Question: Is Tails a More Secure Way to Use TOR?

Поділитися
Вставка
  • Опубліковано 28 гру 2014
  • I watched your show about TOR and enjoyed it. What do you think about using tails software on a thumbdrive (that ends up using TOR network)
    I realize it will still have same TOR issues you mentioned, but it uses the thumbdrive and sounds like it is a step that keeps things off your computer.
    -Doug S.
    To Ask Questions Email: Question@EliTheComputerGuy.com
    Patreon Campaign for a Geekier world: / elithecomputerguy
    Signup for our email list at: www.elithecomputerguy.com/emai...
    (#Microstopped... We will never forget)
    For Classes, Class Notes and Blog Posts:
    www.EliTheComputerGuy.com
    Visit the Main UA-cam Channel at:
    / elithecomputerguy
    Follow us on Twitter at:
    / elicomputerguy
  • Наука та технологія

КОМЕНТАРІ • 475

  • @kardashevr
    @kardashevr 7 років тому +81

    The plot of the video: "I don't believe it, I just don't believe it you guys"

  • @runnman843
    @runnman843 8 років тому +14

    7:11 - Tails is better then simple having Tor installed
    Question answered
    And while Tails and Tor have their vulnerabilities, like the safe in your basement can be cracked if someone really really wanted to, this is by far the safest way to surf the web

  • @MrMike321444
    @MrMike321444 8 років тому +166

    Got to say, I feel your bias towards tor is damaging your ability to answer this question neutrally. No offence intended.

    • @EmoFreak101010
      @EmoFreak101010 7 років тому +19

      Exactly right.

    • @brettgozdeck508
      @brettgozdeck508 4 роки тому +10

      i couldn't disagree more... i think the point he makes is absolutely spot on. if anything, Eli's obvious bias AGAINST TOR, damages HIS ability to answer the question. the question is "is tails a more secure way to use tor?"
      Eli's response, is essentially "who cares? sure, tails has some major perks and blocks two of the most common ways to compromise TOR, buuuuuut i don't believe that the Tails people are good enough to configure it so that none of this data can be tracked. (opinion, substantiated by jack shit).
      so, i think the whole TOR thing is just stupid. there's no such thing as privacy on the internet, deal with it"
      instead of answering the question, he takes the time to shit on TOR once again. and yet, even a simple analysis of the scattered reasoning he provides - will provide you with a rather obvious answer to the question asked:
      is tails a more secure way to use tor?
      "YES"
      thanks eli - that's all you had to say

    • @Wilson-te6zj
      @Wilson-te6zj 2 роки тому

      All offense intended

  • @Spudst3r
    @Spudst3r 9 років тому +85

    Tails and Tor is orders of magnitude better than normal internet.
    Security is all about your adversary. Most people's real threats are not the NSA.

    • @davie8409
      @davie8409 8 років тому +1

      +Spuds7er praise the looohhd!!!

    • @NYorkin
      @NYorkin 8 років тому +3

      +Spuds7er So if you want to take the huge gamble in the midst of the illusion of
      anonymity to view child pornographic content in any form, you are truly
      not fully aware of the severity of the chances of getting caught with
      your name and identity, maybe not today, and maybe not tomorrow. But you
      can never feel safe in the slightest. As this guy Eli the Computer guy
      says repeatedly in his videos where wannabe-pedophiles or curious first
      time pedophiles flock to these kinds of video's to learn about the
      various risks involved. Please , do not be so naive as to believe, that
      law enforcement are not monitoring these sites including youtube.

    • @Spudst3r
      @Spudst3r 8 років тому

      Fu cK Child porn is definitely one the highest stakes activity somebody could conduct on the internet today. Your adversary will not be the NSA, but I agree it's still a powerful one.

    • @padkirsch
      @padkirsch 3 роки тому +1

      Nice fly! On your profile pic.. lol you got me 6yrs later! 😂

  • @gerardshort531
    @gerardshort531 8 років тому +318

    As of this posting date the NSA has ranked the use of Tails as an obstruction to monitoring by them and a security risk. That should answers everyone's questions about Tails security. As for this clown, ask who pays him.

    • @ibenzawla
      @ibenzawla 8 років тому +12

      BTW I thumbs yo up because I found your post to be funny. But Eli is a great guy that is out to help people.

    • @DeepSpider
      @DeepSpider 8 років тому +12

      umm, propaganda maybe _< >_>

    • @matiasl.ceballos3346
      @matiasl.ceballos3346 7 років тому +74

      I don´t believe that the NSA would be so naive to publicly state "hey, we are having a hard time with this thing that could be used for illegal stuff, so....don´t use it please". If I were a conspiromaniac, I would say that it is a trick, so newbie criminals use Tails with the false feeling that they are safe. IDK, just an hypothesis I made in 3 minutes.

