Tor and vm's


 
Thread Tools Search this Thread
Special Forums Cybersecurity Tor and vm's
# 8  
Old 02-20-2015
Quote:
Originally Posted by senhortempora
But even this vision making sense. See big companies with a lot of customers, and that now, we all know have corroborated with snooping...
Let me adjust that a little bit. vmware doesn't have billions of individual customers, it has fewer numbers of larger, corporate customers.

It seems okay -- or at least inevitable -- for a company to mess with people's personal information individually these days, but mining someone else's corporation for people's personal information can be seriously big trouble. That's theft, that's information a corporation expects to be paid for.
# 9  
Old 02-20-2015
Quote:
Originally Posted by sea
If you dont like vmware, you could try virtualbox.

hth
Hello sea! Thanks a lot! I do know about virtual box for example and I appreciate your response Smilie I believe the main reason I cited vmware was to show that they request personal information for you to use their product... But mainly, I may want to probably have one machine totally configured or at least ready for just linux access in a safer way next to my Windows machine.

That's because some search for examples are too personal, even small things, for instance, why should anyone know what cream do you want to use or what razor you generally buy and make money out of it? And I am only talking about the tip of the iceberg (hyperbole?) of possible uses for information...

Thanks again! Smilie

---------- Post updated at 07:51 PM ---------- Previous update was at 07:31 PM ----------

Quote:
Originally Posted by Corona688
Let me adjust that a little bit. vmware doesn't have billions of individual customers, it has fewer numbers of larger, corporate customers.

It seems okay -- or at least inevitable -- for a company to mess with people's personal information individually these days, but mining someone else's corporation for people's personal information can be seriously big trouble. That's theft, that's information a corporation expects to be paid for.
Yes, yes, I agree, those are the kind of customers that vmware has in the most part. But as you can see my response to sea, the use of vmware requires registration, something must be behind it. Some kind of control of information, that's obvious (the question is why and what does the info can end up, willingly or not). (even the free non-comercial version has this request for info)

And that is not necessary theorically, because others don't do (this request for info), but of course not only because of that, it is as clear as clean water that it is not necessary not even for their business purposes. The important thing is to have a good software that a lot of people use (and companies also).

But even it being a big issue to mess with corporate information, for another company to do or allow it somehow we do know that it is not impossible. And that doesn't mean (unfortunately) that because it is wrong, or unethical, that it won't be done by some kind of people or association.

There are some informations that I believe you've encountered and read or heard about backdoors on MS OS's for examples. Absolutely that shouldn't be different for corporative clients as the system build is basically the same. And Windows goes on on the market. Mainly perhaps because of how easy it is to deal with (the system). And depending on the case even Ubuntu (that is more and more caring about money) or other unix basic system can't be totally trusted. The ideal thing is to know programming and networks to really infer if a system is safe and spread the word to those who doesn't know those stuff. If there is time to do this (for someone I mean)... and even so, something may have not been seen in time. Like in unix system that ghost problem that happened (how many people did know about that if any? Was that on purpose (the existence or the fact that it was not informed before and corrected?) )

So, basically, what I mean is, that is not because it would be wrong, unethical and possibly cause a bad image if discovered that some people and/or companies won't act in that direction. By my point of view it is basically a moral issue.
# 10  
Old 02-27-2015
I hear FBI network uses TOR model themselves.

TOR is safe but slow really too slow for surfing. you really want to be safe I suggest using relays of homing pigeons to deliver messages no technology in the world can trace that.
# 11  
Old 03-26-2015
Well sparcguy, TOR will be usable depending on your connection and the quality of the connection in your country as well... but it is, even so, slower than the usual connection, that's true.

And probably all (if not all some of) the major agencies not only from US have some relays themselves just to try to get information through it. I've read some stuff that says how they try to trace the information exchanged... and read it of course...

But yeah, it is safe tough. If you know at least a bit of technology and what to do and what not to do over it. But the real thing is, there is a lot of crimes that are possible to be tracked by technology, that's normal for government agecies to want to have the possibility to access all information possible. But on the other hand there's a limit to how much information is accessed and even more WHY. It must have a reason, a real good reason. And not just do it for the sake of it.

As we recently learned, (even though many have guessed probably), there are a lot of information, really personal information that can end somewhere where it shouldn't be, and instead of stopping crime there are some people just looking at it, the private information of someone. That shouldn't be done at all. Why do that? Just because they "can"?

But in general there are not really much to concern about, for example, if you use some adblock software you can stop unwanted ads, once you already pay for your bandwidth you have the right to decide or not to see ads when surfing; but of course, if someone provides you with good information, fun and et cetera and you want to help then you can let the ads on on their blogs, websites... and if you use the ads it'll be even more revenue to them.

The main thing is that you should be free to do whatever you want online. Without being spied on. But then again, some people would commit crimes (even more crimes would happen I mean) if there weren't punishment for what is done online. So that's necessary to have some control of course. Otherwise it would be a really dark place internet. We need laws everywhere. Because there are people that just don't know how to live a life that is good. They have this need to do something bad, that's what it seems to happen, like that Dexter's Dark Passenger (for analogy haha) (and should be tackled of course). But the control should only reside on log based systems for the general public (unless under rightful investigation), because IF necessary, then the data would be accessed.

That's a really huge conversation, that take a lot of time and would probably go on. We have ethics to deal with. We have a lot to deal with. We need law enforcement. But we also need respect. So that is some times a thin line that is crossed. And it seems in a lot of situations that the line is purposefully crossed... even if not necessary...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Forum Support Area for Unregistered Users & Account Problems

Account Register With Tor

Hello, I would be interested in creating an account on this forum. However I have run into trouble in the process, I seem to not have permission to access the registration page. It seems that this forum has blocked registration from Tor. I am wondering if there is any way I could obtain an account... (0 Replies)
Discussion started by: Unregistered
0 Replies

2. Cybersecurity

Problem with Privoxy and Tor

Greetings, I use Debian Wheezy as an OS and I have already downloaded the Tor Browser-Bundle, which works fine. As soon as a start privoxy and set the proxy to: 127.0.0.1:8118 (socks4) in the tor browser (edit-->pref-->advanced-->settings--->http-proxy) I always get a connection refused. I... (1 Reply)
Discussion started by: Dr. Nick
1 Replies

3. UNIX for Dummies Questions & Answers

TOR environment variable

My profile sets the TOR variable to $(whence vi). What is TOR used for? I appreciate any help I can get. (3 Replies)
Discussion started by: Wittich
3 Replies
Login or Register to Ask a Question