News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Phishing attacks : DaevaMarket | Torhoo darknet markets

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Do not use https://dnstats.net/ this website is serving phishing links.

You should visit http://77o4j55bt7e53jrso2nuaumj24cory5weaqv7zypbptkxhdfgaxgfvyd.onion/mirrors.txt and save all the market links
-----BEGIN PGP SIGNATURE-----
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=aBj1
-----END PGP SIGNATURE-----
/u/bulgurspied 🍼
1 points
1 week ago
Wait! That long list of changes? Takes about 30 minutes to do so every time you start up Tor anew! Are you sure this is all needed for buyers??
/u/horrifiedcalamitus52
1 points
1 month ago
should we still use these settings with the new updattes?
/u/babybottle
2 points
2 months ago
privacy.resistFingerprinting.spoofOsInUserAgentHeader seems ot have dissapeared in the latest Tails update - does that matter?
/u/yougogirl
1 points
1 month ago
Also wondering about this
/u/SharperArbitrate
1 points
5 months ago*
Hi HJ,

Can you please explain the difference between "webgl.disabled" vs "webgl.disable-webgl"?

On my js-enabled tor qube it seems I have to enable "webgl.disabled" to thwart tests like this: https://browserleaks.com/webgl
Was this not included intentionally? Any thoughts on this would be greatly appreciated

Thanks
/u/HyperMopDuster
1 points
7 months ago
Do I need to manually setup these settings everytime I boot up Tails? Thanks so much otherwise!
I finally went back and changed all these. Thanks dude.

Hopefully you're okay with constructive criticism lol cause the process would be streamlined if there were a "false to true" column and a "true to false" column. Not that it's a big deal at all since the content itself is obviously more important, but I did find myself going back and checking a number of times to make sure I didn't fuck up.
You are a one of kind gem. Always open to any kind of feedback, especially from you.
Likewise my friend. I hope you're doing okay.
Thank you as always. Here come a new week!
Well, not precisely. While in reality:

Tor is primarily intended for allowing you to browse ordinary websites anonymously, and only about 3% of Tor traffic is to onion sites.

Tor is primarily intended to offer the US and friendly insurgency and counterinsurgency agents to work behind the enemy lines. Everyone else is a decoy to them.

☛ Tor is a humanitarian project enabling people in restricted and censored parts of the world to read the news published by others countries and connect with friends and family because their country has forbidden freedoms to engage with the outside world.

Tor is NOT a humanitarian project. It was created by the United States Naval Research Laboratory in the 1990s to support their agents in the field. The United States Naval Research Laboratory doesn't do humanitarian work. They spread the Tor to public only to get enough decoys (normal people) to create reasonably strong anonymity set for their agents in the field.

☛ → If you read the original Tor specification, "onion sites" are practically an after-thought; almost the entire proposal is about using onion routing to reach the open web with privacy.

Nope, the original specs was to allow the US agents to organize and get and share the intelligence with their friendlies. If you are not one of them, you are just a decoy to them.

-quote]☛ Nothing on the Tor project's front page or their about page even mentions "onion sites" or the darknet or markets.[/quote]
Of course not. It doesn't change anything.

There exists a type of character in the world that values their privacy greatly. I just happen to be one of those people.

I hope so. Lets accept the reality then. The fairy tales don't help anyone here.

My question to the proposed TB settings. How unique will the person be with this setting in between other Tor users? Unless majority of the Tor users will use this settings too, it will make you to stand out from the crowd. Are you sure this is what you are looking for?
It is okay to be wrong. It means you are human. Every once in a while try your best to be human and not Lord.

"Roger Dingledine, a recent Massachusetts Institute of Technology (MIT) graduate, began working on an NRL onion routing project with Paul Syverson. To distinguish this original work at NRL from other onion routing efforts that were starting to pop up elsewhere, Roger called the project Tor, which stood for The Onion Routing. Nick Mathewson, a classmate of Roger's at MIT, joined the project soon after."

Give credit where credit is due: Roger Dingledine

The funding came through Syverson from the Office of Naval Research (ONR) and DARPA.

"Dingledine and Mathewson took code originally written by Matej Pfajfar and turned it into a fully fledged onion routing system."

Prior to this:

" Alan Berman Research Publication Award given for "Anonymous Connections and Onion Routing". This paper provides the most detailed specification published of generation 1 Onion Routing, although some features are added later.

"Work on Onion Routing development is suspended. There is no new funding for it, plus most principals and all developers have left NRL for other pursuits. Nonetheless, research and analysis work continues."