    • @Landrar
      @Landrar 7 років тому +25

      +Matías L. Ceballos Then you seriously underestimate the state of what's going on.
      Simply searching for tails, tor, and any other number of programs and services will get your ip flagged and placed on a list right now.
      Just visiting certain sites gets your ip placed on that list.
      They haven't been secretive about this at all and you can fact check me in about 30 seconds with a simple google search.

    • @matiasl.ceballos3346
      @matiasl.ceballos3346 7 років тому +2

      Why do you say that I underestimate the situation? I don´t disagree with what you say, It seems logical to me.

  • @geozoide2105
    @geozoide2105 9 років тому +20

    The cool thing is that you don't have to believe in Tor in order for it to work! Online anonymity is independent of your opinion.

    • @NTWired333
      @NTWired333 8 років тому

      ***** Clearly you don't understand how 'the internet' works. or Basic networking for that matter.

    • @fluffylinen
      @fluffylinen 8 років тому

      +Geozoide You are dead wrong. don't you perform your sacrificial rituals for your Tor. Your Tor will not be pleased with those words you foul creature

  • @Afitz200
    @Afitz200 9 років тому +51

    Hmn, but TOR has many more systems setup that you dont take into count. Tor as the browser allows you to make a request for a webpage, this data is encrypted and (you have to set this up) sent to a bridge which proxies your actions on the tor network. Even if the bridge machine gets compromised, all you see is encrypted traffic. Then your connection goes to a entry node, the node gets the ip for the bridge and then the encrypted data, that node breaks up all data and sends it to random machines in the tor network, then that data gets passed along over 10 times to other random machines in the network; for the data to be assembled at the exit node. If someone even did compromise the exit node; the only data you can pull is the last ip that touched the packet in tor and the packet, it gets re assembled and then sent off as a request like normal. Anonymity shouldn't be thought of as invisible, rather making it hell to be found. Its nearly impossible to track the thousands of packets from point A to B; as they make many stops along the way.

    • @Andy-rn8br
      @Andy-rn8br 6 років тому +4

      Probably one of the smartest comments I read

    • @someone-eg3mc
      @someone-eg3mc 5 років тому +1

      @Phoenix Ace well, yes and no: it depends: try to learn how to use kali linux and you should be ok since it shuts down every single type of connection and you have to turn it on by yourself never login as root but as user, for the password use the dictionary tecnique, buy randomly other devices and close them in sure places after turning them off, cover these places with foil so the device can't send nor recieve informations and stay away from windows 10/8.1/8, if they suspect that you are doing something start reccing yourself as a proof if they bring you in court for some dumb reason, keep a low profile. or you can be the perfect guy and just do your things until they stop following you, the first will make them suspect but you will keep your info private, in the other way spying is no longer needed since everyone is free to see what you are doing, or hire a private investigator to follow you and to see who is spying you phisically and when you can start talking to them to put down their fears

    • @someone-eg3mc
      @someone-eg3mc 5 років тому

      @Phoenix Ace and now i will have someone stalking me! yay!

    • @someone-eg3mc
      @someone-eg3mc 5 років тому

      @Phoenix Ace oh and about the phone start thinking about a mi mix 3 since it has a retractable camera

  • @Karyabs
    @Karyabs 7 років тому +90

    I wonder what gets tired first. His mouth or his hands?

  • @presterjohn71
    @presterjohn71 9 років тому +30

    I suspect that for the average snooper Tails & Tor are more than enough to stop you finding out what you are up to. If a government or agency is seriously interested in you as a named individual and a budget for your specific investigation has been okayed then they will find enough out about what you are up to do you some damage. I would suggest that for most people covering most activities it does the job fine. It is ideal for keeping the wife in the dark about what you are up to and the boss at work too.

    • @NYorkin
      @NYorkin 8 років тому

      +presterjohn71 So if you want to take the huge gamble in the midst of the illusion of
      anonymity to view child pornographic content in any form, you are truly
      not fully aware of the severity of the chances of getting caught with
      your name and identity, maybe not today, and maybe not tomorrow. But you
      can never feel safe in the slightest. As this guy Eli the Computer guy
      says repeatedly in his videos where wannabe-pedophiles or curious first
      time pedophiles flock to these kinds of video's to learn about the
      various risks involved. Please , do not be so naive as to believe, that
      law enforcement are not monitoring these sites including youtube.

    • @presterjohn71
      @presterjohn71 8 років тому +12

      +Fu cK To be honest with you if people are looking at pedo stuff I hope they do get caught. I am not talking about super illegal stuff or anything. I am talking about just looking at the wrong stuff for your environment such as looking up sports websites well you meant to be working or dating sites when you are already with someone. That is the level of stuff most people are up to. If for instance you are up to a whistle blowing kind of activity then of course you would need to take more care.

  • @roogalater
    @roogalater 7 років тому +24

    Anyone who looks at the ceiling and closes their eyes when they explain something generally doesn't really know what they're talking about. Tor's an extra layer, like encryption. Anyone who really, really went after you would locate you. But again, it's an extra layer and extra layers are always good.

  • @wfpnknw32
    @wfpnknw32 9 років тому +8

    small note too, it's much more safe if you're gonna use tails to use it on a non rewritable dvd/cd instead of a usb which can be re-written and compromised..

  • @cmill8465
    @cmill8465 4 роки тому +14

    Ya so i want to avoid the NSA/FSB ect so im sitting here on yt and looking for random vids on internet security...
    Come on dude. Most people in the audience just wanna get away from big tech...

  • @KowboyUSA
    @KowboyUSA 8 років тому +28

    My intention to run Tails isn't to do anything nefarious, it's simply to be able to surf as I once did a couple decades ago without having to worry about some jerks messing up my computer just because I looked at a website. Is it, or is it not, going to serve that purpose?

    • @seth817
      @seth817 7 років тому +8

      I could be wrong but I think just using any linux would serve that purpose.

    • @KowboyUSA
      @KowboyUSA 7 років тому +1

      seth817 Since I posted my commented I've discovered that to be *mostly true. Thanks though.

    • @Firestar-rm8df
      @Firestar-rm8df 7 років тому +5

      linux+firefox+ghostery+noscript+ad block plus. this will protect you from 99% of what you are referring to if you use it properly and pair it with a good AV.

    • @bobsieshow
      @bobsieshow 7 років тому +1

      if that is all you want then run linux and stop using spyware AKA WINDOWS

    • @bobsieshow
      @bobsieshow 7 років тому +2

      AND HTTPS EVERYWHERE

  • @TomasForslund
    @TomasForslund 8 років тому +37

    How pessimistic.. Basically he's saying, nothing is working and everything about tails and TOR sucks. He states: "There is NO privacy on the internet, there is no anonymity on the internet".. So just a counter question, if the above quoute is true, how can the hacktivists succeed without beeing caught? If there's a will there is a way.. :-)

    • @dooggood5483
      @dooggood5483 5 років тому +2

      everything can be hacked with enough resources... tor especially... the FBI are known to breach certain weakpoints in tor. While tor claims to be actively finding and patching these, it goes to show no one is really safe. The best bet is make it hard for anyone to track you, and more importantly, dont give ANYONE a reason too. Use linxOS, Tor, Payed vpn (they dont sell data), and dont do anything illegal.

  • @supersonic118boi8
    @supersonic118boi8 5 років тому +48

    I find your lack of faith in tor disturbing

  • @gaydolfhitler6310
    @gaydolfhitler6310 7 років тому +124

    so whats your favourite type of tinfoil?

    • @drwhocake
      @drwhocake 7 років тому +17

      i find lead based foil is the best

    • @gaydolfhitler6310
      @gaydolfhitler6310 7 років тому +3

      its true propaganda when they say lead kills

  • @TheInfiniteSelf
    @TheInfiniteSelf 5 років тому +6

    3:25 TOR does not leak DNS. Tor transports the hostname (inside the Tor protocol) to the exit relay, which resolves it for you. The exit node "handles" everything, including DNS, for the nodes behind it, because of the nature of being a proxy server. It then transmits the DNS information backwards through a Tor circuit. Theoretically you would only need to "resolve" the address of the first node of the circuit. But you don't have to do that, because Tor already has that information in its configuration files. Also typical DNS requests use UDP but TOR only only supports TCP thats why the hostnames are packaged within the TOR protocol and resolved at the exit node.

  • @Heyomattyo
    @Heyomattyo 7 років тому +34

    I've learned, not to learn anything from Eli.

  • @ferrousfurniture6888
    @ferrousfurniture6888 8 років тому +9

    There is no security... only the illusion of security. If I buried a jar of pennies encased in concrete, 100 ft down... nobody would care. But if I burried a billion bucks in a jar encased in concrete 100 ft down... people would be all over my yard with heavy equipment. What really matters is if the thing that's hidden or locked up is worth the work. You would call the pennies secure... but you'd probly still want lights and security cameras over your yard if it was a billion bucks.

    • @rekunta
      @rekunta 5 років тому

      A good analogy.

  • @neuroticneuron
    @neuroticneuron 4 роки тому +1

    I really love your videos. Super informative and you present your opinions in a really down to earth way. I really like that.

  • @mountainghost556
    @mountainghost556 8 років тому +1

    You have a Arm a Tron in the back ground one of the best toys on Earth. Good vids I've learned a lot. People like you that share you're knowledge for free,I respect that a lot thanks.

  • @___xyz___
    @___xyz___ 7 років тому +7

    The internet may not be anonymously usable functionally. But practically it very much works. If you send several chunks of well encrypted data via VPN to someone on the other side of the globe, no-one will even bother to try and intercept your transfer. Not your ISP, not the NSA, on-one. No matter the value of the data. It's a pain in the butt and all you get out of it is unreadable garbage. I've only observed this process and couldn't do it myself, as I would have to split the decryption process to nodes across several servers in order to break the key. Not to mention I would need access to networks internationally. Ok, so what if some organization is able to spy on you; if you are sufficiently secured it would cost them massively to invest resources in you over someone else, and unless you are a genuine thread to other people's safety - in which case go ahead - then that simply wouldn't happen.
    While it is naive to think that TOR will protect you regardless, it is even more naive to think you are more safe (or even _as_ safe) without it. It takes your average Joe 5 minutes to sweep your credit card information and identity at a local Starbucks with something like an evil twin. Think about that.

