「Tor/en」の版間の差分
ナビゲーションに移動
検索に移動
編集の要約なし
>充電に強い新芋 (fix) |
>充電に強い新芋 編集の要約なし |
||
1行目: | 1行目: | ||
[[ファイル:Tor-logo-2011-flat.svg|306px|thumb|right| | [[ファイル:Tor-logo-2011-flat.svg|306px|thumb|right|Logo]] | ||
'''Tor''' is software that uses Internet anonymization technology. Tor has a long history, with the first version released on December 20, 2002<ref>[http://archives.seul.org/or/dev/Sep-2002/msg00019.html pre-alpha: run an onion proxy now!]</ref>. | '''Tor''' is software that uses Internet anonymization technology. Tor has a long history, with the first version released on December 20, 2002<ref>[http://archives.seul.org/or/dev/Sep-2002/msg00019.html pre-alpha: run an onion proxy now!]</ref>. | ||
== Overview == | == Overview == | ||
40行目: | 40行目: | ||
{{wpl|en:Penetration test|Penetration test}}, an operating system designed to test attacks on computer systems and equipped with various <strike>attack weapon</strike>tools. This is also to be installed using [https://www.virtualbox.org/ VirtualBox]. <strong>Naturally, it must not be diverted to attacks on sites operated by third parties.</strong> | {{wpl|en:Penetration test|Penetration test}}, an operating system designed to test attacks on computer systems and equipped with various <strike>attack weapon</strike>tools. This is also to be installed using [https://www.virtualbox.org/ VirtualBox]. <strong>Naturally, it must not be diverted to attacks on sites operated by third parties.</strong> | ||
* [[Parrot OS]] | * [[Parrot OS]] | ||
Kali | Like Kali Linux, this OS is designed for penetration testing. Unlike Kali Linux, Tor is bundled<ref>The Tor browser is only installed and does not make all communications via Tor, so it is necessary to anonymize communications separately using [https://github.com/ultrafunkamsterdam/AnonSurf Anonsurf] or other means</ref>. Although it is equipped with various <strike>weapon of attack</strike> tools, including a password [[karacking]] function, it is an OS intended only for checking the vulnerability of the site you operate, and must <strong>never be diverted to attacks on sites operated by third parties</strong>. It is out of the question to think that "cuz tor is enclosed it is best suited for attack"</strong>. | ||
* [https://blackarch.org/ BlackArch] | * [https://blackarch.org/ BlackArch] | ||
The same Arch Linux flavor for penetration testing is bundled with native Tor and Tor Browser. While Kali Linux and Parrot OS are based on Debian, this one uses Arch Linux. Therefore, it is not possible to run Anonsurf, but instead it is possible to run a script called [https://github.com/Edu4rdSHL/tor-router tor-router] to make all OS communications via Tor. The tor-router has been updated so that communication anonymising can be stopped without restarting [https://github.com/Edu4rdSHL/tor-router/commit/290d0b1e29a13a4e1d4f109a6a31bdd1da523dc9 (ab272cb)]. This commit is also reflected in the BlackArch repository, and tor-router is always available for installation with pacman, with full stopability in the algorithm. For more information on other secret tools, see [https://blackarch.org/defensive.html here]. | |||
=== | === Software used in conjunction === | ||
Software that is often used in conjunction with Tor-based software for improved convenience and confidentiality. <strong>Note that some of these by themselves will not be anonymized by Tor.</strong> | |||
* [https://github.com/PHProxy/phproxy PHProxy] | * [https://github.com/PHProxy/phproxy PHProxy] | ||
One of the so-called Webproxy. This alone is an extremely easy way to hide your raw IP from the site, but it also makes you less anonymous. If it is routed behind Tor, it is possible to access sites that deny the IP of the Tor exit node. | |||
* [https://github.com/Und3rf10w/kali-anonsurf/ Anonsurf] | * [https://github.com/Und3rf10w/kali-anonsurf/ Anonsurf] | ||
A script that makes all Linux communications via Tor/I2P on the OS itself, without passing through a virtual machine such as Whonix. Officially, Kali Linux is recommended, but it is not advisable to use it to attack others, saying '''i can attack via tor so there's no way ill be exposed'''. | |||
*[https://github.com/alobbs/macchanger GNU MAC Changer] | *[https://github.com/alobbs/macchanger GNU MAC Changer] | ||
Software for Linux that disguises your mac address. Prevents identity theft when connecting to public wifi, etc. Tails is included by default and is not required. | |||
*[https://github.com/aforensics/HiddenVM HiddenVM] | *[https://github.com/aforensics/HiddenVM HiddenVM] | ||
A tool that can be installed in Tails to use Virtualbox without leaving any evidence. <strong>It is out of the question to install Kali Linux, etc. and think that "cracking can be done in an anon env where no evidence is left behind".</strong> | |||
== | ==Uses of Tor== | ||
Tor is supposed to be used to protect free speech, and the [[悪芋|bad people]] who commit criminal acts do not deserve to use Tor.<ref>{{archive|1=https://www.cyberarts.tokyo/?p=167|2=https://archive.vn/G4p7G|3=Torは無敵か? - Tanaka Kazunari}}</ref> | |||
Therefore, just because anyone can easily use Tor Browser by simply downloading it from the official site does not mean that easy misuse is acceptable. | |||
Even more so, install [[Tails]] to leave no criminal traces on your computer, install {{wpl|Whonix|lang=en}}, where all OS-wide communication goes through Tor and no IP leakage occurs, use {{wpl| Kali Linux}}, set up a bridge node to hide the fact that you are using Tor from the provider, use a web proxy such as [https://github.com/PHProxy/phproxy PHProxy] to hide the fact that the site is accessed from Tor. Use a web proxy, wrap with tools such as [https://proxifier.com/ Proxifier] or [https://pkgs.org/download/proxychains4 Proxychains] to pass through a proxy, or use a no-log [[VPN]] together, etc. should not happen. | |||
当然、悪用を企む悪芋達はIPを[[セルフ開示]]する{{wpl|User Datagram Protocol|UDP}}サポートのあるサーバーを選択するべきなのであり、更に匿名性を高めるために仮想環境の導入など許されないのは自明である。 | 当然、悪用を企む悪芋達はIPを[[セルフ開示]]する{{wpl|User Datagram Protocol|UDP}}サポートのあるサーバーを選択するべきなのであり、更に匿名性を高めるために仮想環境の導入など許されないのは自明である。 | ||
It is obvious that the bad potato who intend to abuse the system should choose a server that supports {{wpl|en:User Datagram Protocol|UDP}} to [[セルフ開示|self-disclose]] the IP address, and it is obvious that it is not allowed to introduce a virtual environment to further increase anonymity. | |||
It is also out of the question to use [http://taruo.net/e/ Shindan-Kun] to check if you have succeeded in creating an anonymous environment, or to edit torrc to select a server in a country that is less susceptible to investigation. | |||
==注意点== | ==注意点== |