Let's Prevent World War 3!

Discussion in 'The Edge of the Forum' started by Mr. Mysterio, Nov 19, 2015.

Thread Status:
Not open for further replies.
  1. Konno Ryo

    Konno Ryo gbatemp's clueless butler?

    Member
    158
    162
    Aug 5, 2015
    Canada
    Somewhere?
    Depends did you check though the browser, or qBittorrent?
     


  2. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    What do you mean? I checked it through that https://ipleak.net/ website I linked to. How do I check it in qBittorrent?
     
  3. Konno Ryo

    Konno Ryo gbatemp's clueless butler?

    Member
    158
    162
    Aug 5, 2015
    Canada
    Somewhere?
    Scroll to the bottom of the page, and click the "Torrent Address detection" button.
     
    Mr. Mysterio likes this.
  4. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Oh. That's actually what I did. I guess I didn't explain it very well. Anyway, it didn't show my real IP like it did when I turned the proxy off in qBittorrent.
     
  5. Konno Ryo

    Konno Ryo gbatemp's clueless butler?

    Member
    158
    162
    Aug 5, 2015
    Canada
    Somewhere?
    Well your config will allow most of your P2P traffic though Tor, my config routes ALL traffic though Tor (except the last step it just Increases traffic), and you don't need to have the browser open, so it will not slow down your computer as much.
     
    Mr. Mysterio likes this.
  6. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Ok, I added your method to the OP. I only added it as an alternate method because some people might feel uncomfortable using software called "The Pirate Browser". :P
     
    Konno Ryo likes this.
  7. jamieyello

    jamieyello Professional Dumbass

    Member
    369
    254
    Mar 11, 2013
    United States
    Hmm.. Even with Konno Ryo's advice I still haven't gotten it to work, everything works and uTorrent starts, it's just upload/download speed is 0/kbps. Probably Windows 10's fault. I knew I shouldn't have upgraded so soon.

    Welp even if I can't bog tor with torrent bandwidth, I can still do some kind of bogging. I can access the tor browser, now I just need a website that will stream me unlimited data, something like an online bandwidth stress test, accept it never ends. Same thing, right? Anyone know a good website like that? Like Twitch Mega or YouTube except never ending.

    Twitch works, too bad it bogs down my antique CPU usage, which also means I can't handle more than one Twitch stream at once. I'll be getting a new PC soon enough hopefully.

    [​IMG]

    How's this bandwidth? Not good enough?

    Bob Ross 24/7 stream incoming
     
  8. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Every little bit helps! The main reason I suggested using torrents to bog down Tor was because I read that that is already a problem, so it seemed the most efficient way. However, you have a good idea of streaming stuff using the Tor browser! As I said in the OP, what I really want is an app that runs in the background and uses minimal CPU usage, but maximum Tor bandwidth usage. Soon I'll look into writing such a program.

    — Posts automatically merged - Please don't double post! —

    I just realized that another issue with such a program is how it would slow down Tor. If it repeatidly accessed the same website over and over, it would accidentally DDoS that site in addition to Tor. I need to find some way to stress the network as a whole like a torrent does. The nice thing about using torrents is that they are meant to handle massive volumes of data without DDoS problems.
     
    Last edited by Mr. Mysterio, Nov 20, 2015
    jamieyello and Konno Ryo like this.
  9. jamieyello

    jamieyello Professional Dumbass

    Member
    369
    254
    Mar 11, 2013
    United States
    Yeah, I was thinking, what's a DDoS attack to Twitch and what's a DDoS attack to tor? Twitch may not even care if it means they draw more viewers to their site.

    I was also thinking if the bandwidth is spread out over multiple sites it might not be such a big deal to those sites. mega.nz might work well, if someone finds a big Mega file, say 50/200 GBs big, we can download it over and over, they can't just take it down from the public. It's not a phony file dedicated to DDoS, it's real and someone is using it. That just brings me back to what's a DDoS attack to Mega and what's a DDoS attack to tor?

    But you are right, a standalone program that just spams bandwidth directly to the tor network would be the best. As little collateral damage as possible.
     
    Mr. Mysterio likes this.
  10. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Currently, I'm looking into connecting to Tor, then disconnecting, then connecting, and on and on forever. However, I'm not sure how much bandwidth that would actually use. Another idea is to randomize the sites to spam between giants like google, amazon, yahoo, etc. That would spread out the load.
     
    Last edited by Mr. Mysterio, Nov 20, 2015
  11. jamieyello

    jamieyello Professional Dumbass

    Member
    369
    254
    Mar 11, 2013
    United States
    One last bit of input I have is maybe the application could send data from itself to other users, who receive it using the application. That might be a little more ambitious than just pinging a bunch of random sites over and over though. Maybe using those two methods in combination would work best, just maximizing bandwidth usage.
     
