Review: Tor Browser Bundle lets you browse in anonymity …

If you want to beef up and anonymize your Internet browsing experience as well, Tor Browser Bundle (free) is the way to go. The Tor network provides a way to browse anonymously.

The Tor Browser Bundle is a portable, self-extracting package which contains a special version of Firefox, along with an application for connecting to Tor. You extract the bundle, and double-click "Start Tor Browser." A connection window comes up and steps through an initialization sequence. You don't have to do anything; just wait a moment while the progress bar fills up. As soon as a secure connection with Tor is established, Firefox loads and you can start browsing.

When you connect to Tor, all of your Internet traffic is encrypted and routed through a complex network of anonymous nodes until it reaches its final destination. It's not 100% secure, but then again, no security solution is. Tor has been around since 2002, and has been field-tested in rough situations in Egypt and other oppressive regimes that restrict Internet access. It works.

Since Tor routes your data through so many layers and random endpoints, it's not exactly blazing fast. Then again, most of us don't require Tor as a necessary part of our daily browsing routines. For occasional use, it's an elegant solution that simplifies a complex security system down to a double-click.

Note: The Download button on the Product Information page takes you to the vendor's site, where you can download the latest version of the software. This file is donationware; it is free to use, but the developer welcomes donations toward future development.

View original post here:

Review: Tor Browser Bundle lets you browse in anonymity ...

Tor Browser – Problem Connecting?

So this is odd - i've been using TOR Browser for a while now with no issue, but then tonight I tried to connect and I get the following error message -

"Firefox can't establish a connection to the server at check.torproject.org."

I haven't changed any settings, and my log file contains the following:

Mar 07 00:41:46.678 [Notice] Tor v0.2.3.25 (git-17c24b3118224d65) running on Windows 7. Mar 07 00:41:46.678 [Notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning Mar 07 00:41:46.678 [Notice] Read configuration file "C:UsersMyNameDesktopTor BrowserDataTortorrc". Mar 07 00:41:46.678 [Notice] Initialized libevent version 2.0.21-stable using method win32. Good. Mar 07 00:41:46.678 [Notice] Opening Socks listener on 127.0.0.1:9150 Mar 07 00:41:46.678 [Notice] Opening Control listener on 127.0.0.1:9151 Mar 07 00:41:46.791 [Notice] Parsing GEOIP file .DataTorgeoip. Mar 07 00:41:49.461 [Notice] No AES engine found; using AES_* functions. Mar 07 00:41:49.461 [Notice] This OpenSSL has a good implementation of counter mode; using it. Mar 07 00:41:49.461 [Notice] OpenSSL OpenSSL 1.0.0k 5 Feb 2013 looks like version 0.9.8m or later; I will try SSL_OP to enable renegotiation Mar 07 00:41:49.461 [Notice] Reloaded microdescriptor cache. Found 3175 descriptors. Mar 07 00:41:49.461 [Notice] We now have enough directory information to build circuits. Mar 07 00:41:49.461 [Notice] Bootstrapped 80%: Connecting to the Tor network. Mar 07 00:41:49.461 [Notice] New control connection opened. Mar 07 00:41:50.328 [Notice] Heartbeat: Tor's uptime is 0:00 hours, with 1 circuits open. I've sent 0 kB and received 0 kB. Mar 07 00:41:50.440 [Notice] Bootstrapped 85%: Finishing handshake with first hop. Mar 07 00:41:51.546 [Notice] Bootstrapped 90%: Establishing a Tor circuit. Mar 07 00:41:52.319 [Notice] Tor has successfully opened a circuit. Looks like client functionality is working. Mar 07 00:41:52.319 [Notice] Bootstrapped 100%: Done.

I'm not finding much help online - what could be the problem?

More here:

Tor Browser - Problem Connecting?

Softonic – Tor Browser – Download

Preserving your privacy on the net is no easy task nowadays with so many security risks and potential prowlers out there.

Tor Browser is a toolset that's designed for anyone who wants to improve their safety and security on the Internet. It can help you anonymize web browsing and publishing, instant messaging, and other applications that use the TCP protocol. For business users, it means that confidential exchanges of information can be kept from prying eyes and for more general users, it means that ISPs, keyloggers and other types of malware can't track your activities easily.

It works by bouncing traffic around a distributed network of servers which it calls "onion routers" (hence the logo). The Tor Browser interface allows you to easily toggle it on and off based on when you need to go online anonymously - there's no need to restart your computer when you've done so. If you want, you can also choose from various proxy tunnels based on a world map which displays exactly where each one is located.

To check it's working, you can use the online "Tor detector" to see if you're surfing anonymously or not. Connection can take some time depending on how many users are logged onto the network at any one time but usually its very quick. The Tor onion logo turns from yellow to green in your taskbar when a successful connection has been made.

Tor is simple, well organized and effective tool for anyone worried about security or invasions of privacy online.

