[ / / / / / / / / / / / / / ] [ dir / ausneets / chaos / choroy / dempart / freeb / jewess / mde / vichan ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): c217135245a1734⋯.jpg (199.41 KB, 700x1332, 175:333, 18fM5ja.jpg) (h) (u)

[–]

 No.1081569>>1081572 >>1081649 >>1081668 [Watch Thread][Show All Posts]

So I installed TOR and put it on Max Security in the options. What now? You guys know any good step by step tutorials (text or video) or can tell me what to do?

Also, would you recommend having TOR on the system itself or launch it from an USB port, I heard that's possible.

Thanks.

 No.1081572>>1081573

>>1081569 (OP)

How did you even come here without knowing how to operate a search engine?


 No.1081573

>>1081572

I did already watch several videos my man but they were rather contradictory in what's the best way to proceed and others were too hard for me to understand. Figured I'd ask here for anons who had success with setting up their rig with the help of some text or video tutorial.


 No.1081578

kys


 No.1081581

You are already more secure than 60% of the retards on this board so good job, OP


 No.1081584


 No.1081649

>>1081569 (OP)

Privacytools.io


 No.1081668

>>1081569 (OP)

fuck off


 No.1081672

What is your threat model? If you want to avoid corporate espionage, just run tor browser at the max setting and don't resize the browser window. You will still be vulnerable to various fingerprinting attacks, but there is not much you can do about it.

If you're trying to be safe from governments, there is almost nothing you can do. The web protocols and standards are designed to be insecure on purpose and their software implementations tend to be shitty, since quality programming has very little demand on the consumer market. The Tor network itself is a low latency network, which makes it very vulnerable to timing attacks. On top of that, pretty much all encryption used on the internet is vulnerable to quantum computer attacks, but as far as we know, NSA does not have that kind of technology yet.


 No.1082027

First and foremost. Make sure you use an operating system that values your provacy. Windows has a long track record of respecting user privacy and their latest and greatest version of windows, windows 10, is by far the best. It auto updates too so you can rest assured that you have the latest security updates.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
9 replies | 0 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / ausneets / chaos / choroy / dempart / freeb / jewess / mde / vichan ][ watchlist ]