Tor master race general

  • 🏰 The Fediverse is up. If you know, you know.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
we should be teaching people how to use tor
>teaching dumbasses how to use a web browser
If fucking TOR of all things is a learning curve for niggercattle, then the entire human race is fucked. What exactly is there to teach?
  • The browser connects to it's own network
  • You can browse regular links but also special onion links that are longer than the regular links
  • The browser functions like Firefox so you can add addons if you like
WOW, reeeeeeelly hard u guise!!!
 
There comes a point where you can't just make things any easier without compromising quality.

God helps those who help themselves. If you won't even put the most basic of effort into something maybe you don't deserve it.
 
it is, because NoScriipt is shit, even though it's now baked into the browser

Also not all websites have the option for dark mode.

No it isn't.

The Tor Foundation said:
the only add-ons that have been tested for use with Tor Browser are those included by default. Installing any other browser add-ons may break functionality in Tor Browser or cause more serious problems that affect your privacy and security. It is strongly discouraged to install additional add-ons.

Plug-ins change your browser fingerprint and let threat actors deanonymize you from other TB users. You could get away with uBlock origin since it's already integrated into TailsOS, but that's it.
 
You could get away with uBlock origin
Which is superior to NoScript

NoScript, even after it's overhaul, still lacks controls for cookies, CSS, and images, essentially allowing a bunch of Trojans. There's also this (a)

if TOR actually gave a shit, they would have removed it and not force it into the browser... the same browser that still has Mozilla affiliations in their about:networking settings that you need a script to turn off, and even that get's reverted after each update. That's not even mentioning the other wierd shit they've done behind the scenes.

Just because TOR says one thing doesn't mean it's fact/true
 
Last edited:
NoScript, even after it's overhaul, still lacks controls for cookies, CSS, and images, essentially allowing a bunch of Trojans.


Yeah micromanaging that stuff changes your browser fingerprint and helps threat actors track you by comparing your unique browser environment to other users. If you don't like the cookies then restart the browser and they'll get cleared. How do I infect a computer with a Trojan using css?

the same browser that still has Mozilla affiliations in their about:networking settings

Are you saying the Mozilla Firefox fork is affiliated with Mozilla?

that you need a script to turn off, and even that get's reverted after each update.

Is this some big privacy threat that hasn't been fixed since December 2021?

That's not even mentioning the other wierd shit they've done behind the scenes.

Just because TOR says one thing doesn't mean it's fact/true

Okay how does all this make it a good idea to put dark mode extensions on Tor? What Firefox extensions do I need to install on tor browser to make it safe from the sussy tor project trannies again?
 
I use a browser setup that thoroughly breaks all the Tor Project guidelines, but I believe is sufficient enough to access Kiwi Farms, a Clearnet website stuck on Tor due to networking level censorship where Tor is only used as a mean of completing the network circuit. The only drawbacks it has is that it's not as easy to create a new Tor circuit, besides that it integrates seamlessly in my everyday browsing.
Thanks for writing this up! This is much more convenient than using Tor Browser or opening a Tor window in Brave. No more having to copy and paste links into Brave to avoid lengthy CAPTCHAs. The only extra Brave specific step I had to take was disabling 'Private window with Tor' in settings.
 
Okay how does all this make it a good idea to put dark mode extensions on Tor? What Firefox extensions do I need to install on tor browser to make it safe from the sussy tor project trannies again?
I wish I could find the Reddit post again where some dude listed all the privacy boosting extensions he hooptied onto TOR Browser (he had like nine of them.)

Congratulations you're uniquely identifiable AND it's tied to your Reddit username! Great job!

Use TOR Browser. Do not install extensions. Do not visit any sites other than KF on TOR Browser. Congrats you're now anonymous. Swim with the other fish and you won't get caught.
 
the big question is why should i care about my browser fingerprint when i only ever visit kiwifarms, and why wasnt this a problem before it being on tor? before tor most of us had plugin and had browser's which could be fingerprinted yet non of you autistis were this upset by it. i get it, we are on tor, but if all you do is sneed on KF then it doesnt matter if your browser is fingerprinted. all those guides on what not to do on tor are designed for chomos and dissidents trying to not be found by the feds.

if all you do is sneed on KF then install all the plugins you want, nobody cares outside trannies that you are here. and if you practice decent opsecs then you are good, trannies arnt fingerprinting your browser,so just dont PL yourself and you'll be okay.
 
