What Is Tor "Bridge"? Should I Use A Bridge?

Поделиться
HTML-код
  • Опубликовано: 15 сен 2024
  • Tor is a changing proxying overlay network utilizing encryption to help anonymize traffic. For the best Tor Network speed, should I use a bridge? Answers inside.
    Support ☕ ❤️ MONERO: 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
    💡⚠ *SUPPORT: SHARE VIDEO ON SOCIAL MEDIA - CHANNEL DOESN'T GET VIEWS IT SHOULD (5 years / thousands of hours of hard work on hundreds of videos): PEOPLE AREN'T SHARING VIDEOS (post LINKS [anywhere on web] moves video up + RUclips recommendations: Help hack algorithm! 🤓). SHARING MOTIVATES MORE FREQUENT CONTENT / VIDEOS: Be the change you want to see. THANK YOU.* 😎
    I was originally going to do a tutorial specific to Pinetab/Pinephone, but had a hiccup in software I need to work out.
    ___________________________________________
    THANK YOU FOR SHARING THIS (TELEGRAM/SOCIAL MEDIA ETC).
    _____________________________
    ✍🗒 Blog: www.buymeacoff...
    (organized by category, free Tutorials, anonymous privacy, howto's, Linux, Human Rights)
    ✍🗒 blog mirror: politictech.wo...
    _____________________________
    🧅🔐 ANON CODE/WIKI HOST: gg6zxtreajiijzt...
    ___________________________________________
    💖 SUPPORT OPTIONS (If you like):
    🎁 Extras: www.buymeacoff... (Get something unique back in return for your Support)
    💲CASHAPP: cash.app/$Huma...
    ✉✍🗒🎞 BMAC: www.buymeacoff... ($5/monthly supporter + extra tips)
    💳 (BTC/options listed at: www.buymeacoff... )
    (Spending many hours a day on this - links above are ways to support - grateful for video/tutorial Shares, Follows, and Likes/Comments!)
    _______________________________________
    FOLLOW:
    ✍🗒MASTODON: www.fosstodon....
    🐦 TWITTER: / tvprivacy
    ___________________________________________
    🎞 PEERTUBE: tube.tchncs.de...
    🎞 BITCHUTE: www.bitchute.c...
    🎞 ODYSEE: www.odysee.com...
    ___________________________________________
    ✉ CONTACT/INQUIRE: righttoprivacy[at]tutanota.com
    ___________________________________________
    www.gitlab.com...
    www.github.com... (privacy scripts and more)
    ___________________________________________
    If you aren't registered for Odysee I appreciate those who take the time to sign up using my invite link: odysee.com/$in...
    ___________________________________________
    Privacy has never been more important. Human Rights are under attack and I am trying to sift through the misinformation.
    ___________________________________________

Комментарии • 69

  • @RTPTechTips
    @RTPTechTips  Год назад +1

    💡 *THANKS FOR SHARING THE VIDEO.*

  • @SkyenNovaA
    @SkyenNovaA 2 года назад +18

    Man, tor is awesome.
    I'm glad bridges exist for those in police state countries.

  • @WitchMedusa
    @WitchMedusa 2 года назад +9

    I will one day run a tor node so that I can give back to the network. I dont like the idea of being just a consumer. I want to pay back all the bandwidth I've used & a thousand times more, (which I imagine would happen pretty quickly if I had a dedicated computer running 24/7).
    You should make a guide on how to make a Tor node & also properly harden a computer which would be running as a tor node against attacks. Personally I am fairly garbage with linux but I can typically get stuff working with enough time.
    Try to make it a normy guide to setting up & securing a tor node PC. Just simple stuff like Ubuntu Server or whatever the standard is. I know lots of people use that & its easier than stuff like arch. Hopefully you can get a few people like myself running nodes who aren't the best with technology.

    • @RTPTechTips
      @RTPTechTips  Год назад +1

      Since your comment I created an automated Snowflake service installer.
      This allows you to automatically become a Tor Snowflake Bridge.
      And I created it to run under a lower privilege "snowflake" user (which the script adds for you with /sbin/nologin for security reasons.
      Check it out: github.com/RightToPrivacy/snowflake-tor-service
      all you need to do is run: sudo bash install.sh
      And it will do the rest! After this you can check the status and see how many connections you got with:
      sudo systemctl status snowflake
      And you can stop it anytime:
      sudo systemctl stop snowflake
      You can disable anytime if you change your mind (stops it from starting at boot again):
      sudo systemctl disable snowflake
      I even added an 'upgrade' option since the original. So to upgrade later to the latest snowflake features you would run (after installed):
      sudo bash install.sh upgrade
      Let me know if you have a question.

