you forgot to mention that there are a lot of malicious exit nodes in tor these days so a vpn adds more security to anyone deanonymising you through tor, mainly done with js or other exploits in tor itself, or the websites you visit tl;dr; vpn -> tor = security tor -> vpn = privacy
@Aman Parmar yes but it is not as much as you would think. My city has fiber almost everywhere. The lowest I have been is in the major metropolitan area are speeds around 617 Mbps DL and 604 Mbps UL. I also focus on places that I know have fiber. If not I cut it down to VPN and 4 or 2 proxy servers.
If some one can sniff ur tor exit node they can know ur real IP as the exit node is not encrypted. Tor is not fully secured it can be compromised but it is hard to take down. And for the proof I think they count or maybe watch the time of tor exit node and entry node, coz before entering tor and after exiting tor the data is not encrypted. I m may be wrong but I think mullvad and proton are trusted enough , so I think we can run tor with a VPN coz if it's compromised atleast the data is under the safe tunnel and also the real IP is hidden.
So basically for a standard usage, ToR is sufficient ? But what if you want the highest privacy settings ? Would you use ToR only or something else ? (I’m a noob in this field 😅)
My question is what business is of it for three other severs to rout your request? who pays to run those three servers nothings free in this world not even iniminity. so is Tor really safe. I just don't think it is, but probably best you gonna get digitally?
Hey random question do you play games and if yes how do I buff my connection in games and what's the computer science behind it like the data packets and stuff
I don't think this guy has a black hat. I think he is only a white hat hacker and won't do any unlawful activity so no he's not going to "hack" someone's Instagram account.
Edit: but if you're curious to see if your Instagram account can get hacked if you use the same password for everything there is a possibility. Someone could put a keylogger on your computer and just log into your account. There is a lot of ways to get in anything is really possible.
Bridges can help hiding tor use from your service provider...some I think have a workaround but it's generally the standard way of spoofing your service provider or getting around ISP blocks
Your channel is so good, you cut the bs and provide direct info as it is needed.
10 likesReplies (2)
Appreciate it! Can't wait to make some made for YT videos that are longer but still packed.
7 likes@Crypto The Llama looking forward to it 😀
1 likeCrypto out ✌🏻❤ love your content
29 likesReplies (1)
Cheers Brother! appreciate it!
4 likesyou forgot to mention that there are a lot of malicious exit nodes in tor these days so a vpn adds more security to anyone deanonymising you through tor, mainly done with js or other exploits in tor itself, or the websites you visit
0 likestl;dr;
vpn -> tor = security
tor -> vpn = privacy
My concerns is what to use first. I normally go VPN, Tor, then through an additional 4 randomly chosen proxy servers. What's you thoughts?
1 likeReplies (2)
Doesn’t your internet speed die off with that many layers ?
0 likes@Aman Parmar yes but it is not as much as you would think. My city has fiber almost everywhere. The lowest I have been is in the major metropolitan area are speeds around 617 Mbps DL and 604 Mbps UL. I also focus on places that I know have fiber. If not I cut it down to VPN and 4 or 2 proxy servers.
0 likesThe only reason to use a VPN before connecting to Tor is to hide from your ISP. If your VPN keeps no logs then no one will know you're using Tor.
0 likesLove your content, short and straight to the point.
2 likesReplies (1)
9 oo
0 likesIf some one can sniff ur tor exit node they can know ur real IP as the exit node is not encrypted. Tor is not fully secured it can be compromised but it is hard to take down. And for the proof I think they count or maybe watch the time of tor exit node and entry node, coz before entering tor and after exiting tor the data is not encrypted. I m may be wrong but I think mullvad and proton are trusted enough , so I think we can run tor with a VPN coz if it's compromised atleast the data is under the safe tunnel and also the real IP is hidden.
1 likeSo basically for a standard usage, ToR is sufficient ?
1 likeBut what if you want the highest privacy settings ? Would you use ToR only or something else ?
(I’m a noob in this field 😅)
Replies (5)
For highest privacy:
4 likes1) Buy a new laptop.
2) Use Tor to search for your weed.
3) Throw the laptop off a cliff.
Satoshi Nakamoto Thank you 🙏I’ll check it out
0 likes@Kirikou Wépeutihmécémonami let me know
0 likes@Satoshi Nakamoto bitcoin😂🔥
0 likes@Circuit Lover 🤗
1 likeThanks for the info
5 likesPlease can suggest cheap wifi adapter's for hacking(Monitor Mode and Packet Injection)
0 likesIf tor servers encrypting us, it must know how to decrypt us right?
1 likeReplies (1)
That’s why there are 3 layers.
3 likesNice one bro
0 likesdo you recommend whonix or tails? and what are the differences
0 likesMy question is what business is of it for three other severs to rout your request? who pays to run those three servers nothings free in this world not even iniminity. so is Tor really safe. I just don't think it is, but probably best you gonna get digitally?
0 likesHey random question do you play games and if yes how do I buff my connection in games and what's the computer science behind it like the data packets and stuff
0 likesReplies (2)
One thing you can do is play on the 2.4GHz band, since it's more stable than 5GHz, which leads to less packet loss (lag).
0 likes@Filip yup already doing that i mean most not all people usually have 2.4ghz routers anyways 🤨
0 likesBro are you an ethical hacker
0 likesJust use a burner sim thats about it
0 likeswhat if you use Lokinet and then tor?
0 likesAnd then ther was a blog suggesting to use a proxy and a tor
0 likesSo Tor wont show my isp what I'm doing correct?
0 likescould have said :"no"
4 likesbut thx😊
Replies (3)
ikr
0 likesIt's important to hear why as well. Otherwise he could just be talking out of his ass.
3 likesMany people, including myself, are interested in the reason behind things and not just a plain Yes or No.
2 likesI just wanna connect to my naghbrs wifi😅
0 likesI want to buy cloned cards from dark web ?
0 likesAnything for android s?
0 likesHe did not say Crypto out. OCD triggered
0 likesNeat
0 likesUr voice like call of duty character cpt.price and ur content
2 likesI'm just curious to know R u able to hack someone's Instagram Account ?
0 likesPlease Reply!!!
Replies (1)
I don't think this guy has a black hat.
4 likesI think he is only a white hat hacker and won't do any unlawful activity so no he's not going to "hack" someone's Instagram account.
Edit: but if you're curious to see if your Instagram account can get hacked if you use the same password for everything there is a possibility. Someone could put a keylogger on your computer and just log into your account. There is a lot of ways to get in anything is really possible.
Bro give me ur IG
1 likeCan your isp see what you do on tor?
0 likesReplies (2)
They cannot it's encrypted but your ISP likely will know you are using Tor
2 likesBridges can help hiding tor use from your service provider...some I think have a workaround but it's generally the standard way of spoofing your service provider or getting around ISP blocks
0 likescrypto the rapper
0 likesHi
0 likes