>teaching dumbasses how to use a web browser
If fucking TOR of all things is a learning curve for niggercattle, then the entire human race is fucked. What exactly is there to teach?
  • The browser connects to it's own network
  • You can browse regular links but also special onion links that are longer than the regular links
  • The browser functions like Firefox so you can add addons if you like
WOW, reeeeeeelly hard u guise!!!

I don't git either.
just Download it and clink install. if you can install Firefox you can install tor.
 
the big question is why should i care about my browser fingerprint when i only ever visit kiwifarms
I agree, if you're in a country that isn't very hostile against speech, feel free to copy the Tor folder, rename it "KIWI BROWSER", use it in full screen, and load it up with whatever extensions.
yet non of you autistis were this upset by it
We were tho.
 
I learned something new from a Tor circuit today: Encyclopedia Dramatica is banned in Germany but the farms isn't. Either that or they don't allow German traffic.

Also, now that the Farms seems be be working decently on Tor I think I'm just going to continue to access it permanently this way even after we get back on the clear net. Nothing wrong with an extra security precaution imho
 
It doesn't. But people in this thread are not doing that.

Regardless of extensions, there's a very trivial attack vector where sites can see if you've been browsing KF. Just need to see if Null's font is stored in the RAM cache of your browser.
If literally all they're doing is KF stuff, then fingerprinting doesn't matter because the only observer capable of seeing that you're clearly the same browser that was on KF is KF itself.

On the less literal level, if KF is the only thing bringing them to Tor, but they're also using normal sites with the same setup, then the question is if they care about Alphabet or Twitter or whoever recognizing that you've at some point gone to KF. I'd dare say most of us don't particularly care. Most people around here probably happily queried some DNS about the IP for KF back when it was on the clearnet. Lets just go ask 8.8.8.8 where kiwifarms is and then try to make sure that youtube can't tell you've been to kiwifarms.

I'd leave the paranoia for the people who are actually engaging with the so-called canaries in the coal mine: The parts of Tor that stand testament to the protocol working in general: The hardcore illegal stuff and/or money making parts. Yeah, for people dealing with that stuff, they should follow a decent number of guidelines about assorted things. I'll give a really good piece of advice for them right here: Do not post on KF using the same setup you use for any of that stuff. This is a forum based primarily around posting quantities of text: forget about the maybes of browser fingerprinting and remember that intel agencies have been taking forensic linguistics seriously for decades. Most people betray their nation of origin and possibly a much smaller region in very short order just by virtue of regionalized words and phrases.

Fingerprinting browsers is a lot like using a unique username-- it only connects the multitude of different data sources into one. The data within those sources needs to then add together into the problem data before you have to be worried. So with that in mind, if you are doing seriously bad stuff that might actually get you pursued: Just go paranoid and assume your browser/OS is fingerprinted and that every site you go to with the setup you use for illegal things are all cooperating to try to figure you out. Just like that the problem is solved: Do all your other activity from a completely different OS/browser setup. Hell, if you're both a paedo and a crack dealer, maybe get two different setups to keep those things separate. Sell your crack on your archlinux laptop set up with Tor using the coffee shop's wifi, collect your 7 terabytes of badly composed tween selfies on your perfectly standard tails install using your neighbor's wifi, and visit KF on your out of date windows 10 using brave browser tor window on your employer's wifi. Bish, Bash, Bosh.

I honestly think trying to avoid fingerprinting using the blend-in-with-the-crowd methodology is bad form anyways, basically adjacent to security-through-obscurity. It is valuable only in no risk situations and should never be actively relied on. It is more proper to use notably different fingerprints in different contexts to ensure that the profiles cannot be matched.
 
Tell you the truth I'm suffering under Tor, on PC it's manageable (though the damn browser won't memorize the username and password) but on android it's just shit. Can't find the option in Brave to make a Tor tab, and the official Tor app has shit connection, sometimes will just refuse to reconnect unless you restart it, won't load attachments, will sometimes do crazy bugs during text insertion and can't make any reaction instead of Like.

I hope we'll eventually return to ClearNet because hiding away on (at least as far as I'm aware is) the darkweb just makes the data against the trannies harder to access.
 
(though the damn browser won't memorize the username and password)
You can just re-enable that in the browser settings. Allow persistent cookies for the Kiwi Farms domains and check the "save password/autofill password" options as you like.

I've been having connection problems with Tor on desktop lately (mobile seems better for whatever reason) but after Null's latest round of changes things seem to have improved.
 
Back
Top Bottom