Silk Road forums
Discussion => Security => Topic started by: slade17 on August 19, 2013, 11:19 pm
-
Is this a stupid thing to do? I'm going on a business trip and will be bringing my laptop. I'm in the process of buying some bitcoins and ill need to exercise all of my willpower not to check the trading site I use as well as SR, and maybe even make an order in a couple days.
Will the hotel monitor my use of their internet that closely? Am I better off waiting until I get home in 4 days, or am I worrying about nothing?
-
If they are monitoring it they will only see that your computer is connecting to the Tor network, not which hidden services you visit.
-
I use tor regularly when I travel and I've never had any problem. It's really a good idea in general to use a VPN on any network you don't trust (like the ones at hotels), TOR has pretty much the same affect for hiding and encrypting your traffic so i doubt anyone would question it even if they did notice (which they probably wont). A lot of places won't even bother changing the default settings on their router.
-
I wouldn't worry about a hotel monitoring you haha. Me and my friends used to go to hotels and simply being on the wifi gave us a view of all of the packets being sent on the network. We could hijack basically anybodies web-cookies, bank sites, facebook, etc, We didn't do anything malicious though.... xD.. maybe besides breaking some mofos up on facebook. Just a word of advice... don't log into anything crucial on hotel/public wifi, and don't leave your computer connected to it for extended periods. If someone with the right know-how is on the network they can virtually, and pretty easily take over any computer also connected to that network, mouse, files, etc. They can look through your files without you even knowing and you could be browsing the internet. Public wifi is scary. It's also not as hard as people make it sound.
If you are worried about the hotel seeing you using Tor, you could always use a bridge. In many countries such as China were Tor is blocked, bridges must be used so the ISP's cannot immediately identify it as a Tor connection. Once a bridge is identified though it can be black listed. Though i doubt your in China, so even a simple bridge will cover your tracks from someone watching the connection.
-
LOL@anonymously going through someones files. College was awesome for that little trick. We used to sit in class and browse all the various workgroups on the network. You could tell the people that never changed any settings besides turning on file sharing. I'd grab that nights party music off of someone elses computer...or that evenings hollywood panty dropper. Kept me from having to download too much of my own p2p stuff. Programs, games, etc. It is pretty scary what's available.
-
Tutorials/guides? ;D Sounds fun haha, Any tutorials on how to do it to yourself to learn etc? I wouldn't know :-\
Cheers,
Locker.
-
be aware, that they are likely to be saving your MAC address.
why not go to a bar down the street, check there, then close your laptop and have a beer?
odds are, privacy terms are just not too good in the hotel.
-
be aware, that they are likely to be saving your MAC address.
why not go to a bar down the street, check there, then close your laptop and have a beer?
odds are, privacy terms are just not too good in the hotel.
I'd rather browse in privacy than a place that someone may actually physically be able to see my screen.
I have it set up so I can access my network at home...access to all my resources, VM, etc. It will tunnel to one IP, but at least it's not showing the Tor connection if you are concerned about that aspect. I did it for more reasons than just SR, mostly so I can access my resources at work and test external connections on our sites, etc. It's nice because Tor can be running on a computer not even at my drop too.
-
I stay a lot in hotels. I cannot to an anonymous VPN first, and then to Tor. It's slower, but I think I'm being more secure. They know I'm there, though, because I have to register in order to get on the network.
-
I envy you people and these computer skills you possess.... Me and TAILS till the end...for now..
Ryno
-
Just use TOR bridges. If you use an obfs3 bridge even if they did DPI(which is some china firewall shit not hotel shit) the traffic is disguised as a skype video call or something else innocent yet encrypted.
-
Change the MAC address of your network adapter and you'll be fine.
As long as you are browsing from the privacy of your room, there is no way anyone can see you are on SR. All they can see is that you are on tor, and even that can be avoided via obfusproxy or tor bridge use like others have said, although I doubt that's necessary unless you are a vendor or staff member.
If you are in the US or similar country, no hotel is going to care (or even know) that you are connected to tor. Potential targets of surveillance need not apply. For most users, the biggest risk would be your SR browsing being traced back to its originating IP via LE malware or some tor vulnerability. At that point, they can try to look up your MAC address and cross-reference it against customers of that hotel. If you changed your MAC, this won't be a problem.
-
I wouldn't worry about a hotel monitoring you haha. Me and my friends used to go to hotels and simply being on the wifi gave us a view of all of the packets being sent on the network. We could hijack basically anybodies web-cookies, bank sites, facebook, etc, We didn't do anything malicious though.... xD.. maybe besides breaking some mofos up on facebook. Just a word of advice... don't log into anything crucial on hotel/public wifi, and don't leave your computer connected to it for extended periods. If someone with the right know-how is on the network they can virtually, and pretty easily take over any computer also connected to that network, mouse, files, etc. They can look through your files without you even knowing and you could be browsing the internet. Public wifi is scary. It's also not as hard as people make it sound.
If you are worried about the hotel seeing you using Tor, you could always use a bridge. In many countries such as China were Tor is blocked, bridges must be used so the ISP's cannot immediately identify it as a Tor connection. Once a bridge is identified though it can be black listed. Though i doubt your in China, so even a simple bridge will cover your tracks from someone watching the connection.
how to do this??
-
Haha Vee, I think you attracted the wrong visitors. 51st post is asking how to intercept packets on pseudo-public WiFi LOL awesome.
-
In any case, this is a excellent reason to grab a usb and install tail OS on it ;)