Sponsored Content
Full Discussion: Tor and vm's
Special Forums Cybersecurity Tor and vm's Post 302935940 by senhortempora on Friday 20th of February 2015 11:12:53 AM
Old 02-20-2015
But even this vision making sense. See big companies with a lot of customers, and that now, we all know have corroborated with snooping...

In my vision it is to be naïve to believe that because of how people will look at them they wouldn't do it, they would still make money, say something... some excuses... Also, it seems like a vicious thing nowadays, companies and even people recording everything, even what is not necessary. And that can lead to privacy problems...

I really don't trust vmware, or windows... or even Google and so on. You can clearly see for example how Chrome takes screenshots when on the startpage you see those little frames of the pages most visited. Who can tell if there aren't more screen shots going up to the cloud?

And all the data collected, are they giving or not access to someone else? The browsers can even see the names of each file on a machine filesystem. That all can be collected. And I know that even using TOR you must be very careful, really careful. If you are just using it for privacy concerns, dont wanting people having every move you do registered and shared you can be more relaxed, it is easier and it is your right.

If you are not breaking any laws or intending to do so. There's no problem on using TOR (but be aware, if you go to the tor project website in an identifiable way, most likely you'll be in a 'list" from that moment on, that's what I heard and is probably true for what we can search online). But to pay a VPN provider for example is to pay to be snooped on big time! I am quite sure of that. They have logs and everything, plus your very personal data.

TOR is one of the best tools we have now. If not the best. Probably the best. It should be more developed by people who really know what they are doing, because if even now there is how to browse privately through the network, then with more work on it, no one would be able to really see those who really know how to use the service.

Me for example right now am using a version on MS OS, not the best, but I in the most am just trying to avoid those terrible data collection for ads purposes and having my browsing data collected from Google, Facebook (even what is done outside their website as they publicly stated) and Co. And I really have the vision that this is our right to browse in this way, of course also avoiding ISP's data collection.

Nice weekend you all Smilie
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

TOR environment variable

My profile sets the TOR variable to $(whence vi). What is TOR used for? I appreciate any help I can get. (3 Replies)
Discussion started by: Wittich
3 Replies

2. Cybersecurity

Problem with Privoxy and Tor

Greetings, I use Debian Wheezy as an OS and I have already downloaded the Tor Browser-Bundle, which works fine. As soon as a start privoxy and set the proxy to: 127.0.0.1:8118 (socks4) in the tor browser (edit-->pref-->advanced-->settings--->http-proxy) I always get a connection refused. I... (1 Reply)
Discussion started by: Dr. Nick
1 Replies

3. Forum Support Area for Unregistered Users & Account Problems

Account Register With Tor

Hello, I would be interested in creating an account on this forum. However I have run into trouble in the process, I seem to not have permission to access the registration page. It seems that this forum has blocked registration from Tor. I am wondering if there is any way I could obtain an account... (0 Replies)
Discussion started by: Unregistered
0 Replies
ESSIDSCAN(8)							     Commands							      ESSIDSCAN(8)

NAME
essidscan - scan for ESSID corresponding to available WLAN access points SYNOPSIS
In /etc/network/interfaces: mapping <interface> script essidscan DESCRIPTION
The essidscan utility is used to tell the ifup and ifdown utilities about the current SSID of the WLAN currently being accessed. It can be used to map the SSID name to an iface stanza. CONFIGURATION
A sample /etc/network/interfaces may look like this: mapping hotplug script /etc/network/essidscan map SSIDONE wlan-work map SSIDTWO wlan-work map HOME iface wlan-work inet dhcp wireless-key 1234-5678-9ABC-DEF0-1234-5678-9A wireless-keymode restricted iface HOME inet static address 192.168.2.4 netmask 255.255.255.0 gateway 192.168.2.1 wireless-essid HOME wireless-key s:somepassword wireless-keymode open iface DEFAULT inet dhcp FILES
/etc/network/interfaces the interfaces definition file /etc/network/run/ifstate a record of the current state of the interfaces, managed by ifup and ifdown SEE ALSO
interfaces(5) ifscheme(8) ifup(8) ifdown(8) AUTHORS
Tor Slettnes <tor@slett.net> ESSIDSCAN(8)
All times are GMT -4. The time now is 08:25 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy