/g/ - Technology

install openbsd

[Make a Post]
[X]





Hoe do websites know you are using Tor? Nanonymous No.3618 (A)[D][S][L][A][C]

Is there a master list of Tor exit nodes somewhere? And how can the Tor project fix this?

Nanonymous No.3619 [D] >>3620 >>3660

https://torstatus.blutmagie.de/
>And how can the Tor project fix this?
There's nothing to fix.

Nanonymous No.3620 [D] >>3621 >>3625

>>3619
What do you mean? Many servers fuck with Tor users.

Nanonymous No.3621 [D]

>>3620
It's okay, they don't want give you data because of your culture. You too can make website, where you give data only to tor users or even only for yourself.

Nanonymous No.3625 [D]

>>3620
It's open project and all exit nodes and relays are listed in the public list, only bridges are hidden. What you're proposing would be against their philosophy to keep things transparent.

Nanonymous No.3638 [D]

I want to add to what already was said in the thread that sites sometimes don't have exactly up-to-date Tor block, so by changing your exit node (restarting the Tor client) you may find one that has not been blocked. It's unreliable though.

Nanonymous No.3650 [D]

Some sites are stupid enough to block your IP or annoy you even when you're just running a normal (non-exit) relay. They just import some random IP blacklist without checking if the selection criteria is relevant.

Tor browser itself is also pretty easy to detect even without using IP lists.

l33t H@X0r No.3655 [D][U][F] >>3689 >>3781
File: dae496bdd6206821798afeecfc3bf37d907820435c664597945be598bd5b2808.webm (dl) (2.37 MiB)

Psst!
VPN over Tor (Tor-to-VPN), not the other way around. Simplest method is to use a VPN client installed on a Whonix workstation, not the gateway. VPN won't have your details but will be a legit non-Tor exit for websites.

Nanonymous No.3660 [D]

>>3619
it's already fixed with content-addressable storage such as Freenet. serving static content the way the web does is fucking retarded and as a result you get retarded shit like IP blocks

Nanonymous No.3689 [D] >>3687

>>3655
The vpn will be able to link all your tor activity to a single user, and if you do something to deanonymize yourself even once all previous tor usage is now known to be from you

Nanonymous No.3756 [D]

No, it's not because of that, pajeet. 9 times out of 10 it's because they're using cloudflare which blocks tor by default.

Nanonymous No.3781 [D]

>>3655
That's pretty dangerous if you don't know what you're doing. You send out a Tor packet from your ISP, it bounces around, is decrypted, then a packet from a Tor exit node with your key is recieved by your VPN. The VPN gets what you want and sends it back. The VPN knows everything you did.

If you're smart you can send a packet to a VPN, who then sends it through Tor and then after the exit node you route through a proxy or anonymous VPN. But that last step is decrypted tor traffic so if they're tracking your session then they can link all of that tor traffic together. A single slipup and they know everything you did.

So yeah if you're this level of paranoid you should probably be using a hacked access point or botnet instead.