Re: Tor v.s. My Proxy Daisy Chain

Discussion in 'Computer Security' started by Joseph Ashwood, Aug 25, 2010.

  1. "RMCG" <> wrote in message news:-privat.org...
    > I grow weed illegally and am an IT specialist who has this asshole
    > called wilbur calling me out for bullshit. He says Tor is the nazz and
    > I KNOW Tor sucks and I can configure a daisy chain of proxies that is
    > better.
    >
    > He sent me to these newsgroups to talk to "professionals" rotflmao
    > about that but I'll give you a day in my court.--



    Since you have a real opinion, I'll give you a real answer.

    With a fixed path such as a daisy chain of proxies, it is a relatively
    simple matter to break each one in turn, tracing everything back to you.
    From a law enforcement standpoint, its useless.

    With Tor, because the path itself is random it is necesssary to break all
    systems in the entire network. Since there are many more users of Tor it is
    exceptionally more difficult.

    This is the foundation of onion routing and why you are completely wrong.
    Joe
     
    Joseph Ashwood, Aug 25, 2010
    #1
    1. Advertising

  2. On Sun, 29 Aug 2010 15:21:03 -0400, RMCG wrote:

    > On Wed, 25 Aug 2010 04:08:37 -0700, Joseph Ashwood wrote:
    >
    >> "RMCG" <> wrote in message news:-privat.org...
    >>> I grow weed illegally and am an IT specialist who has this asshole
    >>> called wilbur calling me out for bullshit. He says Tor is the nazz and
    >>> I KNOW Tor sucks and I can configure a daisy chain of proxies that is
    >>> better.
    >>>
    >>> He sent me to these newsgroups to talk to "professionals" rotflmao
    >>> about that but I'll give you a day in my court.--

    >>
    >> Since you have a real opinion, I'll give you a real answer.
    >>
    >> With a fixed path such as a daisy chain of proxies, it is a relatively
    >> simple matter to break each one in turn, tracing everything back to you.
    >> From a law enforcement standpoint, its useless.
    >>
    >> With Tor, because the path itself is random it is necesssary to break all
    >> systems in the entire network. Since there are many more users of Tor it is
    >> exceptionally more difficult.
    >>
    >> This is the foundation of onion routing and why you are completely wrong.
    >> Joe

    >
    > I've done quite a bit of research over the years looking for the best
    > way to keep my internet traffic secure and anonymous. I've tried and
    > used many services, everything from proxies to ssh tunnels and I've
    > been using an OpenVPN service from Perfect-Privacy for a while now and
    > have been extremely pleased with it so far. FYI, I used to work in the
    > networking field in the past (altho it changes and advances so damn
    > fast) so this isn't a clueless newbs rant
    >
    > These guys are the Nuts!! (if you play poker you know what I mean)
    >
    > You can do an openvpn connection to one of their several servers
    > around the world, then add a ssh tunnel to another servers squid
    > proxy, and chain that to another servers socks 5 proxy. It can get
    > pretty slow the more you chain it, but it's about as secure as you can
    > get. Also, all their servers (according to them at least and I have
    > been given no reason to doubt them) have highly encrypted hard drives
    > on hardened Linux Servers and do not use any logging features at all.


    They don't log?

    lol

    P-P just got their admins busted in Germany. When you go connecting to
    servers all over creation, expect to run into some rather irrational
    LEOs and damning judicial systems..

    Btw, OpenVPN only supports 2Kbit PKE anf P-P claims they use 4K PKE
    with OpenVPN.

    Translation: They lie.

    Tor.

    Get over it.
    --
    Passwords, people, they are not just for game shows. If you refuse to
    make the effort to remember a few long, diverse passwords, then don't
    scream at me when your FICO is 496 and your bank accounts are zeroed
    out.
     
