Unix/Linux Go Back    


Security Discuss UNIX and Linux computer and network security, cyber security, cyber attacks, IT security, and more.

Tor and vm's

Security


Tags
browsing, network, privacy, security, tor

Closed    
 
Thread Tools Search this Thread Display Modes
    #8  
Old Unix and Linux 02-20-2015   -   Original Discussion by senhortempora
Corona688's Unix or Linux Image
Corona688 Corona688 is offline Forum Staff  
Mead Rotor
 
Join Date: Aug 2005
Last Activity: 14 December 2017, 4:58 PM EST
Location: Saskatchewan
Posts: 22,547
Thanks: 1,159
Thanked 4,287 Times in 3,955 Posts
Quote:
Originally Posted by senhortempora View Post
But even this vision making sense. See big companies with a lot of customers, and that now, we all know have corroborated with snooping...
Let me adjust that a little bit. vmware doesn't have billions of individual customers, it has fewer numbers of larger, corporate customers.

It seems okay -- or at least inevitable -- for a company to mess with people's personal information individually these days, but mining someone else's corporation for people's personal information can be seriously big trouble. That's theft, that's information a corporation expects to be paid for.
Sponsored Links
    #9  
Old Unix and Linux 02-20-2015   -   Original Discussion by senhortempora
senhortempora's Unix or Linux Image
senhortempora senhortempora is offline
Registered User
 
Join Date: Feb 2015
Last Activity: 22 May 2015, 10:00 PM EDT
Posts: 6
Thanks: 2
Thanked 0 Times in 0 Posts
Quote:
Originally Posted by sea View Post
If you dont like vmware, you could try virtualbox.

hth
Hello sea! Thanks a lot! I do know about virtual box for example and I appreciate your response Linux I believe the main reason I cited vmware was to show that they request personal information for you to use their product... But mainly, I may want to probably have one machine totally configured or at least ready for just linux access in a safer way next to my Windows machine.

That's because some search for examples are too personal, even small things, for instance, why should anyone know what cream do you want to use or what razor you generally buy and make money out of it? And I am only talking about the tip of the iceberg (hyperbole?) of possible uses for information...

Thanks again! Linux

---------- Post updated at 07:51 PM ---------- Previous update was at 07:31 PM ----------

Quote:
Originally Posted by Corona688 View Post
Let me adjust that a little bit. vmware doesn't have billions of individual customers, it has fewer numbers of larger, corporate customers.

It seems okay -- or at least inevitable -- for a company to mess with people's personal information individually these days, but mining someone else's corporation for people's personal information can be seriously big trouble. That's theft, that's information a corporation expects to be paid for.
Yes, yes, I agree, those are the kind of customers that vmware has in the most part. But as you can see my response to sea, the use of vmware requires registration, something must be behind it. Some kind of control of information, that's obvious (the question is why and what does the info can end up, willingly or not). (even the free non-comercial version has this request for info)

And that is not necessary theorically, because others don't do (this request for info), but of course not only because of that, it is as clear as clean water that it is not necessary not even for their business purposes. The important thing is to have a good software that a lot of people use (and companies also).

But even it being a big issue to mess with corporate information, for another company to do or allow it somehow we do know that it is not impossible. And that doesn't mean (unfortunately) that because it is wrong, or unethical, that it won't be done by some kind of people or association.

There are some informations that I believe you've encountered and read or heard about backdoors on MS OS's for examples. Absolutely that shouldn't be different for corporative clients as the system build is basically the same. And Windows goes on on the market. Mainly perhaps because of how easy it is to deal with (the system). And depending on the case even Ubuntu (that is more and more caring about money) or other unix basic system can't be totally trusted. The ideal thing is to know programming and networks to really infer if a system is safe and spread the word to those who doesn't know those stuff. If there is time to do this (for someone I mean)... and even so, something may have not been seen in time. Like in unix system that ghost problem that happened (how many people did know about that if any? Was that on purpose (the existence or the fact that it was not informed before and corrected?) )

So, basically, what I mean is, that is not because it would be wrong, unethical and possibly cause a bad image if discovered that some people and/or companies won't act in that direction. By my point of view it is basically a moral issue.
Sponsored Links
    #10  
Old Unix and Linux 02-27-2015   -   Original Discussion by senhortempora
sparcguy's Unix or Linux Image
sparcguy sparcguy is offline Forum Advisor  
Registered User
 
Join Date: Nov 2006
Last Activity: 7 October 2015, 6:30 AM EDT
Posts: 381
Thanks: 3
Thanked 8 Times in 8 Posts
I hear FBI network uses TOR model themselves.

TOR is safe but slow really too slow for surfing. you really want to be safe I suggest using relays of homing pigeons to deliver messages no technology in the world can trace that.
    #11  
Old Unix and Linux 03-26-2015   -   Original Discussion by senhortempora
senhortempora's Unix or Linux Image
senhortempora senhortempora is offline
Registered User
 
Join Date: Feb 2015
Last Activity: 22 May 2015, 10:00 PM EDT
Posts: 6
Thanks: 2
Thanked 0 Times in 0 Posts
Well sparcguy, TOR will be usable depending on your connection and the quality of the connection in your country as well... but it is, even so, slower than the usual connection, that's true.

And probably all (if not all some of) the major agencies not only from US have some relays themselves just to try to get information through it. I've read some stuff that says how they try to trace the information exchanged... and read it of course...

But yeah, it is safe tough. If you know at least a bit of technology and what to do and what not to do over it. But the real thing is, there is a lot of crimes that are possible to be tracked by technology, that's normal for government agecies to want to have the possibility to access all information possible. But on the other hand there's a limit to how much information is accessed and even more WHY. It must have a reason, a real good reason. And not just do it for the sake of it.

As we recently learned, (even though many have guessed probably), there are a lot of information, really personal information that can end somewhere where it shouldn't be, and instead of stopping crime there are some people just looking at it, the private information of someone. That shouldn't be done at all. Why do that? Just because they "can"?

But in general there are not really much to concern about, for example, if you use some adblock software you can stop unwanted ads, once you already pay for your bandwidth you have the right to decide or not to see ads when surfing; but of course, if someone provides you with good information, fun and et cetera and you want to help then you can let the ads on on their blogs, websites... and if you use the ads it'll be even more revenue to them.

The main thing is that you should be free to do whatever you want online. Without being spied on. But then again, some people would commit crimes (even more crimes would happen I mean) if there weren't punishment for what is done online. So that's necessary to have some control of course. Otherwise it would be a really dark place internet. We need laws everywhere. Because there are people that just don't know how to live a life that is good. They have this need to do something bad, that's what it seems to happen, like that Dexter's Dark Passenger (for analogy haha) (and should be tackled of course). But the control should only reside on log based systems for the general public (unless under rightful investigation), because IF necessary, then the data would be accessed.

That's a really huge conversation, that take a lot of time and would probably go on. We have ethics to deal with. We have a lot to deal with. We need law enforcement. But we also need respect. So that is some times a thin line that is crossed. And it seems in a lot of situations that the line is purposefully crossed... even if not necessary...
Sponsored Links
Closed

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Linux More UNIX and Linux Forum Topics You Might Find Helpful
Thread Thread Starter Forum Replies Last Post
Problem with Privoxy and Tor Dr. Nick Security 1 08-02-2013 05:45 PM
TOR environment variable Wittich UNIX for Dummies Questions & Answers 3 07-30-2003 01:40 PM



All times are GMT -4. The time now is 11:59 AM.