Feedback Technical Grievances

I might be late but Brave has blocked the .onion site. Only accessible for me through Tor browser and it took a good while.

View attachment 3689880
You're trying to view a onion site via clearnet instead of Tor. That Tor box next to the URL is just a link to open it in Brave Tor.

If you're using Brave Tor, it should clearly say Tor on the right where the sunglasses icon is.

It work on my Brave TOR Linux PC and i have the latest version.
Brave on Android "don´t have" TOR so please use: https://www.torproject.org/download/#android or IOS https://onionbrowser.com/

If this would be true CIA/FBI and INTERPOL ETC.. would like to now how brave did it so they can stop wasting resources when they are targeting black-markets sites on the darkweb.
The "only" way to block a onion address for awhile is to try and DDoS it or find where the hardware(server) is and pull the plug
 
Well in any case, TOR seems stable for the time being (though the bot check screen can get a little annoying at times). Is there a way to refresh the cache without exiting? I'm missing some sticker visibility. :(
Seconded. The constant "open source bot protection" and the fucking login captcha keeps ruining the site for me to the point I don't want to bother with it for a while. I know Null has to take these measures because of the splatroons but good God is it annoying!
 
Well in any case, TOR seems stable for the time being (though the bot check screen can get a little annoying at times). Is there a way to refresh the cache without exiting? I'm missing some sticker visibility. :(
What do you mean "refresh the cache"? The Tor window on Brave is a private one (without autocomplete too I think), so it clears cookies on exit, hence the need to relog. Today Tor seems to be working well, it's even usable for images and I got no captcha for logging in, which is a relief, yesterday I think I selected a hundred crosswalks, traffic lights and bikes.
 
What do you mean "refresh the cache"? The Tor window on Brave is a private one (without autocomplete too I think), so it clears cookies on exit, hence the need to relog. Today Tor seems to be working well, it's even usable for images and I got no captcha for logging in, which is a relief, yesterday I think I selected a hundred crosswalks, traffic lights and bikes.
Cache and cookies aren't the same thing. In any case, I've tweaked a TOR setting so I'll see what happens when I close the browser today.
 
  • Like
Reactions: AgendaPoster
The robot check is annoying as fuck. I get that it's necessary, but does it really need to be so frequent? I wasn't a robot five minutes ago, I'm still not a robot.

Either that or have the AJAX requests do the proof-of-work and load successfully instead of just erroring out and requiring a page reload. Speaking of which...
 
The robot check is annoying as fuck. I get that it's necessary, but does it really need to be so frequent? I wasn't a robot five minutes ago, I'm still not a robot.

Either that or have the AJAX requests do the proof-of-work and load successfully instead of just erroring out and requiring a page reload. Speaking of which...
I think the bucket timeout is too low, it should be set higher.

Fixing AJAX requests is a lot of work, but there's things the protection could do on their end. (e.g. if it could automatically migrate cookies from one epoch to the next)

I guess there could be an hack where you create an iframe, point it to a blank page with the protection, and set auto-refresh (either JS, HTML, or HTTP). This would do the PoW in the background as soon as the epoch changes, rather than once you click.
 
I wasn't a robot five minutes ago, I'm still not a robot.
What black magic is this? That shit seems to hit me every 2-3 page loads. Catching up on busier threads is making me all nostalgic. It's like the heady days of the young internet. Its like a shitty ADSL connection right out of 2003. That said, when the robot check is done, the site is pretty danged snappy.
 
  • Like
Reactions: Autistic Joe
Fixing AJAX requests is a lot of work, but there's things the protection could do on their end. (e.g. if it could automatically migrate cookies from one epoch to the next)

I guess there could be an hack where you create an iframe, point it to a blank page with the protection, and set auto-refresh (either JS, HTML, or HTTP). This would do the PoW in the background as soon as the epoch changes, rather than once you click.
That'd probably be a decent solution actually. Detect that the AJAX failed because of the bot check, do the invisible iframe thing, and then re-attempt the AJAX request. But yeah, the timeout seems to be set stupid low.
 
That'd probably be a decent solution actually. Detect that the AJAX failed because of the bot check, do the invisible iframe thing, and then re-attempt the AJAX request. But yeah, the timeout seems to be set stupid low.
Detecting that the AJAX failed is gonna be annoying, easier to just poll in an iframe every 10 minutes or so.

Also would alleviate this if it'd migrate tokens (if your token is valid for epoch n-1, issue a new one for epoch n) instead of making you redo the PoW.
 
Detecting that the AJAX failed is gonna be annoying, easier to just poll in an iframe every 10 minutes or so.
Hardly. It already does, check the JS console when it tells you that an error occurred.

If automatically re-attempting the AJAX afterward is too much work, at least do the iframe and have the error message say something like "security timeout occurred, please re-try."
 
  • Like
Reactions: good pussy
If automatically re-attempting the AJAX afterward is too much work, at least do the iframe and have the error message say something like "security timeout occurred, please re-try."
He's probably not going to put much effort into fixing things before finalizing what's actually getting used.
 
He's probably not going to put much effort into fixing things before finalizing what's actually getting used.
Fair enough. I don't know how much permanence this robot check is going to have, I was under the impression that it's going to be in place from now onward unless it becomes unworkable for some reason.
 
Fair enough. I don't know how much permanence this robot check is going to have, I was under the impression that it's going to be in place from now onward unless it becomes unworkable for some reason.
It seems like it should be pretty easy to break so I'd be surprised if it's permanent without fixing some of the problems people have pointed out.
 