  • @johnnyblaze9217
    @johnnyblaze9217 4 роки тому +3

    NSA I was just bored during quarantine and just looked it up chill

  • @Danny65673
    @Danny65673 7 років тому +3

    They have already publicly admitted to the fact that they cannot watch what terrorists are doing online because they can't break the encryption. Now, I don't know if that's changed, but it demonstrates that encrypting your traffic and running it through multiple nodes if nothing, makes tracking specific individuals very difficult.
    Granted data being accessed from watched sites may not be able to be hidden, and the fact that there is traffic may not be hidden, but sorting through that traffic and associating specific streams to specific IP's is probably very difficult with encrypted traffic running through multiple different nodes.
    Probably eventually, they'll be able to identify patterns in encrypted traffic to associate that to specific individual IP's without having to watch both entry and exit nodes, after all, that's what Net Neutrality was probably really all about, giving government the power to regulate the internet to a point that they can reliably track everyone's activities, no matter what they do to disguise their traffic.
    Ever wondered if fate was determined to create an American Hitler? All of these things that are happening that Hitler would have used very brutally are just now happening for us right at a time when our government is managing increase exponentially its unnaccountability. If it's not fate, then some corrupt group of people pulling these strings must be unrealistically intelligent to be orchestrating this.

  • @jimmythegent9190
    @jimmythegent9190 8 років тому +41

    61,800 of us made the NSA data list all by clicking on this video.. HIP HIP HOORAY! #BIGBRAHWATCHESALL

    • @WiggumRalph
      @WiggumRalph 7 років тому +3

      you are on it once you visit the tails website, wooooo.

    • @bobsieshow
      @bobsieshow 7 років тому +2

      not if you went to tails website via tor...he he

    • @jimmythegent9190
      @jimmythegent9190 7 років тому +1

      bobsy bobsy yeah you keep thinking that. Its 2016 buddy all is watched. ALL!

    • @Zixtr
      @Zixtr 6 років тому +1

      I watch UA-cam on tor 😂😂

  • @caiosaldanha2371
    @caiosaldanha2371 8 років тому +1

    Man, what do you mean with exit and entrance node when you talk about NSA's techniques for tracking traffic?
    An entrance node is the first router or server your traffic passes by when you make the request? Thereby the exit node is the first router or server it passes by when the answer host responds?
    Thanks.

  • @_______________________4445
    @_______________________4445 6 років тому +1

    would a vpn with tails and tor work if not what combination of security software/measures would work?

  • @HelixsoulX
    @HelixsoulX 7 років тому +6

    I don't actually care about hiding anything online, tor gets through the school firewall just fine, and I don't care who sees my porn as long as my friends and family don't suddenly get into crypto.

  • @bravowhiskey88
    @bravowhiskey88 7 років тому +21

    You take yourself way to seriously

    • @k.ommander
      @k.ommander 3 роки тому

      He does, what a dumbass is this dude.

  • @Louis-tp1kw
    @Louis-tp1kw 8 років тому +1

    Wouldn't DNS leakage be prevented by my VPN? Since my data first route's to my VPN's servers securely and then goes through my ISP (after being encrypted by my VPN). Am I wrong?

  • @zerr007
    @zerr007 6 років тому

    i have a problem installing tor browser ;
    it basically stops in the status of
    'establishing a tor connection'
    what can i do to fix this??

  • @fecklarjenkins2549
    @fecklarjenkins2549 5 років тому

    So 2 questions 1. Would you think tor would be more secure than normal browser safari ie whatever for banking online purchases etc?
    2. If you add a vpn server on top of that does it add much protection or just make for more potential security leaks ?

  • @iyambomini452
    @iyambomini452 8 років тому +1

    Ali, talking about malware what skill or programming language does one have to know in order to build build malware and do you have a forum or blog

  • @Thogrin
    @Thogrin 7 років тому +6

    The only way to stay 100% annonymous doing stuff, is when you manage separate network based on (for example) Raspberry with GSM module (burner) you will connect to with wifi. And hide it in public place, connected to power source. In the same time, to surf the web you need to use another "clean" device, that is used only to this kind of job. Ofc with software of your choice. More crowded area - better. I have no other idea how to stay annonymous. This will work only if you are thinking homo-sapiens tho. The second part will go to jail anyhow :P

    • @piyushpandey7860
      @piyushpandey7860 5 років тому

      Gsm module thing can you explain I didn't got it plz

    • @nihalbhandary162
      @nihalbhandary162 2 роки тому

      @@piyushpandey7860 Basically mobile internet (3G,LTE), that's how your phone gets internet. That is not a good idea tho, because mobile networks are notoriously unrealiable for security and you can get tracked easily.
      Use public wifi with mac spoofed, as the OP said raspberry pi connected to public wifi would serve as good proxy.