    Ari Silverstein, Aug 29, 2010
    #2
    1. Advertising

  3. On 8/29/2010 3:53 PM, Ari Silverstein wrote:
    > On Sun, 29 Aug 2010 15:21:03 -0400, RMCG wrote:
    >
    >> On Wed, 25 Aug 2010 04:08:37 -0700, Joseph Ashwood wrote:
    >>
    >>> "RMCG" <> wrote in message news:-privat.org...
    >>>> I grow weed illegally and am an IT specialist who has this asshole
    >>>> called wilbur calling me out for bullshit. He says Tor is the nazz and
    >>>> I KNOW Tor sucks and I can configure a daisy chain of proxies that is
    >>>> better.
    >>>>
    >>>> He sent me to these newsgroups to talk to "professionals" rotflmao
    >>>> about that but I'll give you a day in my court.--
    >>> Since you have a real opinion, I'll give you a real answer.
    >>>
    >>> With a fixed path such as a daisy chain of proxies, it is a relatively
    >>> simple matter to break each one in turn, tracing everything back to you.
    >>> From a law enforcement standpoint, its useless.
    >>>
    >>> With Tor, because the path itself is random it is necesssary to break all
    >>> systems in the entire network. Since there are many more users of Tor it is
    >>> exceptionally more difficult.
    >>>
    >>> This is the foundation of onion routing and why you are completely wrong.
    >>> Joe

    >> I've done quite a bit of research over the years looking for the best
    >> way to keep my internet traffic secure and anonymous. I've tried and
    >> used many services, everything from proxies to ssh tunnels and I've
    >> been using an OpenVPN service from Perfect-Privacy for a while now and
    >> have been extremely pleased with it so far. FYI, I used to work in the
    >> networking field in the past (altho it changes and advances so damn
    >> fast) so this isn't a clueless newbs rant
    >>
    >> These guys are the Nuts!! (if you play poker you know what I mean)
    >>
    >> You can do an openvpn connection to one of their several servers
    >> around the world, then add a ssh tunnel to another servers squid
    >> proxy, and chain that to another servers socks 5 proxy. It can get
    >> pretty slow the more you chain it, but it's about as secure as you can
    >> get. Also, all their servers (according to them at least and I have
    >> been given no reason to doubt them) have highly encrypted hard drives
    >> on hardened Linux Servers and do not use any logging features at all.

    > They don't log?
    >
    > lol
    >
    > P-P just got their admins busted in Germany. When you go connecting to
    > servers all over creation, expect to run into some rather irrational
    > LEOs and damning judicial systems..
    >
    > Btw, OpenVPN only supports 2Kbit PKE anf P-P claims they use 4K PKE
    > with OpenVPN.
    >
    > Translation: They lie.
    >
    > Tor.
    >
    > Get over it.


    Talking to yourself again, Frank? (a.k.a. Frank J. Camper, King of the
    Sockpuppets)

    No one else will talk to him, so he has to talk to himself using made up
    characters with made up names.

    Pitiful. Pathetic.
     
    Buck Mulligan, Aug 29, 2010
    #3
  4. Joseph Ashwood

    Anonymous Guest

    In article <-privat.org>
    RMCG <> wrote:
    >


    >
    > I've done quite a bit of research over the years looking for the best
    > way to keep my internet traffic secure and anonymous. I've tried and
    > used many services, everything from proxies to ssh tunnels and I've
    > been using an OpenVPN service from Perfect-Privacy for a while now and
    > have been extremely pleased with it so far. FYI, I used to work in the
    > networking field in the past (altho it changes and advances so damn
    > fast) so this isn't a clueless newbs rant
    >
    > These guys are the Nuts!! (if you play poker you know what I mean)
    >
    > You can do an openvpn connection to one of their several servers
    > around the world, then add a ssh tunnel to another servers squid
    > proxy, and chain that to another servers socks 5 proxy. It can get
    > pretty slow the more you chain it, but it's about as secure as you can
    > get. Also, all their servers (according to them at least and I have
    > been given no reason to doubt them) have highly encrypted hard drives
    > on hardened Linux Servers and do not use any logging features at all.