" A security analysis paper is presented at the first Privacy Enhancing Technologies Workshop---where the seeds of future Tor development are unknowingly sown when Syverson meets Dingledine for the first time. (official title of the first workshop was Design Issues in Anonymity and Unobservability and the proceedings was titled Designing Privacy Enhancing Technologies). This paper is where the c^2/n^2 analysis is set out. Analyses of strategies for picking route length and the effect on security are also made but not published in the final version of the paper.

Patent issued in July."

"Work on OR development resumes, funded by DARPA under Fault Tolerant Networks Program with initial goal of making the generation 1 code complete enough to run a beta network and the subsequent goal of adding fault tolerance and resource management.

Edison Invention Award presented for the invention of Onion Routing."

The Navy!!! The Navy!!! The Adversary!!!


"Funding from the Naval Department was only relevant because that's where Dr. Syverson worked at the time (and works still).

Further, while his official justifications to his bosses and funders might have been something like "create anonymity software that the US Navy can run so our warfighters can securely communicate in the field", his personal reasons were probably more like "create anonymity software that everyone can run to protect themselves all over the world."

"create anonymity software that everyone can run to protect themselves all over the world." -- WHAT THE FUCK???????



DARPA and ONR via Naval Research Laboratory - 2001-2006 [No longer a donor]
Try the GPT or wikipedia harder and you find out what the reality is ;)

As mentioned earlier, the Tor is a joint US government operation from the NRL (Naval Research Lab) and DARPA to ensure the secure and anonymous communication for the US government intelligence and military personnel. Period. The history is clear here. These intel guys did not develop Tor for humanitarian purposes at all. It was there to support the US national security interests and continues to be.

Check the history of funding and see how the Torproject as a military-intelligence operation's funding became socialized over time. Doesn't matter - you are still a decoy, unless you are their military-intelligence agent.

Dingledine was the head of the project at a Naval Research Agency - government contractor (cover agent) at the time (same like Ed Snowden for Booze Alen if I recall properly, normal coverup practice). In reality he was an internist of the NSA. Syverson was a direct employee of the NRL.

I can continue with the Dingledine being instructed by the BBG to go on with the "Russian Deployment Plan" in 2008 where he is asked by the BBG to reach to the "normal users" right befor the elections in Russia; his extensive communication with the BBG, CAI, FBI and DOJ and many meetings with their agents; his postponing of the critical patch for the Tor vulnerability. But this is all searchable and provable from the BBG's received through FOIA and other sources.

Of course, to get for this 96.000USD in 2008 only is quite motivating. Sorry to piss into the holy waters of divinised figures, but that is the fact.

At the same time what we say is that Tor is currently he best tool we have but to utilize it securely, one has to know how it really works and how it has to be used.

The message is simple: Let the US agents and insurgency and counterinsurgency friendlies, as primary clients of the Tor, overthrow the governments. You are are considered a decoy - be better than that and use Tor properly.
In my life, I have actually never used any ChatGPT.

Keep coming up with your fables. At some point someone will find them entertaining.
Bending the facts about the Tor in a way you do is entertaining already enough. Why do you do tht is the question - are you not aware and really uninformed and a victim of the propaganda or you are doing it consciously?

Tor is, was and always will be a military-intelligence project to support the US field agents in their work. You are a decoy to them unless you are one of them. DARPA and NRL are not doing humanitarian work. Come on. You can do better.
You may not believe it. But I sincerely and truly want you to be happy. I have wasted valuable time reading hundreds of pages of the history of Tor for no good reason. Just because someone was an early investor and the project failed until someone else came along we are forever stuck with the misconception that it was a Naval product. And a child who was given up at birth was an orphan but eventually a family took that child in, so we can't label them as orphan as it would disrespect the family life she got to experience when paths changed.

Do you know that the greatest philosophers in history were the rare ones who at some point surpassed their original perspective. Takes a lot of courage.

Take care.
/u/[deleted]
1 points
7 months ago
i helped fix the website you dumb fucking idiot.. and helped fyodor stop being harassed.... go see how thankful he was to me.

i am simply asking you to leave me alone, and it will stop.

if not, i look forward to getting to know you.


/u/HeadJanitor 📢 P Moderator 1 points
2 days ago
This is not the case with Tor mate. Tor is not an orphan but a well fed child of the DARPA and NRL whose funding was over the years successfully moved to the public.

Check your sources for the CVs of the Tor devs and bosses for more fun ;)
Hey, you just let me realize I need go rest up for a minute. Thank you.
/u/biosphere P
2 points
7 months ago
Thank you!
Thank you, /u/biosphere
/u/ScreenPlate
2 points
7 months ago
Bookmarked for future reference. Thank you!
No problem, thank you!
/u/invalidcaptcha
1 points
7 months ago
How do we find these settings in the first place? I have my javascript disabled so do I still need to change these settings?
about:config

All up to you.

JavaScript and Webgl are the two important ones.