  • @Sandy-l8e
    @Sandy-l8e 2 года назад +3

    I realy needed this tutorial tnx💙

  • @RTPTechTips
    @RTPTechTips  2 года назад +5

    To clarify: Snowflake bridges are partly made up of Firefox/Chrome browser users, this potentially creates a changing pool of provided bridges (depending on browser being open to become a bridge for browser extension users - there are also dedicated snowflake bridges, as well as OBFS4/Meek-azure). Install Snowflake Bridges extension to your browser, and help the Tor community resist censorship here: ruclips.net/video/DfX1gUx0YDg/видео.html

  • @PathOwOgenEmpire
    @PathOwOgenEmpire 2 года назад +3

    Thanks man! I was if-y on which bridge was the best, and now I feel assured that snowflake is the best one. Based on your simple and easy to understand explanation. :3

    • @RTPTechTips
      @RTPTechTips  2 года назад +1

      Happy to hear it helped 🙂 Thanks for posting feedback!

    • @74different74
      @74different74 11 месяцев назад

      Keyword "Feel" assured, not are secure

  • @RTPTechTips
    @RTPTechTips  2 года назад +1

    Originally planned a tutorial directly related to Pinetab/Pinephone - sadly in mid record found I was missing something from the kernel and had to put that one off until I finish setting the software up on my recent Arch install (this is part of why this video is of the devices themselves).

  • @RTPTechTips
    @RTPTechTips  2 года назад +4

    I will be covering additional information on other types of bridges - all are great options and you may achieve greater speed with Obfs4!

  • @awangjeme2531
    @awangjeme2531 8 месяцев назад +1

    Well explained. Thank you. Bring more information videos for noob like me.

    • @RTPTechTips
      @RTPTechTips  8 месяцев назад

      Appreciate that, Willdo.

  • @sibasismahapatra27
    @sibasismahapatra27 Год назад

    Wow ! Explanation at it's best 🔥

    • @RTPTechTips
      @RTPTechTips  Год назад

      Thanks feedback much appreciated!

  • @keypo790
    @keypo790 Год назад

    ended up here because of my helicopter parents, Hooray, i'm gonna become an it guy in the future!

  • @lorenzobenzakour5192
    @lorenzobenzakour5192 2 года назад

    Nice video!

  • @lifeinlife24
    @lifeinlife24 2 года назад +1

    Thanks for the info. Would a bridge work if a site says it’s unreachable?

    • @RTPTechTips
      @RTPTechTips  2 года назад +1

      A bridge won't change the destination result (the exit node connects to destination), but instead changes the entrance to Tor network. The time you want a bridge is if ISP blocks Tor and you can't connect to the network itself. If you are having destination unreachable, try changing the exit node: shift + ctrl + L

    • @lifeinlife24
      @lifeinlife24 2 года назад

      @@RTPTechTips Thanks bro. Shit actually works.

    • @RTPTechTips
      @RTPTechTips  2 года назад

      @@lifeinlife24 you're welcome :)

  • @rationalism_communism
    @rationalism_communism Год назад +1

    I don't think tor correlation de anonymizes users, because how can you correlate tor traffic? because there is lots of users, so how can you correlate traffic if you don't know if its the same traffic?

    • @RTPTechTips
      @RTPTechTips  Год назад +1

      It's not something most can do. Definitely not a "corporate snooping" risk (unless they run both exit / entry for given user). All kinds of things sold by ISP's (netflow etc).
      If one has extraordinary access across the internet, ability to watch both entry point, and exit flows simultaneously, correlate large download or other distinctly unique behavior (along same timeframe).
      As well sometimes advice is partly theoretical "be safer by doing x" than likely to happen.
      99.9999% of people have no need to worry IMHO.

    • @rationalism_communism
      @rationalism_communism Год назад +1

      @@RTPTechTips alright I made a minute video explaining what Im talking about.
      ruclips.net/video/iN-P8EnLpWw/видео.html

  • @buttonsplaymusic4896
    @buttonsplaymusic4896 2 года назад

    Can you use a cell phone/ Linux phone as a router VPN? I mean, use it to connect to whatever router provides wifi. Then use your device to connect to the phone/Pinephone?
    Or do you have a video on wifi VPNs or something? Whatever the thing is that sits on your side of the wifi provider router.

