something like that running
>>6746 >And don't forget to bookmark the onion for this site. I had the tor browser for a bit, but then I had to restart my computer. So, I closed the tor browser, and when I opened it back up again, all my bookmarks were gone. WTF is the point? I cant' be bothered to fix retardation like that.
>>6746 hey there you fucking faggot glownigger. the tor project is a glowie honeypot run by the cia. go fuck yourself.
>>11879 Nigger... CIA field agents use Tor to talk to their handlers back home. Letting everyone use it serves a specific purpose: If the CIAniggers had kept it to themselves, anyone caught using Tor could be fingered as a CIA asset, but since it's released to the public, you can't single out the CIA asset traffic from all the other chatter. If you want something better (albeit slower) and run by Russians, try I2P. It has its advantages.
(91.21 KB 1080x1064 photo_2021-09-24_10-20-02.jpg)

mumble/murmur uses tcp (can work through tor) been meanint to test it out and try voice i imagine the delays would be fun
i had an interesting thought about irc through tor user docker instances and linking those servers to eachother spin up a separate irc server/onion per contact like id have my own onion adress for my client if one server gets spammy or botty just kill it handing out new onions to trusted people could track down who leaked or shared and is shitting things up and drop their onion without disturbing service as a whole
>>11940 IRC service is built into I2P dark web software. You just run I2P and then point your IRC client at localhost:6668 Best to use an IRC client that does NOT support DCC, as DCC can reveal your IP to adversaries.
>>11977 >Best to use an IRC client that does NOT support DCC, as DCC can reveal your IP to adversaries. How would this happen if you're connected to TOR or I2P? Would the IRC client use DCC to connect via the clearnet?


Forms
Delete
Report
Quick Reply