Jump to content
Not connected, Your IP: 18.118.226.167

Recommended Posts

Hi,

 

Has anyone had any experience using JonDoNym?? It seems a bit like Tor.

 

https://anonymous-proxy-servers.net/

 

Chrisb, I would agree with Zhang888,  on the simple reasoning that jondonym has a service to sell you in the end, if you wish to use tor which is their model, you can easily  use the Tor browser and with a little tweaking and addons get the exact same results as jondonym, as far as the results go if you use their anonymity test...  Just a thought.  Adding a third party service or whatever you want to call it adds another level of possible mistrust or abuse into the equation.

Share this post


Link to post

Hi there.

I have had a play on JonDoNym. Unless you pay, it is very slow (about 50kbps). It is easy to set up and use. The browser does look pretty hardened - according to a heap of leak tests, one of which they advertise: http://ip-check.info/.

 

They have on their site a white paper, explaining the differences between themselves and TOR - and claiming they are better. I do not have sufficient knowledge to be able to evaluate their claims, but from the description, it does look different. Also, since they use a cascade of servers, one would need to be confident they maintain physical security over them and that they crypto protocols are state of art.

 

The Snowden leaks show pretty conclusively that TOR was and is being targeted. And there have been a heap of court cases where people using TOR have been found - and not only because they were stupid. A quick search revealed:

 

https://nakedsecurity.sophos.com/2015/09/04/3-ways-to-get-busted-on-the-dark-web/

 

https://www.techdirt.com/articles/20140401/17422126773/yes-federal-agents-can-identify-anonymous-tor-users-because-most-people-dont-know-how-to-be-anonymous.shtml [but links to articles claiming TOR is "mostly safe": https://www.techdirt.com/articles/20131004/10315624752/nsa-trying-hard-to-compromise-tor-its-still-mostly-safe.shtml]

 

But then, the state goes after the exit relays:

 

http://www.npr.org/sections/alltechconsidered/2016/04/04/472992023/when-a-dark-web-volunteer-gets-raided-by-the-police

 

Which means the exit relays can be identified - but that is known.

 

I think, increasingly, use of TOR is a marker to authorities that a person is up to no good (even if they are not). VPN use is mainstream but TOR is not - at least in Western countries. You are making yourself a target. Airvpn offers TOR over VPN - as do other VPNs - and that would obfuscate your location to some extent, I suspect.

 

It is an interesting theoretical conundrum, but with real world consequences. 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...