See the original post:

Softonic - Tor Browser - Download

What is the Tor Browser? – Tor Project: Anonymity Online

Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk.

Click Install (3) Wait until the installer finishes. This may take a few minutes to complete.

Once the installation is complete, click Finish to launch Tor Browser's wizard.

Once you see Tor Browser's wizard click Connect

Alternatively, you can launch Tor Browser by going to the folder Tor Browser which can be found at the location you saved the bundle at (Default: Desktop) and double click on the Start Tor Browser application.

Once Tor is ready, Tor Browser will automatically be opened. Only web pages visited through Tor Browser will be sent via Tor. Other web browsers such as Internet Explorer are not affected.

Once you are finished browsing, close any open Tor Browser windows by clicking on the (6). For privacy reasons, the list of web pages you visited and any cookies will be deleted.

Continue reading here:

What is the Tor Browser? - Tor Project: Anonymity Online

Federal Cybersecurity Director Found Guilty on Child Porn Charges

As the acting cybersecurity chief of a federal agency, Timothy DeFoggi should have been well versed in the digital footprints users leave behind online when they visit web sites and download images.

But DeFoggiconvicted today in Nebraska on three child porn charges including conspiracy to solicit and distribute child pornmust have believed his use of the Tor anonymizing network shielded him from federal investigators.

Hes the sixth suspect to make this mistake in Operation Torpedo, an FBI operation that targeted three Tor-based child porn sites and that used controversial methods to unmask anonymized users.

But DeFoggis conviction is perhaps more surprising than others owing to the fact that he worked at one time as the acting cybersecurity director of the U.S. Department of Health and Human Services. DeFoggi worked for the department from 2008 until January this year. A department official told Business Insider that DeFoggi worked in the office of the assistant secretary for administration as lead IT specialist but a government budget document for the department from this year (.pdf) identifies a Tim DeFoggi as head of OS IT security operations, reporting to the departments chief information security officer.

The porn sites hes accused of usingincluding one called PedoBookwere hosted on servers in Nebraska and run by Aaron McGrath, who has already been convicted for his role in the sites. The sites operated as Tor hidden servicessites that have special .onion URLs and that cannot normally be traced to the physical location where they are hosted.

Although anyone could use the sites, registered users like DeFoggiwho was known online under the user names fuckchrist and PTasseatercould set up profile pages with an avatar, often child porn images, and personal information and upload files. The site archived more than 100 videos and more than 17,000 child porn and child erotica images, many of them depicting infants and toddlers being sexually abused by adults.

The FBI seized the sites in late 2012, after McGrath failed to secure his administrative account with a password. Agents were able to log in and uncover the IP address of the Nebraska server where he was hosting two of them. McGrath worked at the server farm, and hosted the third site from his home. The FBI monitored him for a year and after arresting him in November 2012 continued to operate his child porn sites secretly from a federal facility in Omaha for several weeks before shutting them down. During this time, they monitored the private communications of DeFoggi and others and engaged in various investigative techniquesto defeat the anonymous browsing technology afford by the Tor network and identify the real IP addresses of users.

These techniques successfully revealed the true IP addresses of approximately 25 domestic users who accessed the sites (a small handful of domestic suspects were identified through other means, and numerous foreign-based suspect IPs were also identified), prosecutors wrote in a court document. In March 2013, twenty suspects were indicted in Nebraska; followed by two others who were indicted the following August.

One of these techniques involved drive-by downloads that infected the computers of anyone who visited McGraths web sites. The FBI has been using malicious downloads in this way since 2002, but focused on targeting users of Tor-based sites only in the last two years.

Tor is free software that lets users surf the web anonymously. Using the Tor browser, the traffic of users is encrypted and bounced through a network of computers hosted by volunteers around the world before it arrives at its destination, thus masking the IP address from which the visitor originates.

View original post here:

Federal Cybersecurity Director Found Guilty on Child Porn Charges

Cybersecurity official uses Tor but still gets caught with child porn

The former acting cybersecurity director for the US Department of Health and Human Services, Tim DeFoggi, was convicted yesterday on three child porn charges.

As reported byWired,DeFoggi is the sixth suspect to be caught by the FBI's Operation Torpedo, which used controversial methods of defeating the Tor anonymizing software in order to find child porn suspects.

One site frequented byDeFoggi wasPedoBook, hosted by Aaron McGratha Nebraska man who was convicted earlier for his role in the operations. The websites were only accessible to users who installed Tor on their browsers. DeFoggi used names such as "fuckchrist" and "PTasseater"to register on thesites, where he could view more than 100 videos and more than 17,000 child porn images.

The FBI seized McGrath's site in late 2012 after monitoring him for a year. Then they kept it up and running for several more weeks, gathering private communications from DeFoggi and other users. The FBI used "various investigative techniques to defeat the anonymous browsing technology afforded by the Tor network."

