Sponsored Content
Full Discussion: Tor and vm's
Special Forums Cybersecurity Tor and vm's Post 302939506 by senhortempora on Thursday 26th of March 2015 04:28:20 AM
Old 03-26-2015
Well sparcguy, TOR will be usable depending on your connection and the quality of the connection in your country as well... but it is, even so, slower than the usual connection, that's true.

And probably all (if not all some of) the major agencies not only from US have some relays themselves just to try to get information through it. I've read some stuff that says how they try to trace the information exchanged... and read it of course...

But yeah, it is safe tough. If you know at least a bit of technology and what to do and what not to do over it. But the real thing is, there is a lot of crimes that are possible to be tracked by technology, that's normal for government agecies to want to have the possibility to access all information possible. But on the other hand there's a limit to how much information is accessed and even more WHY. It must have a reason, a real good reason. And not just do it for the sake of it.

As we recently learned, (even though many have guessed probably), there are a lot of information, really personal information that can end somewhere where it shouldn't be, and instead of stopping crime there are some people just looking at it, the private information of someone. That shouldn't be done at all. Why do that? Just because they "can"?

But in general there are not really much to concern about, for example, if you use some adblock software you can stop unwanted ads, once you already pay for your bandwidth you have the right to decide or not to see ads when surfing; but of course, if someone provides you with good information, fun and et cetera and you want to help then you can let the ads on on their blogs, websites... and if you use the ads it'll be even more revenue to them.

The main thing is that you should be free to do whatever you want online. Without being spied on. But then again, some people would commit crimes (even more crimes would happen I mean) if there weren't punishment for what is done online. So that's necessary to have some control of course. Otherwise it would be a really dark place internet. We need laws everywhere. Because there are people that just don't know how to live a life that is good. They have this need to do something bad, that's what it seems to happen, like that Dexter's Dark Passenger (for analogy haha) (and should be tackled of course). But the control should only reside on log based systems for the general public (unless under rightful investigation), because IF necessary, then the data would be accessed.

That's a really huge conversation, that take a lot of time and would probably go on. We have ethics to deal with. We have a lot to deal with. We need law enforcement. But we also need respect. So that is some times a thin line that is crossed. And it seems in a lot of situations that the line is purposefully crossed... even if not necessary...
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

TOR environment variable

My profile sets the TOR variable to $(whence vi). What is TOR used for? I appreciate any help I can get. (3 Replies)
Discussion started by: Wittich
3 Replies

2. Cybersecurity

Problem with Privoxy and Tor

Greetings, I use Debian Wheezy as an OS and I have already downloaded the Tor Browser-Bundle, which works fine. As soon as a start privoxy and set the proxy to: 127.0.0.1:8118 (socks4) in the tor browser (edit-->pref-->advanced-->settings--->http-proxy) I always get a connection refused. I... (1 Reply)
Discussion started by: Dr. Nick
1 Replies

3. Forum Support Area for Unregistered Users & Account Problems

Account Register With Tor

Hello, I would be interested in creating an account on this forum. However I have run into trouble in the process, I seem to not have permission to access the registration page. It seems that this forum has blocked registration from Tor. I am wondering if there is any way I could obtain an account... (0 Replies)
Discussion started by: Unregistered
0 Replies
arm(1)							      General Commands Manual							    arm(1)

NAME
arm - Terminal Tor status monitor SYNOPSIS
arm [OPTION] DESCRIPTION
The anonymizing relay monitor (arm) is a terminal status monitor for Tor relays, intended for command-line aficionados, ssh connections, and anyone stuck with a tty terminal. This works much like top does for system usage, providing real time statistics for: * bandwidth, cpu, and memory usage * relay's current configuration * logged events * connection details (ip, hostname, fingerprint, and consensus data) * etc Defaults and interface properties are configurable via a user provided configuration file (for an example see the provided armrc.sample). Releases and information are available at http://www.atagar.com/arm. OPTIONS
-i, --interface [ADDRESS:]PORT tor control port arm should attach to (default is 127.0.0.1:9051) -c, --config CONFIG_PATH user provided configuration file (default is ~/.arm/armrc) -d, --debug writes all arm logs to ~/.arm/log -b, --blind disable connection lookups (netstat, lsof, and ss), dropping the parts of the interface that rely on this information -e, --event EVENT_FLAGS flags for tor, arm, and torctl events to be logged (default is N3) d DEBUG a ADDRMAP k DESCCHANGED s STREAM i INFO f AUTHDIR_NEWDESCS g GUARD r STREAM_BW n NOTICE h BUILDTIMEOUT_SET l NEWCONSENSUS t STATUS_CLIENT w WARN b BW m NEWDESC u STATUS_GENERAL e ERR c CIRC p NS v STATUS_SERVER j CLIENTS_SEEN q ORCONN DINWE tor runlevel+ A All Events 12345 arm runlevel+ X No Events 67890 torctl runlevel+ U Unknown Events -v, --version provides version information -h, --help provides usage information FILES
~/.arm/armrc Your personal arm configuration file /usr/share/doc/arm/armrc.sample Sample armrc configuration file that documents all options AUTHOR
Written by Damian Johnson (atagar@torproject.org) 27 August 2010 arm(1)
All times are GMT -4. The time now is 02:21 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy