Tor - Protect Your Online Anonymity

EagleEyeHamThrust

Active Member
Tor - Protect Your Anonymity Online

I read a lot of questions in this forum like, "Does anyone get arrested from viewing this website?" Most often the answer is no. Most growers get busted from their buyers that snitch on them after getting arrested themselves. After that you can chalk it up to undercover cops, pissed off exes and nosy neighbors. Still, even though the chances are small that you could get busted from talking about your grow here, why take that chance? Let me put it this way: The chances of getting in a serious car wreck are incredibly small, but I'll bet most of us buckle up anyways. Regardless of whether you're just wanting to learn more about growing weed, a legal grower, or the Pablo Escobar of weed, you certainly don't want some mindless drone at the DEA / FBI data mining the websites you visit for IP information.

A lot of you already know the following stuff, however I'll go over it so that no one is left behind. An IP address, or internet protocol address, is a number registered to your computer by your Internet Service Provider. IPs are logged on website servers to keep track of who's accessed what page at what time. Google for instance has logs of everything that's ever been searched, at what time, and from what IP. This forum probably has similar statistics on its server as well that could be seized with a warrant, or monitored by any of the agencies out there with too much free time on their hands.

How Tor Can Help You

Enter Tor. Tor works in a similar manner to peer to peer downloading, where several people are connected by a client program. Then, when you browse the web, the information goes through several other computers on the network (at random) so that your IP information is hidden. By going through multiple computers, it makes it very difficult to track where the information came from. For example, when I use Tor, often times my internet is rerouted through Germany, Japan, Korea, etc. It quickly becomes a nightmare to trace my internet activity back to me. So if you wanted to post pictures (that have been cleaned of their meta information) of your grow, you could feel more secure using Tor to do it.

htw1.pnghtw2.pnghtw3.png

Is Tor perfect? No. Law enforcement can identify you using two basic methods.

1. They could hack into the computers one by one to trace back to you. This requires a lot of manpower however, and also is not always possible. Contrary to what Hollywood will tell you, encryption, firewalls and smart computing can usually keep you protected from this type of attack. If the FBI or the CIA could view your information that easily, it would have been exposed and be a PR nightmare for them.

2. They could by chance be controlling all of the nodes between you and your browsing which means they could piece the information together by simply coordinating their data. Again, lots of resources for a very limited payoff.

What has history taught us?

History has taught us that law enforcement will go to great lengths to uphold the law, no matter how wrong that law is. Operation Green Merchant was a massive operation that encompassed, among other things, data mining. They raided hydroponics stores, took all the credit card info from their files, and then investigated their customers. It's very possible for the DEA to run an operation where they seize the servers for websites like these and look through the IP logs of various users for tips.

How to Use Tor

Tor is as easy to use as any internet browser. Even better, you can use it with the portable version of firefox on a USB key. That way you can keep all your preferences, history, bookmarks on a USB key and not on your computer. You can even use that USB key on any other computer without leaving and of your info on that computer.

1. Go to http://www.torproject.org/torbrowser/ and download the Tor Browser.
2. Run the program and pick a destination for the files, preferably on a USB key.
3. Start up the Tor browser. The default home page is a Tor test website to confirm that Tor is operating safely and correctly. Once you receive confirmation, you can browse the internet as you normally would.

Downsides

1. Tor is slow. You're routing information through several computers, which takes time. I often browse the forum using my middle mouse button to open threads in new tabs and allows them to load while I'm reading other threads. It takes a little getting used to, but protecting my identity is protecting my freedom which is worth a little more time.

2. No Flash software is allowed to be run with Tor. Flash can be tricked into revealing your info, so no Youtube stuff can be viewed. Still, you can simultaneously have a standard browser window open and cut and paste video links from the forum to that other browser without trouble.

Tor's Other Uses

Other versions of Tor, for use outside of just browsing the internet, can be downloaded at their website. It can be configured to work with chat and various other programs. It takes a little more time to configure properly, but it can be well worth it.

...

If there are any other questions about Tor, post them here and I'll try to answer them. My goal is simple: to help people prevent themselves from getting harassed by law enforcement over a harmless vice.
 

redivider

Well-Known Member
i wrote a beautiful response to this post, only to have it erased when my bat. died.

here's the gist:

Tor, it works. but if you have tor, and for some reason you keep mentioning every single day about how your 500 plant grow is going smoothly, no amount of Tor will protect you. this also goes for anybody using proxy servers. you could use a proxy server algorithm picking out one out of a million possible IP addresses every 10 seconds, but if you're posting 6 updates a day of a 25k watt grow, you're gonna get caught. PERIOD.

the best way is to keep any identifying things out of pictures you may post. no buildings, no outside vegetation, no obvious landmarks, no cars (even if a car ain't yours, the license plate may give LEO's your overall location)...

don't talk about personal experiences, don't mention when you graduated from GlennScape PS 1200 in '74. stuff like that.

read up on what exactly creates probable cause and don't create it.

proxy servers and Tor will only go so far.......
 

EagleEyeHamThrust

Active Member
Tor is still better than a paid proxy server, because law enforcement can get a warrant and get the info from the proxy service to track you down. Tor is anonymous over a huge network of users and is much harder to trace. Either way, if you create an email account with Tor, and then use Tor to register with this forum, I think law enforcement would have a difficult time tracking down your IP.
 

GreenThumbSucker

Well-Known Member
Google cgi proxies. There are lists of them in different countries. I will use a canadian CGI proxy or a european cgi proxy and I switch different ones.
 

brownguy

Member
TOR is probably the best privacy protection software. Earlier, I used GhostSurf (it is not free), but I prefer TOR now. The bundle comes with Firefox. It is just one click approach to surfing the net with confidence.
 

flwrpwr

Member
Thanks for the info, I've installed TOR after reading this. I'm having a problem using it though, as it signs me out each time I change a page and won't allow me to look at attached photos or post replies. I get a message saying something like " You don't have permission to perform this action. Please refresh the page and log in", yet I am logged in already. I also have problems using free anonymous proxies, which let me stay logged in and view photos, but when I post replies all the text is lumped as one paragraph(as you'll see on this post!) and I get an error message of some sort and have to close the page. Any ideas on how to improve my use of these?
 
It's impossible to identify the person who sent the original packet of information because the IP address and the packet are encrypted as they are sent from your computer to the first node onward. The information in the packet, be it an HTTP request or whatever, is decrypted at the exit node. Basically, the DEA and the FBI are fucked if you use TOR.
 

CaNNaBiZ CaNucK

Well-Known Member
A little off topic but I 'd like ask because you guys know what you're talkin about. Let's say you happen to be surfin in a public WiFi zone. Is the Wifi hub's IP the only address visible? Or is there something that identifies your computer specifically while on a public network? What about people who leech their connections from their neighbors who leave their WiFi unsecured. I know a shit-ton of people who do that.
 

redivider

Well-Known Member
It's impossible to identify the person who sent the original packet of information because the IP address and the packet are encrypted as they are sent from your computer to the first node onward. The information in the packet, be it an HTTP request or whatever, is decrypted at the exit node. Basically, the DEA and the FBI are fucked if you use TOR.
you are mistaken.

if the DEA and FBI want to throw you in jail they will, even for other bullshit.

they will also get a game warden and search your shit without a warrant if they wish. local cops will do this too.

the DEA won't arrest you for stuff they pick-up online alone.

even if you tor yourself out all the way, but don't think because you have TOR you won't get caught.

that's not how it works..............
 

EagleEyeHamThrust

Active Member
Eh, it's a good safety measure nonetheless. Anything to make it more difficult to track you down is a good thing. It's the same reason I use cash at the grow store, and use a car that's registered to a different address than my grow. Sure, the cops could follow me undercover, or confront me and ask for my identity which I'm legally required to give, but data mining the store or taking my plates is a lot more likely. It comes down to the fact that cops are going to take the easiest path, just like the rest of us. If there's a guy posting pics of his grow and they all came from the same IP, the DEA might make a phone call to their local force. If they see that the info is coming from multiple IPs, they know it would be difficult, if not futile, to try and trace that information back.

When your best case is a year's probation, and your worst is hard time, it's best to set up as many roadblocks as possible.
 
Top