編集の要約なし
>充電に強い新芋 編集の要約なし |
>充電に強い新芋 編集の要約なし |
||
62行目: | 62行目: | ||
Even more so, install [[Tails]] to leave no criminal traces on your computer, install {{wpl|Whonix|lang=en}}, where all OS-wide communication goes through Tor and no IP leakage occurs, use {{wpl| Kali Linux}}, set up a bridge node to hide the fact that you are using Tor from the provider, use a web proxy such as [https://github.com/PHProxy/phproxy PHProxy] to hide the fact that the site is accessed from Tor. Use a web proxy, wrap with tools such as [https://proxifier.com/ Proxifier] or [https://pkgs.org/download/proxychains4 Proxychains] to pass through a proxy, or use a no-log [[VPN]] together, etc. should not happen. | Even more so, install [[Tails]] to leave no criminal traces on your computer, install {{wpl|Whonix|lang=en}}, where all OS-wide communication goes through Tor and no IP leakage occurs, use {{wpl| Kali Linux}}, set up a bridge node to hide the fact that you are using Tor from the provider, use a web proxy such as [https://github.com/PHProxy/phproxy PHProxy] to hide the fact that the site is accessed from Tor. Use a web proxy, wrap with tools such as [https://proxifier.com/ Proxifier] or [https://pkgs.org/download/proxychains4 Proxychains] to pass through a proxy, or use a no-log [[VPN]] together, etc. should not happen. | ||
It is obvious that the bad potato who intend to abuse the system should choose a server that supports {{wpl|en:User Datagram Protocol|UDP}} to [[セルフ開示|self-disclose]] the IP address, and it is obvious that it is not allowed to introduce a virtual environment to further increase anonymity. | It is obvious that the bad potato who intend to abuse the system should choose a server that supports {{wpl|en:User Datagram Protocol|UDP}} to [[セルフ開示|self-disclose]] the IP address, and it is obvious that it is not allowed to introduce a virtual environment to further increase anonymity. | ||
It is also out of the question to use [http://taruo.net/e/ Shindan-Kun] to check if you have succeeded in creating an anonymous environment, or to edit torrc to select a server in a country that is less susceptible to investigation. | It is also out of the question to use [http://taruo.net/e/ Shindan-Kun] to check if you have succeeded in creating an anonymous environment, or to edit torrc to select a server in a country that is less susceptible to investigation. | ||
== | ==Notes== | ||
Tor itself anonymizes only the '''communication path''', and it is possible to be traced by other means than IP addresses (e.g., talking about myself)<ref>This is especially true if you were talking about yourself in a raw IP</ref>. Note that Tor currently anonymizes only communications over the TCP protocol; communications using other protocols, such as the UDP protocol<ref>Mainly used for streaming, online gaming, etc. Also used on Discord {{要出典}}</ref>, will remain as raw IP. | |||
It is possible that traces of crimes committed using Tor will be found when crimes committed using raw IP are discovered and the PCs are seized by [[国セコ|police]]. ([[福山紘基|Fukuyama Hiroki]] is a prime example). There are also vulnerabilities in Tor-based software, such as those mentioned above, that could break anonymity,<ref>[[Facebook]] has been revealed to have provided the FBI with technology to exploit the Tails vulnerability {{archive|https://www.itmedia.co.jp/news/articles/2006/30/news078.html|https://archive.vn/f3LCH|Reference}}</ref> it is also important to note that if used incorrectly, anonymity can be compromised. | |||
The leakage of raw IP from the UDP protocol mentioned above can be prevented by restricting UDP protocol communication. We recommend that you refer to [https://note.com/ojipon_tor/n/n033da6b007d1 here] for specific measures. | |||
Thus, just using Tor carelessly may eventually lead to painful consequences (as mentioned above, Fukuyama became a martyr because of this), so '''before using Tor or any software that uses it, you should thoroughly understand the various risks by reading the respective official documents<ref>[https://2019.www.torproject.org/docs/documentation.html.en Tor's official documentation]</ref> before using Tor or any software that uses it.''' | |||
==torrc== | ==torrc== | ||
[[ファイル:サイバー犯罪条約加盟国.png|200px|right|thumb|{{wpl| | [[ファイル:サイバー犯罪条約加盟国.png|200px|right|thumb|member of {{wpl|Convention on Cybercrime|lang=en}}]] | ||
torrc is a file included in the Tor Browser that can be configured to specify nodes to be passed through. It is also possible to avoid [[開示|disclosure]] risks and increase anonymity by avoiding bad nodes<ref>[https://wired.jp/2007/09/13/%E5%8C%BF%E5%90%8D%E5%8C%96%E3%83%84%E3%83%BC%E3%83%AB%E3%80%8Etor%E3%80%8F%E3%81%AE%E8%90%BD%E3%81%A8%E3%81%97%E7%A9%B4%E2%80%95%E2%80%95%E5%A4%A7%E4%BD%BF%E9%A4%A8%E7%AD%89%E3%81%AE%E9%80%9A/ 匿名化ツール『Tor』の落とし穴(1) - 大使館等の通信傍受に成功]</ref> or setting nodes through countries with short log holding periods. | |||
Tails: <code>/etc/tor/torrc</code> Whonix-Gateway: <code>/usr/local/etc/torrc.d/50_user.conf</code> Browser: <code>tor-browser_ja-JP/Browser/TorBrowser/Data/Tor/torrc</code> Edit the file above with a text editor, etc. to set up the file. | |||
Below is an example description. For other options, see [https://2019.www.torproject.org/docs/tor-manual.html.en Tor project]. Also, use [http://www.kc.tsukuba.ac.jp/ulismeta/metadata/standard/cntry_code.html country code]<ref>Country code can be set by enclosing it in {}</ref>. If you are describing a server with an unknown country code, use {??}. | |||
NumEntryGuards 5 # | NumEntryGuards 5 #If UseEntryGuards is set to 1, the number of candidate EntryNodes is set to 5. Changing the 5 part does not change the number of nodes to go through. | ||
ExcludeNodes SlowServer,{jp},{gb},{us},{ca},{au},{nz},{de} # | ExcludeNodes SlowServer,{jp},{gb},{us},{ca},{au},{nz},{de} #Do not go through the specified node. | ||
ExcludeExitNodes {bg},{cz},{fi},{hu},{ie},{lv},{lt},{lu},{nl},{ro},{es},{se},{ch},{ru},{hk},{il} # | ExcludeExitNodes {bg},{cz},{fi},{hu},{ie},{lv},{lt},{lu},{nl},{ro},{es},{se},{ch},{ru},{hk},{il} #Do not set the specified node as Exit node | ||
StrictNodes 1 # | StrictNodes 1 #Strictly set Exclude or not; setting it to 0 sometimes breaks the setting. | ||
Note that setting too many ExcludeNodes will ''''conversely limit the number of nodes to be passed through, which will reduce randomness and anonymity'''. | |||
== | ==References== | ||
<references /> | <references /> | ||
== | ==See also== | ||
*[[0Chiaki]] | *[[0Chiaki]] | ||
*[[VPN]] | *[[VPN]] | ||
*[[ダークウェブ]] | *[[ダークウェブ|Dark web]] | ||
*[[Onionちゃんねる]] | *[[Onionちゃんねる|Onion channel]] | ||
*[[恒辞苑:な行#生IP| | *[[恒辞苑:な行#生IP|rawIP]] | ||
*[[Tails]] | *[[Tails]] | ||
*[[悪芋]] | *[[悪芋|Bad potato]] | ||
== | ==External links== | ||
*[https://www.torproject.org/ | *[https://www.torproject.org/ Official sites] | ||
*{{wpl|Tor}}([[Wikipedia]] | *{{wpl|Tor|lang=en}}([[Wikipedia]]) | ||
*{{twitterlink|NumberID=18466967|ID=torproject}} | *{{twitterlink|NumberID=18466967|ID=torproject}} | ||
*[http://www62.atwiki.jp/sec4orpheus/pages/8.html Sec4Orpheus] - | *[http://www62.atwiki.jp/sec4orpheus/pages/8.html Sec4Orpheus] - A website that summarizes privacy defense techniques | ||
*[https://wiki.archlinux.jp/index.php/Tor ArchWiki] | *[https://wiki.archlinux.jp/index.php/Tor ArchWiki] | ||
*[https://www.whonix.org/wiki/Main_Page Whonix Wiki] | *[https://www.whonix.org/wiki/Main_Page Whonix Wiki] | ||
{{匿名化技術}} | {{匿名化技術}} | ||
{{恒心教徒}} | {{恒心教徒}} | ||
{{デフォルトソート: | {{デフォルトソート:Tor}} | ||
[[カテゴリ:匿名化]] | [[カテゴリ:匿名化]] | ||
[[カテゴリ:English]] | |||
{{広告}} | {{広告}} |