News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Is TOR still safe? : OpSec | Torhoo darknet markets

Recently, I've seen some drama about the TOR browser and its new updates. I'm not the brightest with IT stuff but apparently, the OS spoofing feature where all users appeared as Windows users is now gone. I also heard something about fingerprinting? My question is: is it still as safe to use now as to before? And does using Tails minimize any tracking risks? This question might seem like I'm clueless, but I need to understand this- Thanks to everyone willing to read and help me understand the topic
This increased possibility to fingerprint when O/S spoofing is missing is of course not good. What happens is that the O/S will be exposed (i.e. Windows, macOS, Linux, or Android). This means that Web sites has an increased ability to track users. However, it's not like we are doomed, but privacy and anonymity is degraded, which is a development in the wrong direction.

There was a similar question yesterday /post/73b1ab7d14c1f9bca95a

See more at https://torhoo.cc/go.php?u=YUhSMGNITTZMeTlpYkc5bkxuUnZjbkJ5YjJwbFkzUXViM0puTDI1bGR5MWhiSEJvWVMxeVpXeGxZWE5sTFhSdmNpMWljbTkzYzJWeUxURTBNR0UwTHc9PQ==#
/u/EXE01 📢
2 points
1 week ago
Thanks for the about:config post for the community! I find your post quite helpful
[removed]
/u/Demure
1 points
1 week ago
You have to be careful the system you operate it on, that is diverted to why tor stands in a way tho
the OS spoofing increasing fingerprinting isn't good but i'd still say it's safe. as long as you have Fingerprint settings turned off in about:config

Also about the the Princeton research on the BGP attack's, that was released 9 years ago, so the vulnerability's have been there, it's not new.

I just put a multi-hop VPN on before i connect to Tor, I always have. i recommend Mullvad.

you can pay with Monero, they have anonymous signup and you can sign up on there onion site.
/u/ringct
1 points
1 week ago
as long as you have Fingerprint settings turned off in about:config
Which settings are you referring to?
these are a couple just to name a few.

dom.battery.enabled = false - Disables Battery Status API (used for fingerprinting)
media.navigator.enabled = false - Disables access to microphone/camera APls (even if WebRTC is off)
webgl.enable-debug-renderer-info = false - Prevents WebGL from leaking GPU details (used in fingerprinting).
device.sensors.enabled = false - Disables motion/orientation sensors (used in fingerprinting).

see my comment /post/4f3818bf908023c80221/#c-7ca4e3b325b107c96f for a full list of setting that should be turned off/on for better privacy. mostly all of them don't come turned off by default.

you can ask any AI which setting will protect you from what if you're wondering about a certain setting and what it does. but in the comment i say in general what each setting does.
/u/ringct
1 points
1 week ago
I don't use AI and never will.
Thank you for your reply, I will look into these.
i just posted a full post here /post/fc5f11425340b87869da

thought back to this and thought you'd wanna see it!
/u/ringct
1 points
5 days ago
Thank you for your valuable contribution!
/u/RobertOppenheimer 🍼
1 points
1 week ago
Nothing is 100% safe online. But if you use it correctly and don't put in personal information it's as safe as it gets. Tails helps and is a great and easy OS for daily use or just to research some stuff. But same with Tor you'll have to use Tails correctly and not risk leaking your identity. I would research about Tails and how to use it correctly and if you understand it all and use it correctly. You're pretty safe.
I got that ho on Safest but I eat crayons and haven't gotten anymore technical than that.
I have the Force on my side, despite the crayons.
/u/EXE01 📢
1 points
1 week ago
Don't worry, friend. We can eat crayons together to cope </3
/u/ThatOpSecGuy
1 points
1 week ago
The conversation surrounding this topic has been rife with FUD. Contrary to what may be stated in commits or discussions on GitHub, the OS spoofing feature continues to function in the Tor Browser. I am using the latest version, have enabled the option to spoof the OS fingerprint in about:config, and when I check my user agent, it still displays as Windows.

Even if what people were saying was true, it wouldn't be the end of the world.
/u/EXE01 📢
1 points
1 week ago
I see, it might not be the biggest deal, but I just noticed a lot of fuzz about it recently.bTOR got a lot of backlash for this "privacy downgrade" it seems. Anywho, if it's still functional, then that's a relief. I found that in about:config you can enable this setting:
privacy.resistFingerprinting.spoofOsInUserAgentHeader = true
Although I'm not very sure if it's up-to-date. I would like some corrections on this if possible
/u/ThatOpSecGuy
2 points
1 week ago
That is the setting that I am referring to. Check your user agent after you make the change and you will see that it still works.
/u/DaemonArc 🍼
0 points
1 week ago
Now, it's like no place on the internet is completely safe. Some of them have these things that they'll give you your location in a second. Now, yes, I say it's not safe, but that doesn't mean that we can move forward without hiding ourselves. Nothing is 100% secure, but if we use things like VPNs, we are harder to find. It helps to use passwords that are long enough and complex enough, especially if we don't share personal information. ! I WANT TO MAKE IT ABSOLUTELY CLEAR THAT VPN OR OTHER THINGS DO NOT PROVIDE ABSOLUTE PROTECTION BUT STILL MAKE IT HARDER TO BE FOUND!
/u/hellokittyxdxd
1 points
1 week ago
That is exactly why I use a VPN, and have my DNS configured properly. When I first started using a VPN, I had no clue it would still send my search queries through my ISPs DNS servers.
/u/DaemonArc 🍼
1 points
1 week ago
the important thing is to be careful