MPson 0 Posted ... Hi, Has anyone had any experience using JonDoNym?? It seems a bit like Tor. https://anonymous-proxy-servers.net/ Quote Share this post Link to post
zhang888 1066 Posted ... You should probably stick with Tor.A more predictable and trusted project, much more audited for that reason as well. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
ravenheart 6 Posted ... Hi, Has anyone had any experience using JonDoNym?? It seems a bit like Tor. https://anonymous-proxy-servers.net/ Chrisb, I would agree with Zhang888, on the simple reasoning that jondonym has a service to sell you in the end, if you wish to use tor which is their model, you can easily use the Tor browser and with a little tweaking and addons get the exact same results as jondonym, as far as the results go if you use their anonymity test... Just a thought. Adding a third party service or whatever you want to call it adds another level of possible mistrust or abuse into the equation. Quote Share this post Link to post
telemus 16 Posted ... Hi there.I have had a play on JonDoNym. Unless you pay, it is very slow (about 50kbps). It is easy to set up and use. The browser does look pretty hardened - according to a heap of leak tests, one of which they advertise: http://ip-check.info/. They have on their site a white paper, explaining the differences between themselves and TOR - and claiming they are better. I do not have sufficient knowledge to be able to evaluate their claims, but from the description, it does look different. Also, since they use a cascade of servers, one would need to be confident they maintain physical security over them and that they crypto protocols are state of art. The Snowden leaks show pretty conclusively that TOR was and is being targeted. And there have been a heap of court cases where people using TOR have been found - and not only because they were stupid. A quick search revealed: https://nakedsecurity.sophos.com/2015/09/04/3-ways-to-get-busted-on-the-dark-web/ https://www.techdirt.com/articles/20140401/17422126773/yes-federal-agents-can-identify-anonymous-tor-users-because-most-people-dont-know-how-to-be-anonymous.shtml [but links to articles claiming TOR is "mostly safe": https://www.techdirt.com/articles/20131004/10315624752/nsa-trying-hard-to-compromise-tor-its-still-mostly-safe.shtml] But then, the state goes after the exit relays: http://www.npr.org/sections/alltechconsidered/2016/04/04/472992023/when-a-dark-web-volunteer-gets-raided-by-the-police Which means the exit relays can be identified - but that is known. I think, increasingly, use of TOR is a marker to authorities that a person is up to no good (even if they are not). VPN use is mainstream but TOR is not - at least in Western countries. You are making yourself a target. Airvpn offers TOR over VPN - as do other VPNs - and that would obfuscate your location to some extent, I suspect. It is an interesting theoretical conundrum, but with real world consequences. Quote Share this post Link to post