Am 2015-05-18 um 01:12 schrieb Pedro
Worcel:
I would guess that there is no anonymity with tor anyway unless you use a virtual machine based solution like f.i. Whonix. Otherwise one would have to restrict oneself to using torsocks wget/lynx/w3m/elinks which I consider to be rather save browsers/ downloaders. If you do not have lynx/w3m/elinks you could even use wget + vim/mcedit/less in certain cases as me lately when downloading Debian: torsocks wget http://cdimage.debian.org/debian-cd/8.0.0/amd64/jigdo-dlbd/SHA512SUMS torsocks lynx http://atterer.org/jigdo/#download or: torsocks wget http://atterer.org/sites/atterer/files/2009-08/jigdo/jigdo-bin-0.7.3.tar.bz2 sha256sum jigdo-bin-0.7.3.tar.bz 58b8a6885822e55f365c99131c906f16ceaaf657c566e10f410d026704cad157 jigdo-bin-0.7.3.tar.bz2 torsocks wget http://cdimage.debian.org/debian-cd/8.0.0/amd64/jigdo-dlbd/debian-8.0.0-amd64-DLBD-1.jigdo/.template torsocks jigdo-bin-0.7.3/jigdo-lite debian-8.0.0-amd64-DLBD-1.jigdo sha512sum debian-8.0.0-amd64-DLBD-1.iso Shell sessions as above should usually not be necessary unless you download two times with wrong SHA512 over plain http. Both times jigdo had reported me a matching checksum; unfortunately the SHA512 definitely did not match. Usually you should be good with the first line applied on a plain http jigdo download (too bad that it does not support https + DNSSEC/DANE). I never leave a computer with preinstalled tor; I always boot from read-only media like a DVD. However some of these media are not entirely trustworthy: I always stop all unnecessary services (netstat -atupn) and often disable network-manager before going online. macchanger -a eth0 may also be helpful. Unnecessary to mention that anonymity gets lost as soon as your host operating system gets compromised. It is also well known that the NSA and possibly other intelligence services attack tor users on a regular basis if they are interested in what they are doing. Regards, Elmar
|