Posts: 17 Threads: 0 Joined: N/A September 18, 2022 at 6:44 PM For "bulletproof" opsec is just "home ip" -> TOR -> breached.to enough?
or is combination of tor and VPN a must? "home-ip" -> VPN -> TOR -> VPN -> breached.to
I am thinking maybe that VPN solution can back fire since most VPN providers use same company underneath anyway.
Maybe VPN just before or just after TOR? which solution is best to avoid getting rect? Posts: 372 Threads: 0 Joined: N/A September 18, 2022 at 6:47 PM depends what you plan on doing here if just browsing or chatting vpn would be fine nothing illegal about being here but use good vpn like mullvad
if you plan on breaking laws you want tor or better yet in vm like whonix or use reboot with tails
tho to be clear nothing is bulletproof especially if you're working from home Posts: 17 Threads: 0 Joined: N/A September 18, 2022 at 7:05 PM (September 18, 2022, 06:47 PM)nbit Wrote: depends what you plan on doing here if just browsing or chatting vpn would be fine nothing illegal about being here but use good vpn like mullvad
if you plan on breaking laws you want tor or better yet in vm like whonix or use reboot with tails
tho to be clear nothing is bulletproof especially if you're working from home for the sake of argument lets say something very illegal. whonix and tails will only help once a warrant is executed but not to cover your digital trails? i was speaking in general terms, do not literally talk about breached.to Posts: 372 Threads: 0 Joined: N/A September 18, 2022 at 7:50 PM (September 18, 2022, 07:05 PM)digibigi Wrote: (September 18, 2022, 06:47 PM)nbit Wrote: depends what you plan on doing here if just browsing or chatting vpn would be fine nothing illegal about being here but use good vpn like mullvad
if you plan on breaking laws you want tor or better yet in vm like whonix or use reboot with tails
tho to be clear nothing is bulletproof especially if you're working from home
for the sake of argument lets say something very illegal. whonix and tails will only help once a warrant is executed but not to cover your digital trails? i was speaking in general terms, do not literally talk about breached.to i see i think everyone has own opinion on tor/vpn discussion but whonix or tails will help keep your digital trail anonymous imo ideal setup is laptop -> tor(tails) -> vpn - one reason for vpn imo is you have more freedom moving around internet vs tor but can also mitigate with bridges etc
- then its all about opsec where laptop was acquired without identifying yourself (by camera or purchase history) and vpn like mullvad also paid in way so none of your info is attached to it
- then dont conduct your activities where you live
- most important as thegrugq says stfu about whatever your doing
each step backwards from that scenario increases your risk to varying degree meaning say you bought your laptop with your credit card or working on your home internet obv you know those can now be tied back to you all to say you're most likely to be identified from slipping somewhere on opsec than because you used tor/vpn instead of vpn/tor/vpn or w/e configuration Posts: 17 Threads: 0 Joined: N/A September 18, 2022 at 10:07 PM (September 18, 2022, 07:50 PM)nbit Wrote: (September 18, 2022, 07:05 PM)digibigi Wrote: (September 18, 2022, 06:47 PM)nbit Wrote: depends what you plan on doing here if just browsing or chatting vpn would be fine nothing illegal about being here but use good vpn like mullvad
if you plan on breaking laws you want tor or better yet in vm like whonix or use reboot with tails
tho to be clear nothing is bulletproof especially if you're working from home
for the sake of argument lets say something very illegal. whonix and tails will only help once a warrant is executed but not to cover your digital trails? i was speaking in general terms, do not literally talk about breached.to
i see i think everyone has own opinion on tor/vpn discussion but whonix or tails will help keep your digital trail anonymous
imo ideal setup is laptop -> tor(tails) -> vpn- one reason for vpn imo is you have more freedom moving around internet vs tor but can also mitigate with bridges etc
- then its all about opsec where laptop was acquired without identifying yourself (by camera or purchase history) and vpn like mullvad also paid in way so none of your info is attached to it
- then dont conduct your activities where you live
- most important as thegrugq says stfu about whatever your doing
each step backwards from that scenario increases your risk to varying degree meaning say you bought your laptop with your credit card or working on your home internet obv you know those can now be tied back to you
all to say you're most likely to be identified from slipping somewhere on opsec than because you used tor/vpn instead of vpn/tor/vpn or w/e configuration Really good point about digital fingerprints and whonix/tails. Even if it was so that emptying the cookies and browser history were enough, full clearing by default is the best insurance against human mistakes. regarding the physical laptop, how could it identify you other than the MAC address of the network card? Posts: 16 Threads: 0 Joined: N/A September 18, 2022 at 10:14 PM If you don't know the pros/cons of using a VPN before tor, you absolutely don't need it. In case tor is blocked in your country utilize a bridge instead if possible. Posts: 329 Threads: 0 Joined: N/A September 19, 2022 at 12:10 AM Its not recommended to use tor with a VPN, if yer tryin to make sure that yer isp doesnt know yer on tor, use a bridge, if yer hyper paranoid, use a tails (easiest secure way) on a usb, hes what tor has to say about vpns with it https://support.torproject.org/faq/faq-5/ Posts: 372 Threads: 0 Joined: N/A September 19, 2022 at 12:25 AM (September 18, 2022, 10:07 PM)digibigi Wrote: (September 18, 2022, 07:50 PM)nbit Wrote: (September 18, 2022, 07:05 PM)digibigi Wrote: (September 18, 2022, 06:47 PM)nbit Wrote: depends what you plan on doing here if just browsing or chatting vpn would be fine nothing illegal about being here but use good vpn like mullvad
if you plan on breaking laws you want tor or better yet in vm like whonix or use reboot with tails
tho to be clear nothing is bulletproof especially if you're working from home
for the sake of argument lets say something very illegal. whonix and tails will only help once a warrant is executed but not to cover your digital trails? i was speaking in general terms, do not literally talk about breached.to
i see i think everyone has own opinion on tor/vpn discussion but whonix or tails will help keep your digital trail anonymous
imo ideal setup is laptop -> tor(tails) -> vpn- one reason for vpn imo is you have more freedom moving around internet vs tor but can also mitigate with bridges etc
- then its all about opsec where laptop was acquired without identifying yourself (by camera or purchase history) and vpn like mullvad also paid in way so none of your info is attached to it
- then dont conduct your activities where you live
- most important as thegrugq says stfu about whatever your doing
each step backwards from that scenario increases your risk to varying degree meaning say you bought your laptop with your credit card or working on your home internet obv you know those can now be tied back to you
all to say you're most likely to be identified from slipping somewhere on opsec than because you used tor/vpn instead of vpn/tor/vpn or w/e configuration
Really good point about digital fingerprints and whonix/tails. Even if it was so that emptying the cookies and browser history were enough, full clearing by default is the best insurance against human mistakes.
regarding the physical laptop, how could it identify you other than the MAC address of the network card? mac address is prob all you have to worry about unless you hack a nationstate if that were the scenario details as silly as your screen size could theoretically put you at risk but youd really have to have pissed someone off like snowden level paranoia but end of day if you hack using computer you bought with your credit card thats a potential risk Posts: 25 Threads: 0 Joined: N/A September 20, 2022 at 1:14 AM get a vpn, use a vm, go to a public cafe to do your stuff, anything you can think off Posts: 39 Threads: 0 Joined: N/A September 21, 2022 at 2:53 PM If FBI or CIA hunting for you, you did, else tor is safe enough for most of people. and I'll use build-in obfs bridge, they are running by tor-project official. |