    • @RTPTechTips
      @RTPTechTips  2 года назад +2

      The great thing about linux phones: you can do anything with them that you can do with a Linux PC. And that's a big reason I cover them - to show universal linux tutorials: for both phones and computers. They can run/act on the same applications.
      And so you can create a Tor or VPN router out of a Linux phone. I don't have a video on doing this - and I don't recommend traditional VPN's as you can't audit them. And too many have turned on users.
      In fact VPN's were not created for privacy - they were created for employees to work within the employer's network, remotely. Many VPN provders that were once trustworthy have been found to sell user logs and data. We just don't know and I only promote what is provable for user safety. Just my stance on the topic.
      When one connects to a VPN, they are transferring data their ISP would normally have over to that VPN provider. And the VPN provider could be malicious/MITM among other things.
      If you mean On Christmas I released a custom singleboardcomputer (raspberry pi) image that allowed users to automate creating a more private for device metadata and security options router. It was available as a download for that entire week as a surprise to encourage subscribers. But this acts as another ip network router. It's not setup as a VPN, but does have adblocking dns, some firewalling built in. And if that is something you are interested in, as a subscriber I would b happy to share with you righttoprivacy[at]tutanota
      I don't have a current tutorial on setting up Tor router at this time, if that is more what you mean (most related is a tor hardware router image I maintain as an "Extra service" on bmac blog)
      And setting up from scratch tor router tutorial video is something I've considered - it just takes many steps and would end up being very time consuming to make - YT limits videos to 15min until identity verification. It's something I've considered as a series sometime in future, but not sure if it will get hits here as it isn't commonly searched topic.
      I do have some custom secure/priv communications tutorials coming up I'm currently working on. And more security audit/fix planned videos coming.
      As well as Linux phone/Linux related that may include routers sometime in the future (it's something I was looking at as an idea :) ).

    • @buttonsplaymusic4896
      @buttonsplaymusic4896 2 года назад +1

      @@RTPTechTips I think you're right about VPN companies. Really, anything that's not FOSS isn't worth even looking at, right?
      I'll look forward to whatever vids you make in the future, and yeah it'd be interesting to see what a VPN router even is. I've only heard people talk about it.

    • @buttonsplaymusic4896
      @buttonsplaymusic4896 2 года назад

      Another vid you might consider doing is, just open Task Manager (or similar) and go along and say, "Oh what's that?" "Oh that's a program that does such and such." "Oh and what's that?" It would help less technical people understand how to look at the processes taking place on their computers.

    • @RTPTechTips
      @RTPTechTips  2 года назад +1

      @@buttonsplaymusic4896 Yep. Best bet is to use Tor for privacy. When you want privacy, anonymity + strong end to end encryption security, go for .onion addresses.
      I covered VPN's and why we should be cautious + how to detect one MITM attacking you here: www.buymeacoffee.com/politictech/extra-not-all-vpn-are-what-they-say-they-are-supporter-post
      Some of the VPN's in the above article were highly trusted for years -- suddenly bought out by surv contractors. Are they trustworthy now? Sadly, we may never know.
      What we do know is one company was bought for $1bil! That's a lot of vpn's they have to sell to get that money back.
      Look forward to covering more topics. :)

    • @RTPTechTips
      @RTPTechTips  2 года назад

      @@buttonsplaymusic4896 Another thing about VPN's to be aware of is real names/account data is linked in.
      Better option would be Tor, or at the least proxies.
      I have a video + article on proxychains usage: www.buymeacoffee.com/politictech/howto-anonymous-internet-with-proxychains-tor
      That combo isn't connected to ID of user, is more decentralized.
      VPN's have a single point of failure - if that single point fails, there goes any potential benefit!

  • @danielteixeira309
    @danielteixeira309 Год назад

    How to use social media like facebook or instagram with tor ? Or can you use it with Tor?

    • @RTPTechTips
      @RTPTechTips  Год назад

      You can use Mastodon (Twitter but open source, decentralized) with Tor. Pixelfed is an Instagram replacement that is Tor friendly.
      Unfortunately one of the things that makes data valuable: is the ID behind it.
      *Most won't allow anonymity.*
      It's a feature, not a bug. 😜
      Though for the good news: you can use Twitter with Tor Browser.
      Official Twitter Onion: twitter3e4tixl4xyajtrzo62zg5vztmjuricljdp2c5kshju4avyoid.onion

  • @deadcow1
    @deadcow1 Год назад

    Can your ISP know that you are using Torr with Bridge?

