Комментарии:
Is this still good for 2024?
Ответитьyou can not even download java script?
ОтветитьIt's ok to use security safer mode?
ОтветитьSo i can get access to some website and ill be completely safe?
ОтветитьI'm not sure if that's your IP address but you leaked it, just warning in case it slipped
ОтветитьLol yeah the whole use a VPN thing with Tor is stupid. If you have a VPN already then why would you need Tor?? xD Tor is essentially free IP concealment with the caveat that your data from the exit node to the destination won't be encrypted. As long as you are not logging into any services, revealing any personal information, or doing anything else besides browsing sites you've never visited before then you have nothing to worry about. For those other things you would use a different browser. The goal of using Tor was to hide your IP address and it accomplishes this 9 times out of 10.
Ответитьmost important thing is to use VPN
ОтветитьSo what should I use for normal life? If tor can't be used for email and communication, what should one use for that? Google, which is already basically malware?
ОтветитьEveryone talks about vpn but no one says where to install it, inside VM or outside
ОтветитьWhy did you said that don't maximize the window?
Ответитьyou say not to use windows but you seem to use it
ОтветитьLets show you how to use tor correctly.
after few soconds opening the browser in full screen
ı hava a question abut tor browser, tor make me really anonymous? ı use high secruity and other stuff can someone else answer my problem :/
Ответитьjust something to point out, DO NOT USE TOR FULL SCREEN. This allows serious hackers to identify your display size screen and find your location. I do not know how they do this stuff but just note that everyone.
ОтветитьI had a few questions:
Can our ISP track us while using tor?
And we are connected to tor network which the browser had built in so why do we need proxy/vpn?
And is there some site where I can find onion links coz it's not exactly easy to find a link
What about using Tor and browsing the deep web from a mobile device?
ОтветитьI maximised for long time. What problem do I face?
ОтветитьNo reddit link about the VPN at the end, sorry but dislike, if you say something then do it.
Ответитьthanks i just got a f*** ** in the dark web
Ответитьhow to add adblocker?
ОтветитьUse Tails. Makes it 100 times more secure
ОтветитьI can use my Facebook tor browser ?
ОтветитьI would like to consult about Tor if I might..
I've installed the browser several times, but every time when I'm trying to open it for the first time after installation I face the same problem and same message:
"Tor unexpectedly exited, This might be due to a bug in Tor itself, another program on your system, or faulty hardware. until you restart Tor, the Tor browser will not able to reach any websites. If the problem persists, please send a copy of your Tor log to the support team.
Restarting Tor will not close your browsing tabs."
so as I was saying I was trying to reinstall several times and apart from that I was trying to disable my antivirus but to no avail.
when I've tried to copy the Tor log I have seen the following message time after time:
" Copy complete. 0 Tor log messages are ready to be pasted into a text editor or an email message."
I would really appreciate the help and it sounds like you have enough experience in order to help me.. I've tried by myself for so many times but I just can't find a way to fix it by myself.
im gonna do some highly illegal things... download gog games
ОтветитьIf you take the tor and improve it you get an Idyll
ОтветитьI use a free vpn and location spoofed I've been golden.
ОтветитьWhat if I only have windows what do I use instead, yes I’m new to this ?
Ответитьbro im unable to browse the tor it says no internet connection
ОтветитьHow do you create pseudonyms inside of tor?
ОтветитьPerhaps this could be of value for a Targeted Individual, continuously hacked and keylogged etc.
ОтветитьIf you take the hit man challenge and lose, is that a suicide ? What if you sincerely try to “win.” Also, if you take the hit man challenge and end up killing the hit man, is that murder?
ОтветитьDont use Windows for Tor.
1 minute later.
Turn on the Bitlocker.
Why not use full screen?
ОтветитьWhy never maximize your screen?
ОтветитьActually it's better to maximize the browser than manually doing it, because if you manually increase the size to, for example, 1918 x 1070, someone could track you over your window size, I hope you know what I mean. It's like a fingerprint.
ОтветитьYo can you make a video about tor on a iPhone?
ОтветитьCan I use Mac?
Ответитьso if windows No Tor for you
ОтветитьThank you so much for sharing!
ОтветитьCan I still be tracked if I use a boot drive with zero personal information??
ОтветитьExpress vpn any good??
Ответитьhow bout you stop using Tor on full screen first
ОтветитьWhy shouldn't i login to anything while using tor?
nvm the point of tor is make you anony and if you use your real email you'd be exposing yourself.
that's like wearing a mask but then writing your name on your shirt
UNLESS you have a satellite uplink (NOT downlink, UPLINK) you have a physically hard-wired connection to the internet. did you REALLY think that software was going to give you anonymity? then you really ARE dumber than fucking dirt. in fact, COMMON SENSE ought to tell you that by using a tor browser and VPN, not only are you NOT invisible, nor anonymous, nor secure, the ILLUSION that software can make you so is JUST A TRICK, to get STOOPID people to red flag themselves as worthy of surveillance.
i've been saying this since the idea of online anonymity was first discussed, and predictably, most people choose to believe a shyster hocking a pricy product and telling them what they WANT to believe, rather than a dis-interested party speaking the truth with no financial motive. but isn't this what makes ameriKa great? the highest $$/IQ ratio on the planet? well, a pal over at no such agency has just spilled the beans and confirmed what you OUGHT to already know…
"Fun fact: Tor is highly traceable and was created by DARPA. It is neither secure, nor anonymous. There are multiple methods of tracing I.P.'s using everything from packet sizes to the time between data pulses sent. If you really want anonymity; vanish in a thick crowd."