The rest isn't crucial.
/u/DrPurpleLove
1 points
7 months ago
How to get the setting saved so we dont have to do them everytime again?
I was aware about the java that we have to turn to false but not all the one you mentioned
/u/cumrag67
1 points
7 months ago
I was going to say the same thing but you beat me to it. There is no way in the world we have to check all these settings each time we need launch tor which most like myself are using disposable whonix workstation which resets all configs when we close it down. Having to do this every time would drive me mad. Is there a script or something we can use?
Unfortunately, every time Firefox does a major upgrade the settings default to whatever they set them as.

The only thing we really need to do is a quick check every now and then like this:
about:config
javascript.enabled

If it states true, immediately disable it by setting it to false.

Don't count on the slider or NoScript as they have failed in the past. A quick visual check will do.

And, major upgrades don't happen that often.
/u/kethealedme
1 points
7 months ago
Is there a way to set your Tor broswer settings to Persistent in tails? I've been manually disabling javascript for awhile, thank you for this guide
/u/UKDistribution
2 points
7 months ago

1
Awards Received
Doge
1
Great post mate, keep it up ❤️
Thank you, /u/UKDistribution. You are a diamond.
Thank you!

Great post!

ss
Thank you, /u/suzie
/u/amidpowergames
2 points
7 months ago
Was trying to make a backup user.js file with these settings but i can't seem to get it to work, it shows that the user.js has changed in the file, but once Tor is started it still shows the default settings.

Any idea whats going on?

My instructions for recreating this in Qubes
	1. Right-Click the file and select 'Copy to other qube'

	2. Type the name of the destination Qube

	3. Run the other Qube and go to the 'QubesIncoming' folder, then into the folder that the file is 
	   in ('vault' usually)

	4. Open a terminal in the same Qube (Global terminal, not a terminal in that specific folder)

	5. Run this command:

cd /home/user/QubesIncoming/vault/ && sudo mv user.js /usr/share/tb-profile-i2p/profile.i2p/

	6. But doesn't change the settings?!
In Qubes it is a whole different ball game with Tor. Will reply with how tomorrow after work.
/u/amidpowergames
2 points
7 months ago
Ah i see, interesting, see im changing the settings of tor via this post thinking it was kind of the same ballgame, that would be an amazing read, looking forward to it
I've posted many of these as upgrades have set us back

I would not recommend this one to anyone but that one hacker.

/post/9d9dbd14d3735e03b688

My final end-goal is to have everyone blend in and leak as little data as possible.
/u/amidpowergames
1 points
7 months ago
Yea what this guy said
I feel like they could have done a profile slider with 3 profiles also for peoples threat level or something, like damn

IMO these should be default settings on a fresh install, but with Tor browser trying to appeal to a larger audience I can somewhat understand their reasons to have things setup this way.
/u/amidpowergames
1 points
7 months ago
My final end-goal is to have everyone blend in and leak as little data as possible.

The Holy Grail of Privacy, everyone hardened
Every time you post, I always know it’s going to be good and useful. :)
♥♥♥♥♥ Much love to you, /u/TorLarp ♥♥♥♥♥
/u/amidpowergames
2 points
7 months ago*
TL:DR: The setting 'network.http.sendRefererHeader' might not let you log into Dread, so instead of setting it to '0' instead of the default '2', you can set it to '1' and it might let you log into dread again if your having problems with it

The setting:
network.http.sendRefererHeader
When it was set to '0', it was letting me access the Dread homepage, but was NOT letting me log in, i was getting the error:
The connection was reset

The document contains no data.

    The site could be temporarily unavailable or too busy. Try again in a few moments.
    If you are unable to load any pages, check your computer’s network connection.
    If your computer or network is protected by a firewall or proxy, make sure that Tor Browser is permitted to access the web.

Might be causing this issue because:

    What it does: This setting decides if your browser tells websites where you came from when you click a link.

    Why it might cause the issue: If the setting is wrong, the website might not let you log in and could show an error instead.
What each setting does:
The `network.http.sendRefererHeader` setting in Firefox and Tor Browser has three main options:

1. **0**: **Never send the Referer header** - The browser will not send any Referer information to websites.

2. **1**: **Send the Referer header for same-origin requests only** - The browser will send the Referer header only when navigating within the same site (same domain).

3. **2**: **Always send the Referer header** - The browser will send the Referer header for all requests, regardless of whether the sites are the same or different.


So just a heads up for anyone if they suddenly can't log into Dread but can access the homepage, this might be the setting that is stopping it
/u/Epigram
1 points
7 months ago*
Thank you! That absolutely was preventing me from logging into Dread.
/u/amidpowergames
1 points
7 months ago
Woohoo! I'm really glad I could help someone else with the same problem!

Regarding your suggestion, /u/HeadJanitor, perhaps that option could be removed or changed to a setting of 1 to prevent traffic from being unable to access Dread? When I was creating new identities on Tor, I'm not sure if that would have made a difference, but you mentioned it's resetting it to the default value. You said the default was 0, but the documentation states it's 2, and it was 2 for me, at least for Qubes Tor. However, when I tried that, it didn't resolve the issue until i set it to 2 or 1, so I've left mines on 1 now.
You probably know better than me.
I thought about this one plenty. I'm even considering removing it because it might prevent entry into some sites.

This would more likely be the case you are referring to [network.http.referer.hideOnionSource]

But since we are using a Private Window in Tor, I believe that it defaults to 0

What would be problematic is:

network.http.referer.XOriginPolicy
network.http.referer.spoofSource
network.http.referer.trimmingPolicy
network.http.referer.XOriginTrimmingPolicy
network.http.referer.hideOnionSource
network.http.sendSecureXSiteReferrer

I took into consideration the below with integration with CSS

Referrer-Policy: no-referrer
Referrer-Policy: no-referrer-when-downgrade
Referrer-Policy: origin
Referrer-Policy: origin-when-cross-origin
Referrer-Policy: same-origin
Referrer-Policy: strict-origin
Referrer-Policy: strict-origin-when-cross-origin
Referrer-Policy: unsafe-url

Payment providers might rely on the Referer header of incoming requests for security checks.

But visiting Dread would be via about:config

Tor sets the referer to the destination address.

The problems I see are related to
Payment Providers
Being depicted as a bot
Integration with CSS
Hotlinking

When one exits the Tor network, Tor automatically hides the referrer.


As far as Cross-Origin Fingerprinting Unlinkability, Tor states:

"User activity on one URL bar origin MUST NOT be linkable to their activity in any other URL bar origin by any third party. This property specifically applies to linkability from fingerprinting browser behavior."

As far Cross-Origin Identifier Unlinkability, Tor states:

User activity on one URL bar origin MUST NOT be linkable to their activity in any other URL bar origin by any third party automatically or without user interaction or approval. This requirement specifically applies to linkability from stored browser identifiers, authentication tokens, and shared state. The requirement does not apply to linkable information the user manually submits to sites, or due to information submitted during manual link traversal. This functionality SHOULD NOT interfere with interactive, click-driven federated login in a substantial way."

Because we are in a Private Window, the referrer is suppose to be set to 0 by default.

But my worry is that by setting it 0 we no longer blend in with the other 97% of Tor.

It's that that is my concern which is why I think, despite leaking information.

Even when we obtain a "New Identity" Tor mandates that "All linkable identifiers and browser state MUST be cleared by this feature."

So, we get a New Identity and we can still connect to Dread. If we have failed the CAPTCHA too many times, Dread tells us to get a new identity and in doing so are referrer is set to 0.

But I feel like wiping this one out because of the differentiation issue. Many of the other ones won't have much of an impact. Many are killed the moment we disable JavaScript.

But I personally never use a refer when visiting a site outside of Dread.

If I were to visit a market, it's New Window.

Also, if you Right-Click on any link in Tor your will see the option "Copy Link without Site Tracking."
/u/amidpowergames
1 points
7 months ago
I thought about this one plenty. I'm even considering removing it because it might prevent entry into some sites.

This would more likely be the case you are referring to [network.http.referer.hideOnionSource]

Yea i saw that one and decided to ignore that one, that's the only one i didn't change actually
Yea na it is the one I'm talking about that stopped it working, I meticulously went through every setting and toggled it on and off because theres something wrong with my brain hahahah

I couldn't tell you at all why thats the one that worked but it was, maybe its something to do with me being on qubes like you say yea?


Even when we obtain a "New Identity" Tor mandates that "All linkable identifiers and browser state MUST be cleared by this feature."

Yea thats what im scared of is standing out with all of this stuff

I looked it up, the defualt state of network.http.sendRefererHeader is 2 yea

Many are killed the moment we disable JavaScript.

It just seems like a massive false sense of privacy from the 'privacy' browser, like what the fuck you disable javascript on the 'security' slider and it doesnt even fully turn it off haha like what the fuck

do you think ignoring the network.http.sendRefererHeader one and the one about onion links, that everything else is still enough to not stand out that much?

I feel most people never change more than 2 of these settings, if any, so might it be possible that you could leave all of them to completely blend in?
I mean i have no idea im assuming it is or you wouldnt have made this post in the first place aha

But I personally never use a refer when visiting a site outside of Dread.

right yea i guess that does make total sense with your threat model right, im learning a lot here

If I were to visit a market, it's New Window.

Also, if you Right-Click on any link in Tor your will see the option "Copy Link without Site Tracking."