  • @fwbarnes2011
    @fwbarnes2011 9 років тому +1

    Eli...What about Selektor? you can be specific of nodes that you enter and exit

  • @arturgogowski8847
    @arturgogowski8847 5 років тому

    Hi,
    It's my first ep.
    Iv've decided stop and ask you.
    What do you think about MINIX? would it be good topic to the next ep?
    I met MINIX in newspaper NEXUS today.
    4 release 2018 , 7 page in polish edition

  • @booleanenator
    @booleanenator 8 років тому +1

    I am glad to see someone in the IT industry that advocates for the little guy. Warning people about the dangers of Tor and VPN software in general. I believe that the best way to get the internet to give us our anonymity, is for people to know what they are doing. There was a time when installing a network was a "big deal", people thought about how a wire to the outside world could be used. Now, for some people, it's an afternoon project, with no thought of the consequence of "clicking next to continue" from the Windows EULA to the Tor disclaimer.

  • @NotTellingYou-
    @NotTellingYou- 4 роки тому

    My WiFi doesn’t work when I am using Tails. I have a Dell Inspiron 14. Any thoughts on why the WiFi won’t connect?

  • @haekalahmad7670
    @haekalahmad7670 Рік тому +1

    That was great. Thank you.

  • @huntervanover1825
    @huntervanover1825 7 років тому +10

    something is better than nothin

  • @patmcm2581
    @patmcm2581 7 років тому +1

    I am a total newbie, but I have a couple of questions. First, I understand that someone with the resources of a nation state could compromise Tor and Tails, but wouldn't it still prevent 99% of potential trackers from seeing what a user is doing? Most parties don't have the resources of a nation state. Second, is there a better alternative?

  • @TheWay7
    @TheWay7 6 років тому +1

    What if you look up and only used trusted nodes?

  • @FlamespeedyAMV
    @FlamespeedyAMV 2 роки тому +1

    Is wireless or ethernet (if works) better for Tails OS ?

  • @johnnybloggs2494
    @johnnybloggs2494 9 років тому +1

    Eli the Computer Guy Could you please share your opinion of Liberte Linux vs TAILS? And what about Whonix that approaches things differently? I'd appreciate it a lot :)

  • @shikhar10001
    @shikhar10001 4 роки тому +1

    He's telling the truth that complete security and anoynimity doesn't exist so instead we should be working on the most effective setup that is closest percentage to satisfy our needs. Always keep evolving.

  • @Super_Cool_Guy
    @Super_Cool_Guy 9 років тому +1

    But eli, what about the .onion sites... They can only be accessed through tor network.... And any sites offering .onion site are viewed through the for browser... So how can your local ISP see what you are up to ?????

  • @lebeardotnet4372
    @lebeardotnet4372 4 роки тому +1

    Tor in itself is a good start people, tails is a lightweight OS you can boot from a USB stick on most machines which comes in handy.

  • @synnbol
    @synnbol 7 років тому +2

    sounds like a decent tool for journalists, when they don't want to compromise a source

  • @jerrymander8020
    @jerrymander8020 5 років тому

    Interesting discussion,,,, what do you think of Qubes ?

  • @ghettoreactions3945
    @ghettoreactions3945 7 років тому +1

    I just watched a video of the actor who has the company that helps stop sex trafficking n he said there was an extremely young girl going viral around the horrible side of the dark web n the FBI contacted his company to help them because they simply couldn't track anything (which is terrible) but my point is if you take the right precautions and are not doing anything terrible n just plain wrong you should be okay.
    There are ppl who just use the dark web for Hacked movie music etc accounts.

  • @itsadambright
    @itsadambright 4 роки тому +6

    so basically the NSA spends a lot on its youtube employees

  • @MintonBarry
    @MintonBarry 6 років тому +1

    its not running Proprietary software is software that is owned by an individual or a company (usually the one that developed it). There are almost always major restrictions on its use, and its source code is almost always kept secret. ... It is necessary to have the source code in order to be able to modify or improve a program.

  • @Esiggies
    @Esiggies 9 років тому +8

    The easiest way to be private IF you are doing illegal activities is to throw your computer, iphone and any other electronics away.

    • @Esiggies
      @Esiggies 9 років тому +2

      ***** IF you are doing illegal activities

    • @oaksif0
      @oaksif0 9 років тому

      Peter Linch Extreme measures, and throwing money away.

    • @Esiggies
      @Esiggies 9 років тому +2

      Chuck Spires Using a VPN does not make it secure. (https: //diafygi.github.io/webrtc-ips/) copy and paste into browser when using a VPN and if you see your ip then you are NOT secure at all.

    • @Esiggies
      @Esiggies 9 років тому

      Omar Kazi Secure measures, without doing jail time, money will come and go all your life, freedom doesn't and most illegal activities is for greed not need, so how greedy or silly are you?

