Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
i2p looks cool but doesn't look like it will anonymize all traffic, just the things you do while in the browser window. If I wanted to anonymize other types of traffic, I would have to get a separate application.
From what I understand there's no way to be truely anonymous on the Internet. Nation-States Intel agencies pretty much own the Internet and can see everything you do no matter how anonymous you think you are or encryption you use. They have algorithms that can crack any encryption code. TOR as I never trusted because it was made by the u.s. Military is still vulnerable because they can monitor your entrance and exit node. It's designed after an old hacker trick. Hack into one box then another from that box and then another from that box and so on. These hackers would go thru 10-20 or even more computers before attacking their victim yet these hackers were Tracked down. All the best hackers who know encryption and anonymity get caught eventually so that should tell you something.
If you use TOR I read it's better to use TOR Browser with it since its customized to not leave any tracks like most browsers Would with TOR service. I.e. Using a plugin that uses JavaScript or going to a site that uses flash. Both coding will give info on who you are and where you're at. TOR is good to be anonymous from your highschool kid hacker but when it comes to intelligence agencies then there's no true anonymity unless you create your own internet using your own broadband lines. The NSA has a mirror set up at the U.K. Plant where most internet data comes through so they essentially get a copy of everything being done on the net.
I like to think al gore and the other politicians wanted the Internet created just to spy on us.
Im constantly watching YouTube videos regarding being anonymous and it's the same crap. Use TOR and Tails. Use i2p. Use VPN. Setup a proxy. Then I find out these are just a waste of time. Your ISP sees everything you do and hands the logs over to NSA.
If someone knows how to regain our privacy from evil eyes please post how.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.