You would think there would be a setting for this that changes that when you do the slider that seems like a really big fingerprint
So when you click New Identity, it sets your referrer to 0.

"But I personally never use a refer when visiting a site outside of Dread."

My habits:

1) I do not leave .onion - I have no need to use Tor for the clearnet. When I was new I learned two simple things:
a) don't encounter the exit node
b) use a local Monero node

I never did anything complicated, complex, sophisticated. I see posts of "27 VPNs, 4 RDPs, 22 foot antenna".

No correlation: if I were to visit a market, I would have a whole different circuit and no likability to *this* Tor session.

When I am done with Dread, I simply exit.

I have set up onions for many where (from the outside) you simply cannot link a picture to someone else.

(I will show you an example tomorrow.)

But the no-header is actually something I use on the clearnet for statistics because it helps so much in finding out where most of your customers are coming from.

I showed someone their clients are coming from Instagram and this one unknown drug site. They were shocked.

I believe the refferer aspect was a big deal when the Internet was new. Now the measuring techniques to distinguish you and a bot are so "AI" in a sense. Behavioral pattern really comes into play.
/u/amidpowergames
1 points
7 months ago
Glad i 'learned' about local node, by learned i mean i only managed to set it up after many many hours, weeks actually of learning and trial and error and using ai for errors etc to finally get it set up lol

a) don't encounter the exit node

Isnt it enough to be aware of what you are looking at when you are on differant websites while being logged into dread for example?
Like i have a bunch of tor qubes to make sure that i break up anything that i dont want linked to other things

27 VPNs, 4 RDPs, 22 foot antenna

HAHA

No correlation: if I were to visit a market, I would have a whole different circuit and no likability to *this* Tor session.

Yea so i basically have that mentality, never been logged into amarket or anything else and dread or anything else at the same time on the same browser, no even in same OS, always on differant qubes or setups, i was under the impression that that was enough

When I am done with Dread, I simply exit.

Even though the process is still far better, its still a itch logging in around 5 times a day and out again haha

you simply cannot link a picture to someone else/[quote]
Sorry you've lost me here what do you mean here

[quote]But the no-header is actually something I use on the clearnet for statistics because it helps so much in finding out where most of your customers are coming from.

Knowledge is power

I showed someone their clients are coming from Instagram and this one unknown drug site. They were shocked.

Haha sounds like a fun moment, its amazing how many people think I am some computer wizard because they are so far on the outside of this world that they think im some giga-geek, when all ive done is read up on privacy and things

Behavioral pattern really comes into play.

Becoming unnaturally paranoid about this ai correlating my language but i feel that the only way to hide the way i talk is to run it through ai every time i type a msg on here and then make it reword everything i say, but then ive just sent that information right into the hive mind anyway, doing their job for them
/u/fuckyoupeople
1 points
7 months ago
I'm confused. These settings would provide further anonymity because they would not allow potentially malicious actions from the user you are communicating with (like exploitation) or for surfing in general? My point being: if Tor is illegal in your country and it doesn't provide the anonymity it promises you are fucked since the government for sure has enough resources to get these people.
Mandatory: if you are on the darknet you must disable JavaScript.

On the clearnet you can't use the clearnet without JavaScript.

Notice how simple all Onions (hidden services) are: they use HTML, CSS and a bit of PHP on the front-end. BUT **ALL** browsers (meaning 100% of them) know how to render JavaScript.

Look at Dread's source code, or any market. And you will never find JavaScript.

Go to cnn.com and it's all JavaScript but it is not malicious. It provides rapid functionality that any browser can render regardless of the operating system.

cnn.com is not trying to harm you. All the corporations are trying to satisfy their shareholders and their revenue, not hack you.

"the government for sure has enough resources to get these people"
-- The US government has firewalls that can detect Tor usage in real-time.

But (1) is it a major crime to export any encryption tool to another country.
(2) A country like Pakistan and Afghanistan will not have the technology we do.

We have "stealth technology":

The F-22 Raptor
The F-35 Lightning II

Export of cryptography from the United States is a very serious crime.

We have technologies like Splunk, Sophos, Cisco ASA 5510 Firewall that can easily detect Tor usage. But that is US.

And, even if a restricted country detects Tor usage, it's not that easy to pin-point someone. It is so demanding and so costly.

The purpose of most of these settings is simply to prevent leaking unnecessary information.

"if Tor is illegal in your country" you are fine like the MILLIONS of non-darknet users. You use plugable transport to evade detection by your ISP.

Think of the thousands of users in Iran and China who use Tor daily to read cnn.com or go on facebook.com

And think of "Off Shore Hosting."

Being a Tor user is, I hate to downplay it, but not that big of a deal unless YOU are a big deal.