    • @Esiggies
      @Esiggies 8 років тому

      +Dudley E No problem

  • @rawpower2672
    @rawpower2672 6 років тому +1

    What would you say is the most secure and Anonymous way to work in the internet better than tails?

  • @rawpower2672
    @rawpower2672 6 років тому +1

    Hello an amazing video are there any operating systems for smartphones that would be equivalent to tails?

    • @buddysdz
      @buddysdz 5 років тому

      Yep! This one : i.ytimg.comvi/iQRp4f9O1HQ/hqdefault.jpg :)

  • @SnapcrackerzTeam
    @SnapcrackerzTeam 7 років тому +2

    What you fail to realize is the fact that if you have the mac addy spoofed and connecting wirelessly through Point A server to begin with then nothing will be traced back to you because your in and gone simple as that. In this instance they would go after the hotspot provider. Bottom line never try anything illegal through your own network service provider period rule of thumb!

  • @jaynickz1340
    @jaynickz1340 8 років тому +1

    sir i want to ask something and its an honor to ask this if there's no such thing as unknown on the internet how come there are still hackers or elite programmers that do some things that might be wrong or for some like "you know what i mean" is still undetected or still not having legal charges on what offence they doing??
    another one sir if its ok to you as an IT student i want to know more and learn basically we both know that there an what we called front and back end of any programs or applications "right" sir if its ok to you would you explain or any idea on the back end of the internet works. if this things i ask is a sensitive or private stuff plz let me know thank you sir i expect your reply sir

  • @lodewijklangeweg742
    @lodewijklangeweg742 6 років тому +1

    For Windows 7, 8.1, 10: Use Sandboxie and let it remove all accumulated data from its virtual space (sandbox) after closing Tor > turn Airplane Mode on right after closing Tor > have CCleaner remove any eventual Windows logging etc. info. > (turn Airplane Mode off if you want to go online again of course.)
    Block telemetry sending info to Microsoft on what you're doing. One such programs that stop this leaking is Spybot Anti-Beacon for Windows. I don't recommend criminal behavior, but don't consider whistle blowing to WikiLeaks or ExposeFacts that.

  • @slipknotfan90909
    @slipknotfan90909 9 років тому

    From what I understand your hardware information cannot be changed and you can be identified with that info. Like your wireless card. Is this correct?

  • @tankeskud9101
    @tankeskud9101 8 років тому +2

    Strong encryption can give a lot of anonymity. However this won't help a lot if you are the only person doing it. But let's imagine that everyone on the internet started to implement encryption. If this became a reality the NSA might have a veary hard time decrypting every encrypted message on the internet (especially if every encryption take 1 - 1000 years to break).

  • @justanothertuber5497
    @justanothertuber5497 9 років тому +1

    Regarding the comment below, id like to hear your opinion on whonix as well. Ive been watching your vids and soaking as much knowledge as I can from ya. Id like to know what youd personally recommend in order to make it the most anonymous as possible, although I understand your point that nothing is truly anonymous or private considering the way networks are designed, but what would your recommendation be in order to make it the absolute hardest to be found and more secure? Cheers.

    • @ingebrecht
      @ingebrecht 9 років тому

      nona plox The guy in the video thinks that as a system the basics of the way the internet works makes anonymity and total privacy impossible. I think it is very likely he is correct. Code whispering via Smoke signal would work until the local fire department showed up to put out your back yard barbeque. Best bet is to be a not very interesting moving target and keep track to see if anyone is following your trail. Of course that means continual movement which is something that can be tracked and might make you interesting.

  • @meltorres21161
    @meltorres21161 5 років тому +2

    You know I own a cyber cafe in Mexico and even over there an ID is required to use my cyber cafe.

  • @angelicreinforcement3373
    @angelicreinforcement3373 8 років тому +2

    What's scary about this is that when I hear you talk about the work the NSA does, it sounds amazing. Like awesome puzzles. Meaning I'd probably enjoy working for them. Yikes.

  • @antigonesouthwind5570
    @antigonesouthwind5570 8 років тому +1

    Does Tails get rid of everything on your hard drive like Linux?

  • @AvaDidNothinWrong
    @AvaDidNothinWrong 8 років тому +1

    he says the same thing in a lot of his videos but i never saw him actually give an explanation for the phrase, "functionally TOR just doesn't make sense." He's never really elaborated fully as far as I know, but I have seen him say it over and over. I would like to hear an detailed explanation as to why he thinks that. Is it simply because they can control many nodes at once?

  • @powderriverfarrier
    @powderriverfarrier 7 років тому +1

    If you haven't done so already take a look at the ANT catalogue.

  • @therealb888
    @therealb888 9 років тому

    DNS leak? How do I prevent it on win 8.1 & Ubuntu?

  • @glennt4118
    @glennt4118 8 років тому

    But you can get different IP addresses and from a supposed secret VPN would this help..

  • @SVETOGOR1
    @SVETOGOR1 6 років тому +43

    I noticed this guy don't like Tor, Qubes, Tails, Whonix etc. you know who also don't like these programs? YOUR GOVERNMENT! Now think - I gave you the hint!