The .top domain seems to have a "server not found" error even on phones.
 

It's really driving me crazy that I can't edit my posts after what I think is 24 hours. That should be extended to 48 hours IMHO. And now, I can't hit reply or quote on my own posts, so I'm locked out of the BB code for it, unless I saved a backup. That wasn't the case yesterday. On top of all the problems due to enemies of free speech, that's more stuff that's not frustration free, or user friendly. (/whinge)

Like many things of this nature, revisions happen, and I now have a third revision that should be much easier... just extract the folder, put it anywhere, and run an .exe.

Here it is, revision 3:

-------------------------

This is not best practice (which is to use Tor Browser), but here's how you can use Tor in any browser (or any application that allows configuration of a SOCKS5 proxy):

People no longer remember Vidalia, the front end for Tor! (They dropped support for it about a decade ago.) It STILL WORKS!

(I think they dropped it because it too easily allows users to make anything that has a proxy setting work with Tor, such as Bittorrent clients, and they're trying to ease the bandwidth from shit like that on the Tor network. A torrent download via Tor is going to be extremely slow, you should use a VPN for that.)

So, download this: https://mega.nz/file/Xwo3yTrT#Yk9nEl6HdJp3Dn_WXOQaqnw-xEy64aewcl2BG2NSMaA

Unzip it, there is a folder "Tor." That can be placed anywhere you like, such as C:\Tor. I did mine in C:\Program Files (x86)\Tor.

Run Tor 0.4.7.10 - Vidalia 0.2.21.exe. (You can run the executables in the Tor folder through Virus Total if you're not comfortable... you really should actually, it's best practice, as I could be a mole trying to hit you with malware. I send pretty much all .exe's I get online through there before running them.)

Let it go through the progress bar and fully connect.

That's it. Tor is now running, and you now have a configurable front end for Tor!

Because it's so old, Vidalia is not going to have some of Tor's newer features incorporated directly into its front end, but all the base stuff is there. If you go to Settings -> Advanced, it will show the "ControlPort" as 9051, but you actually need to point any application you want to use with Tor to port 9050, as a SOCKS5 proxy. (Tor uses SOCKS5 on port 9050/9051 locally.) If you know what you are doing, you can edit Data\torrc in a text editor to put in advanced configurations. You need to exit Vidalia before you do this. (Don't use the "Settings" -> "Advanced" -> "Edit current torrc" button in Vidalia... that can be used to view torrc, but if you try to edit and click "OK", you will get an error and it won't save; this is a bug in Vidalia that was never fixed.)

You can right click the Vidalia system tray icon and select "New Identity" to change your current Tor IP.

Try right clicking the Vidalia system tray icon and selecting "Network Map". You can view all the Tor nodes on the Network. You can't really do anything in here, it's just interesting. ;)

I advise right clicking the Tor 0.4.7.10 - Vidalia 0.2.21.exe file in the Tor folder and doing "Create shortcut", then moving the shortcut to the Desktop, the start bar, or wherever you place your Windows shortcuts.


Instead of using your browser's default proxy settings, I recommend browser add-ons for proxy configuration. This will make it so you can use your normal clearnet connection for all sites except for .onion sites, which will route through Tor. This is especially useful if you're browsing an .onion site and there are for example YouTube videos that play from YouTube. The YouTube videos will play from your normal clearnet connection, which will greatly speed things up. (In Tor Browser, everything goes through Tor. That's what you should really use if privacy and anonymity are your top concern.)

For Firefox, use FoxyProxy.

Click "Add," then configure it like this:

foxyproxy1.jpg


Save it, then click "Patterns" next to the "Onion" entry you saved, then configure it like this:

foxyproxy2.jpg


Save it.

So now, in normal Firefox, you just need to run Vidalia (Tor 0.4.7.10 - Vidalia 0.2.21.exe), wait for it to connect, then any .onion address in Firefox will load through Tor, as long as you have the FoxyProxy icon's menu set to "Use Enabled Proxies By Patterns and Order." If you want, you can click the FoxyProxy icon and select "Onion" (or whatever you named the connection), then, everything will go through Tor.

For Chrome/Chromium, use SwitchyOmega. (Just a note here and it doesn't apply to this, Chrome/Chromium doesn't support SOCKS proxies that require a login. I've no idea why Chrome devs never got around to adding this, as it's been requested for years.)

Click "New Profile" then type a name such as "Tor", then configure it like this (here I got wordy and called it "Onion / Tor (port 9050)":

SwitchyOmega1.jpg


Click "Apply Changes," then click on "Auto Switch", click "Add Condition," then configure it like this (down on the bottom... yours will be on top if you've just installed this):

SwitchyOmega2.jpg


Click "Apply Changes."

You now have the same thing for Chrome... run Vidalia, make sure SwitchyOmega's icon is set to "auto switch", then your main Chrome browser will go through Tor for any .onion address. If you want everything to go through Tor, click the SwitchyOmega icon and select "Onion / Tor (port 9050)" (or whatever you named the connection).


If Tor is updated, download TorBrowser, run the .exe installer and point it to any folder you want (it's portable so all files go into this one folder). So if you installed (extracted) it to C:\Tor Browser, go to C:\Tor Browser\Browser\TorBrowser\Tor. Copy the contents of that folder, and paste them into the folder where you have Vidalia. I usually back up my folder with Vidalia before pasting a new version of Tor. So far, they've always worked with Vidalia.

By the way... if a browser or application does not have a SOCKS5 (or any) proxy setting, you can use a program called Proxifier to get around that. ;)
 
Last edited:
Back