The Cost of finding Bin Laden took $3 Trillion and over 15 Years. Not many Tor users and worth that.
/u/fuckyoupeople
1 points
7 months ago
Thank you so much for such an answer! I gotta tell you though I'll need to take my time to understand what you said about the stealth technology but it will be a great point to deepen my knowledge about cyber security! Thank you again you are great!
"stealth technology"

Don't know if you remember when we caught Bid Laden one of the helicopters basically crashed. Before leaving, the SEALs had to put explosives to blow up the electronic system.

We have modern day jets, other countries have old, old war places.

We can easily determine Tor usage but it is not illegal. Because we have civil liberties.

There is a misconception on Dread, a current trend, that the most important thing is to prevent your ISP from finding out you use Tor.

Switch the word "ISP" to "Phone Carrier" -- would your phone carrier care if you were talking to Kim Jong Un? Probably not. But if you miss payment, then you're in trouble.
/u/fuckyoupeople
2 points
7 months ago
It is great to see there still are nice and thoughtful people in this world
Thank you, this is what /d/OpSec is all about.
/u/amidpowergames
1 points
7 months ago
ai is saying this

javascript.options.baselinejit: This setting controls a performance feature for JavaScript. Setting it to false may slow down JavaScript execution
Same with this
javascript.options.baselinejit: This setting controls a performance feature for JavaScript. Setting it to false may slow down JavaScript execution


why do we turn this off in our case?
We turn it off because—please forgive me for being rude—many people don't both turning of JavaScript.

An innumerable amount of people don't use PGP.

So, they are FALLBACKS.

But out of all the readers, how many do you think will actually be concerned about this?

How many are connecting to Dread with their Smart Phone?

Will more than 5 people here ever read the Tor specifications?

Still, it's my job to, at the very least, make these things know rather than expect that "no one cares".
/u/amidpowergames
2 points
7 months ago

1
Awards Received
Bronze
1
I definitely care, I read all the bibles there is to read and never once found anything about javascript not even being turned off, seem outrageous haha, anyway i know now ha

But out of all the readers, how many do you think will actually be concerned about this?

I feel like if it's important, and people knew about it, and if it was in the Bibles, which i dont think ive ever read it in one of them, then i think people would be concerned about it

But like you said only 2.7% of people are on the darkweb on Tor

How many are connecting to Dread with their Smart Phone?

Hahaha this one made me piss myself laughing, ikr, guy told me the other day that his friend was trying to buy off the markets through his smartphone, i just told him to never tell him my name or anything about me, haha fucking crazy

Will more than 5 people here ever read the Tor specifications?

I know i havent pmsl, because i trusted them to tell us if javascript wasnt actually getting turned of pmsl
network.dns.blockDotOnion only offers true/false option?
I just realized, you made me realize, that needs to be removed.

What that would do if set to true is allow Firefox to send DNS requests for hostnames with a .onion TLD.

This leaks information about what the user is attempting to access via Firefox.

That shouldn't even be in about:config but Tor is Firefox. The developers should have removed it entirely.

A .onion TLD on the clearnet is a scam site.

If you run into dread.onion --- it is not a v3 Onion site.

Tor does not make DNS requests, Tor resolves names via Socks.

Tor does not directly use the traditional DNS request to resolve domain names because it operates on a network of hidden services.

It is the re-directing of clearnet pages/sites to their Onion version that has been disabled.

Thank you, /u/newbieforever2018
A .onion TLD on the clearnet is a scam site.

It's not in the root zone tough?

https://www.iana.org/domains/root/db

And https://datatracker.ietf.org/doc/html/rfc7686 makes it seem pretty hard to register .onion on the clearnet:
DNS Registries/Registrars: Registrars MUST NOT register .onion
names; all such requests MUST be denied.
/u/Octopus Sea Spider
2 points
7 months ago
Yet another quality post from the one and only! respect, brother!
Respect and love. And the safety of us all.
/u/Octopus Sea Spider
2 points
7 months ago
Safety is everything! vendors should put safety before money or anything else they're hypnotized on!
If you make this in a copy/pastable format for user.js, then I could make that file and the end goal would be the same, right?

Maybe I can even make one but it won't be tonight.
Thanks, /u/MrBacon420

What I wish is that we could have NoScript as this:

⚠️NoScript_DarkNet⚠️

And, as /u/Paris always states, after each upgrade (at least a major one like 14.0) the settings go right back to default.

One can make Persistent NoScript Settings with

extensions.torbutton.noscript_persist is set to true
So besides lazy load, those look like the defaults for a NoScript trusted site.

Wouldn't that allow suspicious things? Or none of those checked are of a concern?
I don't think they are the defaults. But my experiences are in helping people with Windows or different Tor browsers.

They miss out on seeing widgets: some sites have payment functions or widgets that display current XMR rates and for this they need to see "objects".

