Tor master race general

  • 🏰 The Fediverse is up. If you know, you know.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
I hate that I can't react to messages on the Android Tor Browser, as hovering just tries to open it in a new tab. All I can do is :like:
 
Plug-ins change your browser fingerprint and let threat actors deanonymize you from other TB users. You could get away with uBlock origin since it's already integrated into TailsOS, but that's it.
You're supposed to use TOR in the default window size and not maximize or change it.
 
Things seem to work normal on basic ass Safari and the Orbot VPN.
I never got the dedicated TOR mobile browsers to work with xenforo, they are to locked down.
 
Regardless of extensions, there's a very trivial attack vector where sites can see if you've been browsing KF. Just need to see if Null's font is stored in the RAM cache of your browser.

I don't think that's possible, at least not with Tor Browser, due to:

Mozilla Web Docs - State Partitioning
State Partitioning is a different approach to preventing cross-site tracking. Rather than block access to certain stateful APIs in a third-party context, Firefox provides embedded resources with a separate storage bucket for every top-level website. More specifically, Firefox double-keys all client-side state by the origin of the resource being loaded and by the top-level site. In most instances, the top-level site is the scheme and eTLD+1 of the top-level page being visited by the user.
emphasis mine
 
I've noticed KF on TOR seems to work better depending on the time of day and/or circiut that's being used. This is just an example of my perspective in EST (Eastern Standard Time)
  • Morning is fine-ish. I may have to hit the "new circiut" button once or twice but otherwise i can connect and post.
  • Afternoon is completely fucked. KF seems to run better if I'm using non-US IPs (including the guard one), but otherwise the biggest issues are the images/videos that just fail to load and hang the site for-fucking-ever
  • Night time is the most pleasant experience. It's currently 9:20PM now and it's like I'm back on the clearnet.
 
I'm happy for Null and the Farms that clearnet sneeding has been restored. However I'll continue to sneed on Tor for the foreseeable future.

For a start, it's only a matter of hours until Dong Gone attacks sneed.today (if he hasn't started already). Those of us in the Tor Kool Kids Klub probably won't even notice when that happens.

Then there's the issue of sneeding too much. Being forced onto Tor has made it less convenient for me to get onto the Farms, and tbh it's probably not a bad thing.
 
I use a browser setup that thoroughly breaks all the Tor Project guidelines, but I believe is sufficient enough to access Kiwi Farms, a Clearnet website stuck on Tor due to networking level censorship where Tor is only used as a mean of completing the network circuit. The only drawbacks it has is that it's not as easy to create a new Tor circuit, besides that it integrates seamlessly in my everyday browsing.
Same here. With this you're basically trading in additional anonymity that comes with using Tor Browser (which is OK as long as you use it only for KF) for convenience (things like working Youtube links without Google fucking you in the ass with endless captchas, the ability to open KF on Tor right next to your clearnet links, etc.) and lower resource usage (compare running a whole separate browser to running a background service).

There is also a way to make Tor service run with obfs4 bridges, should the need arise. I wrote a guide on how to do that here.
 
Go full autismo and remember the IDs for the most important reactions, then change them in the URL. Been there done that.
I did something similar with the Mark Forums Read button by fucking around with the timestamp, so now everything is marked as read permanently.
 
Potential retard here. I've been using mobile Tor since the dropkiwifarms bullshit necessitated it and I'm wondering how you react to posts beyond the basic like. In the Tor browser, holding down on "like" opens the browser "open link.." menu rather than letting the reaction selector appear.
 
Tor always was a slow POS for me, it never worked right, no matter how much i tried.
 
I really hope that this Xitter post isn‘t the foreshadowing of the total pozzification of Tor:

IMG_2422.jpeg

That‘s not an April Fool‘s joke on my part.

Source: https://x.com/torproject/status/1774528151412236566 | Archive: https://archive.is/JM1ku
 
agencies would just need to run enough tor nodes, I doubt that'd even be a big investment for a state actor. Run a tor relay, if you can.

I feel how modern browsers work it's almost imposible to keep a unique fingerprint anyways. I solve this problem for myself by having a "private" browser connecting via a very specific connection in a network namespace that can't leak doing my private stuff in where I'm being careful about my real identity, and having a completely different browser with different profile via my home network connection I use for everything connected to my real identity. This is convenient (no privacy measures in the "normie" browser means shops/banks etc. not freaking out) and I think keeps me anonymous enough. Even more ideal would be to run the normie browser on a different computer with a different OS, but my threat model doesn't really have that requirement.
 
I feel how modern browsers work it's almost imposible to keep a unique fingerprint anyways. I solve this problem for myself by having a "private" browser connecting via a very specific connection in a network namespace that can't leak doing my private stuff in where I'm being careful about my real identity, and having a completely different browser with different profile via my home network connection I use for everything connected to my real identity. This is convenient (no privacy measures in the "normie" browser means shops/banks etc. not freaking out) and I think keeps me anonymous enough. Even more ideal would be to run the normie browser on a different computer with a different OS, but my threat model doesn't really have that requirement.
Textual analysis would take you down regardless.
 
Back
Top Bottom