The techniques used include "drive-by downloads," in which a website installs malware on every visitor's computer.

Such a deployment "can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computers name and address, and then evaporates," explained Wired in an earlier piece on Operation Torpedo.

Having set up such atrap, FBI agents got to know DeFoggi better. Wired's Kim Zetter explains:

During chats DeFoggi described using Tor to access PedoBook early in the morning hours and between 4 and 6 pm. Among the evidence seized against him was pen register/trap trace data obtained from Verizon showing someone at his Maryland residence using Tor during these hours as well as the IP addresses used by an AOL account under the username ptasseater, which pointed to DeFoggis home.

When agents arrived at his home early one morning to execute a search warrant, they had to pry him from his laptop, which was in the process of downloading a child porn video from a Tor web site called OPVA, or Onion Pedo Video Archive. In addition to child porn images stored on his computer, authorities also found evidence of his Tor browser history, showing some of his activity at PedoBook and OPVA.

DeFoggi worked for the Department of Health and Human Services from 2008 until January of this year. He's scheduled to be sentenced in November.

Read the original:

Cybersecurity official uses Tor but still gets caught with child porn

Free App Lets the Next Snowden Send Big Files Securely and Anonymously

Onionshare creator Micah Lee, who works as a staff technologist and crypto guru for Glenn Greenwalds news site The Intercept. Image: Courtesy of Micah Lee

When Glenn Greenwald discovered last year that some of the NSA documents hed received from Edward Snowden had been corrupted, he needed to retrieve copies from fellow journalist Laura Poitras in Berlin. They decided the safest way to transfer the sizable cache was to use a USB drive carried by hand to Greenwalds home in Brazil. As a result, Greenwalds partner David Miranda was detained at Heathrow, searched, and questioned for nine hours.

Thats exactly the sort of ordeal Micah Lee, the staff technologist and resident crypto expert at Greenwalds investigative news site The Intercept, hopes to render obsolete. On Tuesday he released Onionsharesimple, free software designed to let anyone send files securely and anonymously. After reading about Greenwalds file transfer problem in Greenwalds new book, Lee created the program as a way of sharing big data dumps via a direct channel encrypted and protected by the anonymity software Tor, making it far more difficult for eavesdroppers to determine who is sending what to whom.

If you use a filesharing service like Dropbox or Mega or whatever, you basically have to trust them. The file could end up in the hands of law enforcement, Lee says. This lets you bypass all third parties, so that the file goes from one person to another over the Tor network completely anonymously.

Its basically 100 percent darknet.

When Onionshare users want to send files, the program creates a password-protected, temporary website hosted on the Tor networkwhats known as a Tor Hidden Servicethat runs on their computer. They provide the recipient with the URL and password for that site, preferably via a message encrypted with a tool like PGP or Off-The-Record encrypted instant messaging. The recipient visits that URL in a Tor Browser and downloads the file from that temporary, untraceable website, without needing to have a copy of Onionshare.

As soon as the person has downloaded the file, you can just cancel the web server and the file is no longer accessible to anyone, Lee says.

Lee hopes to have others examine Onionshares code to suss out flaws. For now it only runs as a bare-bones command-line tool on the Tor-based operating system Tails, which can be launched on Windows or Mac machines. He plans to add a version that runs directly on Windows and Mac computers soon.

Onionshare can be particularly useful when someone sending a file wants to remain anonymous even to the recipient, Lee says. If whistleblowers can securely send an Onionshare URL and password to a journalist, they potentially could use it to leak secrets anonymously without being exposed. That flips the model of how Tor enables leaks: Sites like WikiLeaks and news organizations using the anonymous leak software SecureDrop host their own Tor Hidden Services. Onionshare could put more power in whistleblowers hands, helping them send secrets to journalists who dont have that sort of anonymous submission system in place.

But Lee also sees Onionshare being used for more common file-sharing situations where everyone involved knows each other but require utmost secrecy. Its a safe bet that Greenwald and Miranda will be fans.

Read more:

Free App Lets the Next Snowden Send Big Files Securely and Anonymously

Tor Browser Free Download/Install|Free Latest Version|64/32 bit Windows|2014 – Video


Tor Browser Free Download/Install|Free Latest Version|64/32 bit Windows|2014
Tor browser is simple, well organized 64/32 bit download effective tool.Free Download Link:http://tor-browser.blogspot.com Tor browser is free tool for anyon...

By: Estonica Stephen

Read this article:

Tor Browser Free Download/Install|Free Latest Version|64/32 bit Windows|2014 - Video

working referral link to agora hidden market place -new url ( onion site ) – Video


working referral link to agora hidden market place -new url ( onion site )
hi folks . copy paste this to your TOR browser and make your own account http://agorahooawayyfoe.onion/register/uAcuJtUDGw here you are working referral link to agora hidden market place on...

By: golo pozo

Go here to read the rest:

working referral link to agora hidden market place -new url ( onion site ) - Video