    • @RTPTechTips
      @RTPTechTips  Год назад

      Not on the surface (appears as common protocol). But with deeper packet analysis (if someone is very "interesting), in some cases, sure.
      Personally I'm of the though that we should continue to spread and normalize Tor usage.
      There's nothing wrong with using it. Even law enforcement uses Tor on a regular basis to perform their investigations (according to sources).

  • @Matheus77
    @Matheus77 4 месяца назад

    Which bridge is most secure? I don't live in a country with a lot of censorship, just to have more anonymity..

    • @RTPTechTips
      @RTPTechTips  4 месяца назад

      Snowflake is a great option

  • @renatonunesachkar8223
    @renatonunesachkar8223 9 месяцев назад

    Cool

  • @thebirdsnest3435
    @thebirdsnest3435 2 года назад +2

    Do hackers use tor networks to hack a website

    • @RTPTechTips
      @RTPTechTips  2 года назад +3

      Most users of Tor use it for ethical privacy, anonymity purposes. Of course with those benefits (anonymity potential), a few ppl will abuse the service. As with anything else. ;)

    • @thebirdsnest3435
      @thebirdsnest3435 2 года назад +1

      @@RTPTechTips did hackers access the crypto vault. Bitcoin etc erherium etc.

    • @HeyItsQuantum
      @HeyItsQuantum Год назад

      ​@@thebirdsnest3435 what

    • @GiyuTomiokaTheOneAndOnly
      @GiyuTomiokaTheOneAndOnly 2 месяца назад

      ​@@thebirdsnest3435 bro what ? 🤣🤣

  • @laserfacts5466
    @laserfacts5466 9 месяцев назад

    I got potentially blocked from tor what should I do I don't know what bridges I should use

    • @RTPTechTips
      @RTPTechTips  9 месяцев назад +1

      Try the snowflake, it appears like a voice / video call to the network providing. I show on video how to connect to it - just go into connection settings and select "snowflake".
      If you can't get that to work, there is an option to "request a bridge", which should work for you.

  • @dingokidneys
    @dingokidneys 11 месяцев назад

    As I live in a liberal democracy, I run a Snowflake docker instance on a Raspberry Pi 4 to provide a bridge for those who are not in such a privileged position.
    You can also just run the Snowflake browser extension to provide the same service whenever your browser is open. You don't need to dedicate 24/7 hardware space, processor cycles and power to it as I do, just allow a little more traffic whenever you have your browser open.

    • @RTPTechTips
      @RTPTechTips  11 месяцев назад

      This is great! Love to hear from others also running Snowflakes. I run a dedicated one on a singleboard computer myself (and browser extension, cuz: why not?).
      The Docker you mention is a great option. For those unfamiliar with docker, I also wrote another option for anyone wanting to compile. It automatically downloads latest source, compiles & installs it under a snowflake user service.
      Also offers an "upgrade" argument option to upgrade to latest snowflake anytime. Here for anyone reading this comment that may like to try in future: gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/snowflake-tor-service (tor browser accessible).
      I feel the more options, the better for all.
      The more people we help to run snowflakes, the stronger Tor becomes for all of us. ✊ 🧅
      Thanks for running one! 😃

  • @Silverballer48c
    @Silverballer48c Год назад

    Interesting shit

  • @TasmanianTigerGrrr
    @TasmanianTigerGrrr 9 месяцев назад

    Will a bridge appear like im not connecting to Tor to outside parties? ISPs ect

    • @RTPTechTips
      @RTPTechTips  9 месяцев назад

      On the surface, yes. But if under more deep packet inspection, ISP could determine bridge. Most have good experience with Snowflake, which appears like a video / voice call.

  • @ucok1789
    @ucok1789 11 месяцев назад +3

    Left handed 💪 Geniuses are left handed

  • @magnotta91
    @magnotta91 2 года назад +1

    which bridge is safer?

    • @RTPTechTips
      @RTPTechTips  2 года назад

      Whichever you prefer. Snowflakes are recommended for those in the East right now where internet censorship is happening - causing other options to be blocked. I sometimes use bridges, sometimes don't. If dealing with internet censorship (blocking of tor), try Snowflake. But other bridges are equally valuable part of the network imho. You can also request a new bridge here (or use defaults in browser): bridges.torproject.org/

  • @dianf2p552
    @dianf2p552 6 месяцев назад

    first time seeing linux tablet

    • @RTPTechTips
      @RTPTechTips  6 месяцев назад

      It's nice to have one, for many things. Portable Linux tool based control station for other devices like hackrf, pwnagotchi with a mere tablet in hand. Might have to break it out again.