    It always boils down to the "no logging" thing.
    Perfect-Privacy has the usual Terms and Conditions as found on
    http://perfect-privacy.com/terms.html. If there truly is no logging, by
    what means would Perfect-Privacy enforce their terms?
     
    Anonymous, Aug 29, 2010
    #4
  5. On Sun, 29 Aug 2010 20:46:48 +0000, Anonymous wrote:

    > In article <-privat.org>
    > RMCG <> wrote:
    >>

    >
    >>
    >> I've done quite a bit of research over the years looking for the best
    >> way to keep my internet traffic secure and anonymous. I've tried and
    >> used many services, everything from proxies to ssh tunnels and I've
    >> been using an OpenVPN service from Perfect-Privacy for a while now and
    >> have been extremely pleased with it so far. FYI, I used to work in the
    >> networking field in the past (altho it changes and advances so damn
    >> fast) so this isn't a clueless newbs rant
    >>
    >> These guys are the Nuts!! (if you play poker you know what I mean)
    >>
    >> You can do an openvpn connection to one of their several servers
    >> around the world, then add a ssh tunnel to another servers squid
    >> proxy, and chain that to another servers socks 5 proxy. It can get
    >> pretty slow the more you chain it, but it's about as secure as you can
    >> get. Also, all their servers (according to them at least and I have
    >> been given no reason to doubt them) have highly encrypted hard drives
    >> on hardened Linux Servers and do not use any logging features at all.

    >
    > It always boils down to the "no logging" thing.
    > Perfect-Privacy has the usual Terms and Conditions as found on
    > http://perfect-privacy.com/terms.html. If there truly is no logging, by
    > what means would Perfect-Privacy enforce their terms?


    They can't but as a VPN they don't have too keep logs by law (USA). To
    keep their systems running, they just remember everything.

    *LOL*

    Our friend Rocky Mountain Illegal Marijuana Grower has a couple of
    problems. One, he's has a little knowledge that has exploded into his
    version of genius and 2) he'll get his ass busted soon enough anyway
    so what difference will it make?
    --
    http://www.vitals.com/doctors/Dr_Ari_Silverstein.html
     
    Ari Silverstein, Aug 29, 2010
    #5
  6. On Sun, 29 Aug 2010 16:38:24 -0400, Buck Mulligan wrote:

    > Talking to yourself again, Frank? (a.k.a. Frank J. Camper, King of the
    > Sockpuppets)


    Frank, yeah, you got me there Lal Singh.

    lol
    --
    Ari's Fun Times!
    http://tr.im/hrFG
    Motto: Run, rabbit, Run!
     
    Ari Silverstein, Aug 29, 2010
    #6
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Harley D.

    Cisco 2950 Daisy-Chain

    Harley D., Apr 30, 2004, in forum: Cisco
    Replies:
    5
    Views:
    6,141
    M.C. van den Bovenkamp
    May 3, 2004
  2. Mario
    Replies:
    0
    Views:
    505
    Mario
    Nov 29, 2003
  3. Ari Silverstein

    Re: Tor v.s. My Proxy Daisy Chain

    Ari Silverstein, Aug 24, 2010, in forum: Computer Security
    Replies:
    1
    Views:
    1,518
    Nancy \White Trash Queen\ Reed
    Aug 24, 2010
  4. Buck Mulligan

    Re: Tor v.s. My Proxy Daisy Chain

    Buck Mulligan, Aug 30, 2010, in forum: Computer Security
    Replies:
    1
    Views:
    1,184
    Ari Silverstein
    Aug 30, 2010
  5. Ari Silverstein

    Re: Tor v.s. My Proxy Daisy Chain

    Ari Silverstein, Aug 30, 2010, in forum: Computer Security
    Replies:
    0
    Views:
    1,850
    Ari Silverstein
    Aug 30, 2010
Loading...

Share This Page