>I do not know yet how to put my reply (our correspondence question-answer) to everyone on the TOR blog (different from the standard forum)? I'm afraid that something of my actions it is a bad - doing something wrong.? I do not want to impose your politeness, but could you please explain it to me, or paste the content in the right place? I think you are already at the right place here. As this is the general talk and tech mailing list for tor users, every other user subscribed to this list is already able to read your messages and reply if applicable. Please just leave the messages subject intact when replying to messages so the system can merge messages with the same subject or topic to a thread. There were some plans to improve the handling of requests for help like yours but I have absolutely no idea how far they have been implemented yet.
>Is it possible to add the number of intermediate nodes (it seems very dangerous when the end-country is my own) in two TOR settings to >4 or at least 3 ? As far as I know there is no such option, but this isn't necessary however. The Tor protocols design already assures that no of these three nodes is able to determine your identity completely. Please have a look at the following two sites below (1+2). The give you a deeper understanding how these nodes communicate with each other and why a fourth hop wouldn't provide that much more security or anonymity. >I will try to run old 2 or 4 core PC, and share it as TOR 24h Poland node. (speeds IPv6 250/50Mbps be enough?) Maybe someone will help >me to run this on free Linux (stable and maintenance-free working). That would be absolutely great, there are already a plenty of guides and how-tos available on the internet showing you how to setup a tor relay depending on your choice of operating systems. You can find some for debian / ubuntu below (3) >Nice to have you explained that this is not a browser issue just a "signature" node. Is there a way to change settings in the settings so >that the recipient does not see that the TOR is being used? No problem, you're welcome. When someone provides a tor node, the network needs to know whether this is a working tor node or not to send traffic from other users connections to it. Therefore its always possible to lookup a "list" of computers which are providing a relay for other tor users. These lists are automatically generated and publicly available. Some website operators filter requests coming from these nodes mostly for unreasonable reasons. Obviously they distrust users of Tor or have been facing a high level of misuse coming from Tor nodes in the past. Again, as far as I know there's nothing you can do about it. >Thank you, I read. Does anyone in TOR are really interested in Kaspersky LAB and whether (eg. Kaspersky Internet Security 2017 PC >version) it not threatens to expose IP (un hidden) when using TOR worked at Windows 7,8,10??? I don't think so. Also, this is not the exact area Tor works on. While Kaspersky software tries to secure a single computer / endpoint from viruses and trojans, Tor is a network providing anonymity to its users. This is a little bit like you would compare apples and oranges ;) >Assuming that I use only secure pages, is not it safe to disable protection and then shut down KIS? I give up the protection of files and >additionally I lose the useful option 1) effective "firewall" blocking telemetry and other spy sites (using svchost and raw RAW to retrieve >information type whois, my location, markmonitor, etc.), 2) "Surfing Incognito" , 3) "Blocking banners". The question is worth it? I'm not fully aware what you exactly mean. I think for every approach you listed, there are better solutions than Kaspersky but this is only my humble opinion. Due to the fact that the Tor Browser Bundle includes NoScript, a huge amount of scripts who may load banners or other ads is already deactivated (and becomes active only if you manually enable them). Also, the Tor Browser is in the 'Incognito' or 'Private-Browsing' mode permanently. If you are able to evaluate which types of links / websites / scripts and files you download may be a danger to your computer, you don't need a AV solution like Kaspersky necessarily. Best regards, Andre (1) What protections does Tor provide? https://www.torproject.org/docs/faq.html.en#WhatProtectionsDoesTorProvide (2) The solution: Distributed, anonymous network https://www.torproject.org/about/overview#thesolution (3) Tor Project: Debian / Ubuntu instructions https://www.torproject.org/docs/debian.html.en On Tue, Apr 25, 2017 at 9:17 PM, unpublished <unpublis...@wp.pl> wrote: > Thank you for your help and specific answer! > > I do not know yet how to put my reply (our correspondence question-answer) > to everyone on the TOR blog (different from the standard forum)? I'm afraid > that something of my actions it is a bad - doing something wrong.? I do not > want to impose your politeness, but could you please explain it to me, or > paste the content in the right place? > > I >A good idea would be to set the first/last COUNTRY (download/send data) > of the final node - as many sites do not support connections from foreign > countries. > >>As Jonathan mentioned in a reply to your post already, you are able to > define a set of allowed exit countries (ie poland only) by following these > instructions on wikihow: http://www.wikihow.com/Set-a- > Specific-Country-in-a-Tor-Browser > > Super, works as it should. This solves one already my problem! It is a > pity that we country have so few nodes. Is it possible to add the number of > intermediate nodes (it seems very dangerous when the end-country is my own) > in two TOR settings to 4 or at least 3 ? (only available working "amazon" > settings). > I will try to run old 2 or 4 core PC, and share it as TOR 24h Poland node. > (speeds IPv6 250/50Mbps be enough?) Maybe someone will help me to run this > on free Linux (stable and maintenance-free working). > > I >Can you somehow mask the fact that you use TOR browser, substituting > the name of regular firefox? > >>The destination server (the website which says "don't support tor > connections") probably doesn't block connections because of the browser you > are using. Since every node in the tor network exposes its "tor-membership" > to the network itself, it will always be possible to determine whether you > are using tor or not. On this specific manner, a VPN connection may help > you out, but please be aware that the provider of this VPN will then be > able to log and maybe intercept your traffic. > > I have a static IPv6 address they TOR work only with amazon settings > (250Mbps TV cable network). Optionally I can uses the “open” non protected > Wi-Fi network which blocks TOR connections also “amazon” and 2 bridges! > (2.4Ghz only, and very slow max 50Mbps with 300Mbps - b,g,n, cards /8192 > chip/, use beam aerial and 78% reach). > > Nice to have you explained that this is not a browser issue just a > "signature" node. Is there a way to change settings in the settings so that > the recipient does not see that the TOR is being used? > > I >There is still a question of what effect on the release of real IP, > with use Kaspersky Internet Security 2017 (PC version), during because it > Windows restart, injected its your packages (every couple of seconds it > sends/receives packets on 443 port) > >>The most internet security solutions intercept ssl traffic to scan the > contents of these connections for any Trojans or viruses. If not > implemented with perfect care, these solutions probably more harm you than > they help securing anything. You find an example of this here: > http://www.securityweek.com/google-researcher-finds- > certificate-flaws-kaspersky-products > > Thank you, I read. Does anyone in TOR are really interested in Kaspersky > LAB and whether (eg. Kaspersky Internet Security 2017 PC version) it not > threatens to expose IP (un hidden) when using TOR worked at Windows > 7,8,10??? > > Assuming that I use only secure pages, is not it safe to disable > protection and then shut down KIS? I give up the protection of files and > additionally I lose the useful option 1) effective "firewall" blocking > telemetry and other spy sites (using svchost and raw RAW to retrieve > information type whois, my location, markmonitor, etc.), 2) "Surfing > Incognito" , 3) "Blocking banners". The question is worth it? > > > Once again great thanks for the help! > > Regards > > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk