12160,
Here is something i stumbled upon configuring my, lets just say footprint. If you like being anon, you might want to read this and research...
//Suebi.
The original *QUESTION* posed that led to the invention of Onion Routing was, “Can we build a system that allows for bi-directional communications over the Internet where the source and destination cannot be determined by a mid-point?” The *PURPOSE* was for DoD / Intelligence usage (open source intelligence gathering, covering of forward deployed assets, whatever). Not helping dissidents in repressive countries. Not assisting criminals in covering their electronic tracks. Not helping bit-torrent users avoid MPAA/RIAA prosecution. Not giving a 10 year old a way to bypass an anti-porn filter. Of course, we knew those would be other unavoidable uses for the technology, but that was immaterial to the problem at hand we were trying to solve (and if those uses were going to give us more cover traffic to better hide what we wanted to use the network for, all the better…I once told a flag officer that much to his chagrin).
Comment
Ooops, left out some info - The recommended Browser above is CyberDragon 1.6.1, it is cross platform compatible (even windows and mac). Thats a project to help fund, good guy from what i know so far..
Anti Everything: Good day to you SIR.
Well onion routing is well, like an onion.. There are multiple layer to control the flow and privacy of your data through TOR so the onion routing concept is not platform independent.. Your data would create the teary core at the center. As it moves through the TOR network, layers are added and "peeled" as you navigate through the net. If you are not so saavy, the TOR Browser is the way to go (consider running TAILS and keeping it up to date from a USB stick..).
There is another browser out there that requires a bit of finesse to install but is totally worth it.. Besides, you could learn along the way to a successful installation..
Remember that TOR should only be a layer in your transport, not the general solution.. Oh, and here is your answer to where it came from.. Creepy right?
I say, use their tech against them and TOR is their tech. When you read the .pdf in this link ( http://www.onion-router.net/Publications/JCS-1997.pdf ) it becomes clear that public data is only there (authorized) to hide the traffic of the government operators in the field.. SOmething that is not apparent though is that with a global network (US GOV) you can monitor all known entries and exits from a birds eye view and determine who is going where and why.
Sneaky bastards.. This is why i am an advocate of encryption and the use of other layers to provide your personal security through TOR. They might be able to pick up who and where but not on the information transmitted/sent. I am speaking through experience on both sides of the conundrum as a former _blankhere_ and World Theater Operator. NO worries, those days are long gone and I had a rude awakening from the indoctrination.
The advantage to this system is that other governments do not have the assets in place in order to track movements inside TOR (from the birds eye view). Our technological development here in the US and mongering crusades abroad always include computer systems, these assets deployed on the ground provide a nice base to monitor all communications from without scrutiny.
My personal concern was that we could not engage China (years ago) even if we caught them with their hand in the cookie-jar..
Can we say NWO?
Btw, the donations you make to the TOR project get sucked in by the developers as a bonus to the non existent royalties given to them from the government. Yes, they hijacked it as soon as they could. So funding them is up to you. Me personally, I run a relay inside my DMZ and thats support enough.
Thanks for the question, I love exposing everything I can using the training i received from our NWO. Makes it worth all the years I wasted.. Have a good one friend,
//Suebi.
This is interesting but I am not clear (me no damn computer genius) on the "Onion Routing". Who invented it, what does it do, is it in all PC or Apple hardware? My impression is this is a way the DoD et. al., get information on any computer user it wants. I have a 'Tor Browser' on my computer but stopped using it once I read about where the funding to develop the Browser came (a bit more to it then that, of course).
"Destroying the New World Order"
THANK YOU FOR SUPPORTING THE SITE!
© 2024 Created by truth. Powered by
You need to be a member of 12160 Social Network to add comments!
Join 12160 Social Network