Markets generally do not use iframes but other sites do to pull in real-time data.

Lazy load simply doesn't load the picture until your browser arrives at it.
My only concern is that not all Tor browsers are the same.

As far as fingerprinting:

Whonix uses the original Tor Browser from The Tor Project.

Tails tries to hide the fact one is using Tor.

There is so much of a difference in so many aspects between Tor in Whonix, Tor in Tails, the Tor Browser Bundle, Qubes OS TorVM.

Here: I just found the detailed breakdown:

https://www.whonix.org/wiki/Comparison_with_Others

Table: Verifiable Builds Comparison
Table: Fingerprinting Issues
Table: Security Hardening

But, of course, the more alike we look the better!
/u/MrBacon420 P 🐖🌿⚗️420🌿🚬 🐷
2 points
7 months ago

1
Awards Received
Bronze
1
Thank you for the refresher, I've read a lot of the Whonix wiki and documentation.

Thank you again for everything!
/u/amidpowergames
2 points
7 months ago
I know it's best to do everything ourselves, but...
Would you release an install version of Tor that has these settings already changed?
Would I?
No, I would not be able to.

It's a massive project of developers merging many commits.

These settings won't affect our fingerprint much. What is most important is to disable JavaScript and Webgl

Of the entire Tor network, right now, approximately 3% is darknet users.

So, what is released is for the 97% -- which makes complete sense.

It'll take no more than two minutes to make the "important" changes.

I simply visually noticed these.
/u/amidpowergames
2 points
7 months ago
Wow had no idea it was only 3%, and 99% of that 3% are scammers lol...
Right so if you have a threat level of, say, an Oz of cocaine off DW a month, you are really find about this sort of stuff right?
I'm running tor inside of whonix inside of qubes so i dont really need this do i
Yeah, even in Whonix Disposable Templates JavaScript is enabled, which increases the risk of exploitation and breaking anonymity but the browser fingerprint remains more common.
/u/amidpowergames
1 points
7 months ago
Ah right makes sense, because everyone else's browser is also at safest with java still on restricted too i guess?
That (the blending in goal) and that whether one uses TBB, Whonix, Qubes -- the developers expect that neither the browser or the OS is going to teach them the ropes: if you want to enter that territory you have learn about where you are going and how to stay safe there.

They can't perfect anything for us because there is still so much to learn: how to find the right vendor, how to use encryption, how to not get scammed. It's like a teacher/classroom/textbook/bootcamp can only do so much. You have to prepare yourself for the risks of the environment you are entering.
/u/amidpowergames
1 points
7 months ago
They can't perfect anything for us because there is still so much to learn: how to find the right vendor, how to use encryption, how to not get scammed. It's like a teacher/classroom/textbook/bootcamp can only do so much. You have to prepare yourself for the risks of the environment you are entering.

Not to sound Gate-keepy or anything but im really glad its like this, you really have to work for it to 'get the gold'.
It really weeds out the, also sorry to be rude, but weeds out the complete mass of complete fucking idiots that would drench this place and ruin it, if they could get over here and turn this whole place into the way Reddit is.
That would be a real loss for me, the way it is here i feel is because its way harder to get onto here properly and get into all of this, than it is to just pick an username and password
If that makes sense
Most of Reddit is a insanity, and not the good kind
Well, always do a visual.
about:config
JavaScript.enabled

I don't ever use the Tor Browser's security slider settings. I need a granular check.

I think right now we're at 2.7%
I believe our record high (Darknet users) was at 6%+
/u/amidpowergames
1 points
7 months ago
Wow it was on for me what the fuck, mines had it on still?!?!?!
What does this mean if the slider says its off, at safest, yet its still on?!?!
I'm so confused, why wouldn't it actually turn it off?

Well I'm happy that people are taking their privacy more serious if its really 2.7% that's so not what i expected at all
Yea does seem like it would feel better to check in that part than just the slider
Over the years, we have all learned not to trust the slider or NoScript. Hence, why I look at about:config.

Don't worry, because Dread doesn't have any JavaScript you didn't render any JavaScript.

But now you know, a quick 5 second look at about:config

Every major upgrade resets the settings. And NoScript isn't perfect.

Doing it manually, you know it's done right.

Alright, ace, til tomorrow! Good to meet you.
/u/amidpowergames
1 points
7 months ago
Over the years, we have all learned not to trust the slider or NoScript. Hence, why I look at about:config.

Well even if it is only today I'm appreciative to have learned it now

Don't worry, because Dread doesn't have any JavaScript you didn't render any JavaScript.

Yea true, its just other websites ive been on while on tor, but like i said its all been different tor browsers in different qubes, so complete mental breakdown avoided lol.