    Mr. Mysterio likes this.
  12. BullyWiiPlaza

    BullyWiiPlaza Nintendo Hacking <3

    Member
    1,727
    1,409
    Aug 2, 2014
    Germany
    To beat Tor, we need to "infect" as many relay nodes with our monitoring nodes as possible. This decreases anonymity of everyone who uses the network since data relayed to an "infected" node unveils the direct previous node and if there are many "untrusted" nodes, nodes by real users are more likely to attract attention so participating as relay node and tracking accesses can also help.
     
    Last edited by BullyWiiPlaza, Nov 20, 2015
    Mr. Mysterio likes this.
  13. Februarysn0w

    Februarysn0w School Idol Festival

    Member
    1,204
    518
    Oct 31, 2014
    Mino city Osaka
    listen your mind first then do it.
     
  14. DJPlace

    DJPlace P!ssed OFF Pyscho of GBA!!

    Member
    4,582
    379
    Apr 16, 2008
    United States
    what is this shit?!?
     
    Subtle Demise likes this.
  15. Minox

    Minox Spytech Employee

    Supervisor
    6,022
    2,602
    Aug 27, 2007
    I'll quote myself:
    This is one of the stupidest ideas I've ever heard.
     
    7iven8Nine, BDS and Subtle Demise like this.
  16. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Well, think about it this way: If we had shut down Tor some time before the Paris Attacks, then they would've had to find another way to communicate. Now, there is a good chance that whatever new system of communication they would choose will be hackable by counter-terrorism organizations. Meaning that if we had taken down Tor before the Paris Attacks, hundreds of people probably would still be alive. Even though it's too late to save those people now, ISIS undoubtedly is planning and will plan many other deadly attacks. If we take down Tor as soon as possible, there is a very good chance that that would save the lives of many people. Now, it's possible you understand something about this that I don't. If that is the case, would you mind elaborating on your statement "This is one of the stupidest ideas I've ever heard."? Also, as jamieyello pointed out, after ISIS is gone, the DDoS attack on Tor could stop and the network could be used again!

    — Posts automatically merged - Please don't double post! —

    That's a good idea! I remember reading about it somewhere before, but the reason ignored it was because I didn't want to get the many legitimate users of Tor in trouble as well as ISIS. There are plenty of people on Tor who are technically breaking the law, but they aren't really doing anything that bad.
     
    Last edited by Mr. Mysterio, Nov 20, 2015
  17. Minox

    Minox Spytech Employee

    Supervisor
    6,022
    2,602
    Aug 27, 2007
    From what I gather they communicated with plaintext SMS and not TOR.
     
    Subtle Demise and Mr. Mysterio like this.
  18. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Well, I just did some more research, and it looks like you are partially right. They do use other methods of communication sometimes, but the darkweb through Tor is also a HUGE asset to them. It's where they get a lot of their guns and ammunition, and they also do a lot of recruitment there too. Also, a lot of the other communication systems they use require the Tor network. Here, take a look at these articles:
    http://www.businessinsider.com/isis-is-using-the-dark-web-2015-7
    http://securityaffairs.co/wordpress/30271/intelligence/isis-avoiding-us-surveillance.html

    BTW, it's not TOR, it's Tor. Look at this: https://www.torproject.org/docs/faq.html.en#WhyCalledTor

    So, as I said in the OP, taking down Tor wouldn't completely stop their communication, but it would put a HUGE monkey wrench in them. Also, there is a very good chance that the confusion caused by the communications disruption would give other countries time to retaliate.
     
  19. Subtle Demise

    Subtle Demise h

    Member
    1,320
    1,326
    Sep 17, 2009
    United States
    What you're trying to orchestrate is what's known as a DDoS attack, which is a federal crime in every civilised nation.
     
    7iven8Nine and Mr. Mysterio like this.
  20. Mr. Mysterio
    OP

    Mr. Mysterio Super Genius

    Member
    661
    856
    Sep 16, 2014
    United States
    Rosalina's Comet Observatory
    Correct! Now, since Tor is built to be completely anonymous, how do you think anyone can be caught doing this?

    — Posts automatically merged - Please don't double post! —

    Also, there is no way to prove that anyone doing this is actually doing a DDoS attack. All that can be proven, in the worst possible case, is that they are downloading torrents through Tor, which is NOT illegal. (Providing that the torrents themselves are legal.)
     
Thread Status:
Not open for further replies.