Welcome to the Temple of Zeus's Official Forums!

Welcome to the official forums for the Temple of Zeus. Please consider registering an account to join our community.

Why is there no forum for germans

TeonX

New member
Joined
Dec 22, 2019
Messages
11
We seriosuly need a own forum for german people. Thanks in advance
 
Connection to ancient-forums.com is https encrypted, that means as long as you don't give out logs to the german police nobody can be prosecuted.
 
TeonX said:
Connection to ancient-forums.com is https encrypted, that means as long as you don't give out logs to the german police nobody can be prosecuted.


Internet providers and spyware such as facebook tiktok etc can be a problem including preinstalled apps. Windows works directly with the us government so whos to say they wouldnt give ur shit to the germans? Theres a bijillion more ways for it to get out.
 
Your ISP can still see the website you're visiting unless you're using a VPN or Tor/Tails.

TeonX said:
Connection to ancient-forums.com is https encrypted, that means as long as you don't give out logs to the german police nobody can be prosecuted.
 
Even paid VPN's are the same thing as Tor. They can see all the info you put in. You have to take their word that they don't keep any logs or spy on you as it's impossible to know for sure. Free VPN's are worse, sure, but I mean, isn't all those sites shilling Nord VPN in their ads a little bit suspicious? This video explains it

https://youtu.be/FMScV1Mkaok


Syntax said:
You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
 
Syntax said:
You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
Unfortunately you are wrong mate. This is HTTPS encrypted, the exit node can only see an encrypted request coming from the previous node to the normal internet. It can see someone on the TOR network wants to be connected to the forums, but can't see any of the data because it's encrypted. MITM attacks are much more complicated. TOR is perfectly safe and anonymous.
While VPNs are an alternative to TOR, you are trusting a private company anyway. There's a nice website that compares all VPNs characteristics but I don't remember its name. VPN providers cannot see either what exactly you are doing within a website, but can see that YOU specifically are connected to it (as opposite to TOR where the exit node only knows someone - generic - is). It's easier to track you down using a normal VPN.
Keep safe
 
Read this as well

https://schub.wtf/blog/2019/04/08/very-precarious-narrative.html
https://gist.github.com/joepie91/5a9909939e6ce7d09e29

Syntax said:
You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
 
That's not true at all. Spycro$oft Windows is paid and treats you like a product. Linux is free and doesn't spy or use you in any way. Generally the rule is if something isn't free (and I mean free as in freedom not as just meaning "no payment" since English sucks and has the same word for two different concepts) and open source and isn't decentralized it will treat you like a product. The most dangerous ones are the free but proprietary things. But the paid proprietary aren't a lot better.

Syntax said:
If you aren't paying for a product then you ARE the product
 
Pirate11 said:
Syntax said:
You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).
Unfortunately you are wrong mate. This is HTTPS encrypted, the exit node can only see an encrypted request coming from the previous node to the normal internet. It can see someone on the TOR network wants to be connected to the forums, but can't see any of the data because it's encrypted. MITM attacks are much more complicated. TOR is perfectly safe and anonymous.
While VPNs are an alternative to TOR, you are trusting a private company anyway. There's a nice website that compares all VPNs characteristics but I don't remember its name. VPN providers cannot see either what exactly you are doing within a website, but can see that YOU specifically are connected to it (as opposite to TOR where the exit node only knows someone - generic - is). It's easier to track you down using a normal VPN.
Keep safe

Thank you for your information. This is very beneficial to know. If I recall correctly onion services do not have proper encryption and thus all information is plaintext. Perhaps that is where my confusion came from.


Shrekelstein said:
Even paid VPN's are the same thing as Tor. They can see all the info you put in. You have to take their word that they don't keep any logs or spy on you as it's impossible to know for sure. Free VPN's are worse, sure, but I mean, isn't all those sites shilling Nord VPN in their ads a little bit suspicious? This video explains it

https://youtu.be/FMScV1Mkaok


Syntax said:
You're correct in the fact that nobody can see where the request is from. The exit node can see all the information you input to the website though. Passwords, logins, emails. Shit like that. If you don't want to risk your account being stolen I would recommend a paid vpn like NORD or Express. If you aren't paying for a product then you ARE the product(Free vpns should be avoided like the plague as you said).

Holy fuck man thank you for this shit. This is really eye opening. I also see the other links you sent me and will review them soon. I am busy with something at the moment but thank you man. Truly.
 
Syntax said:
Thank you for your information. This is very beneficial to know. If I recall correctly onion services do not have proper encryption and thus all information is plaintext. Perhaps that is where my confusion came from.
Nope, they have strong encryption actually:
Wikipedia said:
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination
Source: Link to Wikipedia.
BTW even if onion weren't encrypted at all, it would still be perfectly secure to browse HTTPS sites through TOR. When you visit a clear web website through TOR Browser, you are not visiting an onion service. Normal HTTPS rules apply.
 
Shrekelstein said:
Even paid VPN's are the same thing as Tor. They can see all the info you put in. You have to take their word that they don't keep any logs or spy on you as it's impossible to know for sure. Free VPN's are worse, sure, but I mean, isn't all those sites shilling Nord VPN in their ads a little bit suspicious? This video explains it
There are VPNs who apparently have proven by a way or another that they do not keep logs.
https://restoreprivacy.com/no-logs-vpn/
Also VPNs caught lying, https://restoreprivacy.com/vpn-logs-lies/
Tor cannot „see” your activity because your browsing on Tor is realized through 3 independent and separate nodes/tunnels. As far as I remember, the first node is able to see your IP adress, the second node is some intermediate one and the third node receives the browsing request but doesn't receive your real IP. However I am pretty sure with Tor you can be de-anonimized if the authorities are specifically set on you.
if successful, would allow the NSA to uncloak anonymous traffic on a “wide scale” — effectively by watching communications as they enter and exit the Tor system, rather than trying to follow them inside. One type of attack, for example, would identify users by minute differences in the clock times on their computers. (...)
A federal judge in Washington has now confirmed what has been strongly suspected: that Carnegie Mellon University (CMU) researchers at its Software Engineering Institute were hired by the federal government to do research into breaking Tor in 2014.

https://restoreprivacy.com/tor/
Also I read before about governments operating Tor nodes for bulk collection of data.
So Tor alone definitely is not 100% safe even if you use Tails because the first node still receives your real IP. If you use Tor alone you might become a target because the ISP provider automatically thinks that you have something to hide. I guess those who stay on facebook and listen music all day do not need to bother to install Tor because their online activities are not important enough to require anonymity.

My opinion is to use a proven no logs paid VPN together with Tor. First node of Tor doesn't receive your real IP and even if the VPN keeps logs, they can't see what you do on Tor, they will probably only see that you are using it. And I think your Internet provider will only see that you are using a VPN but still is as suspicious as using Tor because they may believe that you are hiding something if you hide behind a VPN so you might end up in a kind of blacklist if the ISP providers are doing this with clients not connecting to the internet straight with their real IP.

Pirate11 said:
There's a nice website that compares all VPNs characteristics but I don't remember its name.
I think it might be Restore Privacy,
 

Official Temple of Zeus Links

Back
Top