    • @anteconfig5391
      @anteconfig5391 5 років тому +1

      lol. I was thinking the same thing.

    • @veintsh81
      @veintsh81 5 років тому +1

      and you know who wants to wash our brains and use us , make us work so we pay taxes etc so they steal our money and they dont want to reveal the truth? GOVERNMENT!

    • @stargazerspark4499
      @stargazerspark4499 5 років тому

      lol he's just pointing out that backdoors can be (and in many cases already are) built into anything -- including privacy and encryption tools. and if you're a govt intel agency like NSA what better way to monitor darknet traffic than to offer those potentially compromised tools to the public yourself?

  • @secureninux4576
    @secureninux4576 8 років тому +1

    Tor is working exactly the way it claims to, so unless you make some error in you configuration (bad dns config in your proxychain.conf) it provides the anonimity level declared. Of course, you can break privacy if you attack a machine going on Tor, but this has little to do with the Tor network itself. If somebody is sending you a malware allowing privacy leakage than it's up to you to protect your machine, don't blame Tor for this because it could happen each time you are on the Internet too.

  • @FuckKraZeD
    @FuckKraZeD 9 років тому

    Thank you! I knew i wasnt crazy:)

  • @JD-sv1ot
    @JD-sv1ot 9 років тому +3

    It's possible, just diffuclt, you need an L2TP vpn on top of TOR, or if you want to be fully under the radar, you can configuire an L2TP vpn on your router and the device that you're using, and you can spoof everything else.

    • @NTWired333
      @NTWired333 8 років тому

      precisely.

    • @veritas2262
      @veritas2262 8 років тому

      +James Daugherty Why L2TP? Not very secure..

  • @falafeldurum2095
    @falafeldurum2095 5 років тому +1

    The first thing mentioned is done using cookies in the most simple case. Or with malware, that's true. But using Tails you don't ever disconnect from TOR..
    Nothing is secure, right, but even if you can't defend yourself from NSA you can at least make it very hard for non-NSA-grade companies that wanna track you

  • @happyjohnrn
    @happyjohnrn 7 років тому +1

    You know, I agree with you. There is no way to be completely anonymous on the net. However, at least the Bastards will have to work for my information, rather then me just offering it up. Like take it, its free, Make them work for it!

  • @TheGamingIndian
    @TheGamingIndian 7 років тому

    Hey can someone tell me if this is the person that GradeAUnderA was talking about int he react video bashing video?

  • @marqueswilsonn
    @marqueswilsonn 4 роки тому +1

    Basically he’s saying tor doesn’t work if the NSA is watching enough doors to TORs building. “Air quotes”

  • @therealprince777
    @therealprince777 8 років тому +1

    Thanks for the info exactly what I thought there is no privacy regardless of what you use.

  • @bobsieshow
    @bobsieshow 7 років тому +2

    its not just about tracking data...the data is also encrypted and trust me encryption is very very hard to crack. in this day and age...maybe in the future but not yet.

  • @EdisonChar
    @EdisonChar 8 років тому +2

    So what's your alternative to connect to deep web?

  • @fugoff8588
    @fugoff8588 5 років тому +1

    So there's a CCTV camera pointing into two crowds. One crowd's full of people wearing masks, one isn't. The CCTV operator can tell someone to go into the crowd, but which crowd would you rather be in, the one with or without masks? You'd have to be VERY important for them to invest all the effort required to find a masked man in a crowd of masked men....

  • @buddysdz
    @buddysdz 5 років тому +1

    *Off-topic* : The question wasn't « _Is Tails or TOR 100% secure?_ » it was « _Is using Tails more secure that using the TOR browser bundle?_ ».

  • @devbhattarai6260
    @devbhattarai6260 8 років тому

    then what is the better way of being anonomous

  • @br3wskee
    @br3wskee 4 роки тому

    How can I run socks5 on Tails OS?

  • @web2yt488
    @web2yt488 8 років тому +1

    If entrance and exit nodes are compromised then the correlation exploit is accurate. It is highly plausible that government agencies operate the majority of tor nodes. It is benefit for them to host tor to ensure criminals expose thenselves. It is a good video.

  • @flowing96
    @flowing96 7 років тому

    so when tails is better but not good ,what is good?

  • @victorr-kn4so
    @victorr-kn4so 8 років тому +1

    Eli, do you anything about the Qubes OS? I've heard that this is supposed to be a very secure OS with all kinds of bells and whistles like VMs included within the OS. Also, do you know if I can install Qubes OS as a secondary OS on a Windows 10 PC? Thanks.

  • @oaksif0
    @oaksif0 9 років тому +4

    Hi Eli, my school laptop has spyware, and I don't want it to track me while im using Tails. Because they tracked me on system restore, and my wifi was off. It annoys me that they are always watching me over the network, and they start assuming things that are not true, I just want a laptop with privacy, and I'm not using Tails for illegal stuff, and my system administrator hacked into my online accounts.

    • @Cleric775
      @Cleric775 9 років тому

      Omar Kazi Get off his network.

    • @oaksif0
      @oaksif0 9 років тому +1

      Cleric775 Yeah I can't wait to go home from school into my more secure network. But still I want to access stuff without being tracked.

    • @rodney8018
      @rodney8018 9 років тому +3

      Omar Kazi Boot into safe mode and download Malwarebytes or Spybot to remove it.

    • @thetempesteso
      @thetempesteso 8 років тому +3

      Omar Kazi I truly hate this shit. Alright bro, here is the deal. If you preformed a legit format of your machine with a brand new version of Windows you are fine, UNLESS the shitty sysadmin rooted the firmware on the laptop. In that case reflash everything and you will be fine. If you just did a system format by hitting the recovery option in the BIOS/POST (or a dedicated button on the laptop) it won't work as that "clean" OS has probably been modified to have the spyware already installed. Installing antivirus will most likely fail as it is probably a legit copy of software and it was placed on commercial AV whitelists. An application firewall may work if you create custom rules but why bother? Just reinstall with a separate ISO file.

  • @g.spacepants319
    @g.spacepants319 7 років тому +1

    Good video. I was just reading about Tails so your video was the first I found discussing it. Really though, you shouldn't be on the Tor network for anything anyways. I don't know why I'm interested in it anymore to be quite honest. Thanks for reinforcing my doubts about Tor.

  • @madissiimkull
    @madissiimkull 8 років тому +1

    is it good for journalists?

  • @john-jv5lm
    @john-jv5lm 3 роки тому

    HI, WHAT THEN IS THE BEST WAY TO ANONIMITY SEEING THAT YOU KINDA LOOK DOWN A BIT ON TOR , AND WHAT THEN DO NATION STATE PLAYERS OR TOP SECURITY PROFESSIONALS USE TO HIDE THEMSELVES.

  • @areyoureal4846
    @areyoureal4846 5 років тому

    He’s just been honest he don’t want you to use it for you to do bad things .. but he sound like he don’t know about network but he knows a lot I have been watching him for long time ... but for those who don’t know much about this will believe what he saying and that’s he’s point

  • @JOBAJUBA
    @JOBAJUBA 7 років тому

    I wonder which agency he works for?

  • @chaostheory8942
    @chaostheory8942 8 років тому +12

    According to this guy nothing works what a pesimist lmao

    • @AURORAFIELDS
      @AURORAFIELDS 8 років тому +1

      +Ha Ra Pessimism often goes hand in hand with realism =P

    • @chaostheory8942
      @chaostheory8942 8 років тому +3

      And that leads to a boring 9 to 5 home/work type of miserable life.

    • @chaostheory8942
      @chaostheory8942 8 років тому

      TheRetroSnake Name a genius that isn't crazy

    • @AURORAFIELDS
      @AURORAFIELDS 8 років тому

      Ha Ra Ain't that the sorry truth

  • @mrjohndoe6981
    @mrjohndoe6981 4 роки тому +1

    I believe that tor in not anonymous...but it does make everything more difficult

  • @LarsBreuning
    @LarsBreuning 3 роки тому

    Acess TOR though a VPN you trust (yes, trust is a major leap of faith)

  • @robertpaulson6555
    @robertpaulson6555 7 років тому +1

    so I get if your up against a world class super hacker or a government agency, Eli tells (and Im sure he is totally correct) that you are not effectively anonymous. So my question is this, if going to some cafe isnt necessary, is it better to boot tails from usb and give away your real ip address, or use tails in a virtual machine with a vpn behind it and just monitor for any security breaches (malware, key stroke loggers) etc.?

  • @ivaylogeorgiev5558
    @ivaylogeorgiev5558 8 років тому +1

    Unfortunately what this guy says about the DNS servers, damn he's fucking right, but thats why if I use tails I do it from a SD card which have the physical switch to disable the data writing input on the SD card containing tails (only reading output is available) and using only an external wifi adapter for Tails to hide my real MAC just in case if Tails fail to spoof(scramble) it... is very usable. The hard drive containing my regular OS have few layers of encryption and don't forget for the BIOS malwares... make sure your bios is well secured, and maybe the most important thing is never to use the internet provided by your ISP (if you think your computer is well secured, think twice because your router is not) :)

  • @MarkMcelligottPeaches
    @MarkMcelligottPeaches 3 роки тому +1

    Relay IP Payload traffic is the way to be anonomus. Across 2 relays requires so much CPU power to x-ref for ident on a logical IP transaction is just too much for oversight to manage. Having more than 2, which TOR does, really does shield against IP traffic source locations. Just a matter of math and CPU power management limits.

  • @alplantit
    @alplantit Рік тому +1

    witch is insightful. But u broke it down in simple man's terms. I can't wait to ss around with what you taught and see the different

  • @flashpadxxx
    @flashpadxxx 6 років тому

    How about using Smoke signs??