Why Nostr? What is Njump?
2024-01-27 00:12:33

SimplifiedPrivacy.com on Nostr: 6 Wicked Ways to Use Tor... Whonix This is 2 virtual machines. The 2nd one keeps Tor ...

6 Wicked Ways to Use Tor...

Whonix
This is 2 virtual machines. The 2nd one keeps Tor external, so even if malware breaks out, you're still safe.
Each program gets it's own circuit, which means a different 3 hop path.

Tails
Disposable USB stick. Plus you can run this without an admin (sudo) password existing, meaning nobody can install anything. How can hackers get sudo, when there is no sudo?!

ParrotOS
While there aren't different circuits for each program like Whonix or Tails, Parrot lets you change Tor exit IPs quickly via the GUI for the whole system. This is useful for beginners (that like the GUI) and want new identities from the same domain/program, for example multiple emails, multiple XMPP accounts, ect.

KaliTorify
This is a Command line tool. Exactly like Parrot, it routes the entire system through Tor like a VPN. Both Parrot and KaliTorify use IPtables, which is just a firewall program. KaliTorify is convenient and fast, but it’s easy to accidentally forget to put it on and doxx yourself.

OpenWRT
This is router software that can do Tor. It's useful for when you want to hide Tor use on your phone, because the app bans or restricts Tor. So Tor router -> VPN phone. For example making a burner Telegram or WhatsApp account with the crypto-VoIP numbers, like I showed you how before.

Orbot or InviZiblePro
This is Tor for cellphones. Be careful with this, because it's NOT giving you new circuits for each app like Whonix or Tails. So let's say you got Telegram with your real KYC number and an anonymous Signal burner. That Tor exit node is seeing you pull from Signal and Telegram at the same time, and if that's a malicious government node, you're not as "anonymous" as you think.
Solutions:
Either toggle different mobile profiles, never use KYC numbers, or use a firewall app. Graphene has one under each app's settings, or Calyx has an awesome system-wide one.

Conclusion
Do you want help setting any of this up? Advice on opsec or what to avoid? Don't get burned with random idiots giving you bad advice, and save yourself headache and time. At $30/hr, it's so low you'd probably lose more trying to debug it on your own. We're just a DM away.
Author Public Key
npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6