But now you know, a quick 5 second look at about:config

It's a beautiful thing :)

Every major upgrade resets the settings. And NoScript isn't perfect.

Ah right gotcha, thanks for that

Doing it manually, you know it's done right.

Alright, ace, til tomorrow! Good to meet you.

Thanks for staying up :P
/u/HSTG2PDX1
1 points
7 months ago
I'm not calling you out or accusing you of anything but it's kinda peculiar that you've gone so long without knowing that javascript was still enabled. For a while now certain onion sites have been throwing up warning pop-ups upon visiting the site telling me and I assume anyone else if js was enabled and to go turn it off if so. I'm not a DW-aholic like some so I don't really visit all the markets or onion sites/services that are up and running at any given time to say which ones had/have the pop-up but I'm usually in one or two of the top 3 markets at least once a week and I've encountered the warning a handful of times until "about:config" was a part of the whole DW process for me.

Again, not accusing you of anything, I just find it odd that you didn't encounter one of those pop-ups at some point because I've been seeing them for a while now. I can't say exactly, due to my goldfish memory (don''t do drugs kids) but I want to say that it's been over a year, maybe closer to two since I first saw one. But either way, I'm glad that you now know how to check to make sure that it's off for sure.


Also, thank you /u/HeadJanitor for the look outs. I don't think people realize how fucked we'd be without Dread and the time and effort that individuals such as yourself put into finding these potential security threats and then passing that information on to us for no charge, glory or similar benefit other than the continued safety of the community and its members. You all are gentlemen (and gentlewomen perhaps) and scholars
/u/amidpowergames
1 points
7 months ago
I'm not calling you out or accusing you of anything but it's kinda peculiar that you've gone so long without knowing that javascript was still enabled. For a while now certain onion sites have been throwing up warning pop-ups upon visiting the site telling me and I assume anyone else if js was enabled and to go turn it off if so. I'm not a DW-aholic like some so I don't really visit all the markets or onion sites/services that are up and running at any given time to say which ones had/have the pop-up but I'm usually in one or two of the top 3 markets at least once a week and I've encountered the warning a handful of times until "about:config" was a part of the whole DW process for me.


I understand what you're saying, but if you had read all of HeadJanitor's posts, you would see that he educated me—and anyone else who read them—that although the Tor Browser indicates through the slider that JavaScript is turned off, it is not completely disabled. Essentially, it limits most of the main types of attacks, but it doesn't turn it off entirely. Therefore, it's best to go into 'about:config' on the Tor Browser and set 'javascript.enabled' to false.

So it's not just that I didn't educate myself about this until now; it's actually the Tor Browser itself that is trying to appeal to a broader audience rather than specifically to dark web users. Completely disabling JavaScript would mean that many websites used by "normal" Tor users wouldn't function properly. As HeadJanitor mentioned, only about 2.7% of users on Tor are currently accessing the dark web.

Not trying to be cheeky or anything please don't think i am, its great you want to know, most people don't ever even try to learn, but if you read all of my comments on this post, you'll see that I was expressing frustration that Tor claims JavaScript is completely turned off through the slider when, in reality, it is not fully disabled. I understand that the Tor Browser team is trying to cater to the majority of users rather than the small percentage who frequent the dark web.

Again, not accusing you of anything, I just find it odd that you didn't encounter one of those pop-ups at some point because I've been seeing them for a while now. I can't say exactly, due to my goldfish memory (don''t do drugs kids) but I want to say that it's been over a year, maybe closer to two since I first saw one. But either way, I'm glad that you now know how to check to make sure that it's off for sure.


Regarding your earlier comment, I agree that it would seem odd I didn't encounter one of those pop-ups sooner. I see them frequently because many websites that rely on JavaScript want us to provide our data, often without our knowledge. They typically do not go through the effort to ensure their sites work for users who have JavaScript disabled. However, it is true that JavaScript is necessary for many features on most websites today.
(But obviously javascript is needed for many/most of the features that most websites use nowadays

Also, thank you /u/HeadJanitor for the look outs. I don't think people realize how fucked we'd be without Dread and the time and effort that individuals such as yourself put into finding these potential security threats and then passing that information on to us for no charge, glory or similar benefit other than the continued safety of the community and its members. You all are gentlemen (and gentlewomen perhaps) and scholars

100% i second this, he is the Messiah of the darkweb :P
/u/amidpowergames
3 points
7 months ago

1
Awards Received
Doge
1
Tor is not designed for the darknet user. Which is why JavaScript is enabled, for example. It is designed for individual privacy and, of course, for their browser to be fully functional. Not necessarily for the depths of anonymity we, the micro minority, seek.


Poetry
/u/grogger
2 points
7 months ago
thanks sexy
/u/Netwerk P
3 points
7 months ago
Great post, as always.
Thank you, ace.