Depends did you check though the browser, or qBittorrent?I did check my IP address and it was different than without using my method. Why?
Depends did you check though the browser, or qBittorrent?I did check my IP address and it was different than without using my method. Why?
What do you mean? I checked it through that https://ipleak.net/ website I linked to. How do I check it in qBittorrent?Depends did you check though the browser, or qBittorrent?
Scroll to the bottom of the page, and click the "Torrent Address detection" button.What do you mean? I checked it through that https://ipleak.net/ website I linked to. How do I check it in qBittorrent?
Oh. That's actually what I did. I guess I didn't explain it very well. Anyway, it didn't show my real IP like it did when I turned the proxy off in qBittorrent.Scroll to the bottom of the page, and click the "Torrent Address detection" button.
Well your config will allow most of your P2P traffic though Tor, my config routes ALL traffic though Tor (except the last step it just Increases traffic), and you don't need to have the browser open, so it will not slow down your computer as much.Oh. That's actually what I did. I guess I didn't explain it very well. Anyway, it didn't show my real IP like it did when I turned the proxy off in qBittorrent.
Ok, I added your method to the OP. I only added it as an alternate method because some people might feel uncomfortable using software called "The Pirate Browser".Well your config will allow most of your P2P traffic though Tor, my config routes ALL traffic though Tor (except the last step it just Increases traffic), and you don't need to have the browser open, so it will not slow down your computer as much.
Every little bit helps! The main reason I suggested using torrents to bog down Tor was because I read that that is already a problem, so it seemed the most efficient way. However, you have a good idea of streaming stuff using the Tor browser! As I said in the OP, what I really want is an app that runs in the background and uses minimal CPU usage, but maximum Tor bandwidth usage. Soon I'll look into writing such a program.Hmm.. Even with Konno Ryo's advice I still haven't gotten it to work, everything works and uTorrent starts, it's just upload/download speed is 0/kbps. Probably Windows 10's fault. I knew I shouldn't have upgraded so soon.
Welp even if I can't bog tor with torrent bandwidth, I can still do some kind of bogging. I can access the tor browser, now I just need a website that will stream me unlimited data, something like an online bandwidth stress test, accept it never ends. Same thing, right? Anyone know a good website like that? Like Twitch Mega or YouTube except never ending.
Twitch works, too bad it bogs down my antique CPU usage, which also means I can't handle more than one Twitch stream at once. I'll be getting a new PC soon enough hopefully.
How's this bandwidth? Not good enough?
Bob Ross 24/7 stream incoming
Currently, I'm looking into connecting to Tor, then disconnecting, then connecting, and on and on forever. However, I'm not sure how much bandwidth that would actually use. Another idea is to randomize the sites to spam between giants like google, amazon, yahoo, etc. That would spread out the load.Yeah, I was thinking, what's a DDoS attack to Twitch and what's a DDoS attack to tor? Twitch may not even care if it means they draw more viewers to their site.
I was also thinking if the bandwidth is spread out over multiple sites it might not be such a big deal to those sites. mega.nz might work well, if someone finds a big Mega file, say 50/200 GBs big, we can download it over and over, they can't just take it down from the public. It's not a phony file dedicated to DDoS, it's real and someone is using it. That just brings me back to what's a DDoS attack to Mega and what's a DDoS attack to tor?
But you are right, a standalone program that just spams bandwidth directly to the tor network would be the best. As little collateral damage as possible.
Daesh uses TOR - Therefore we must spam TOR
Well, think about it this way: If we had shut down Tor some time before the Paris Attacks, then they would've had to find another way to communicate. Now, there is a good chance that whatever new system of communication they would choose will be hackable by counter-terrorism organizations. Meaning that if we had taken down Tor before the Paris Attacks, hundreds of people probably would still be alive. Even though it's too late to save those people now, ISIS undoubtedly is planning and will plan many other deadly attacks. If we take down Tor as soon as possible, there is a very good chance that that would save the lives of many people. Now, it's possible you understand something about this that I don't. If that is the case, would you mind elaborating on your statement "This is one of the stupidest ideas I've ever heard."? Also, as jamieyello pointed out, after ISIS is gone, the DDoS attack on Tor could stop and the network could be used again!I'll quote myself:
Daesh uses TOR - Therefore we must spam TOR
This is one of the stupidest ideas I've ever heard.
That's a good idea! I remember reading about it somewhere before, but the reason ignored it was because I didn't want to get the many legitimate users of Tor in trouble as well as ISIS. There are plenty of people on Tor who are technically breaking the law, but they aren't really doing anything that bad.To beat Tor, we need to "infect" as many relay nodes with our monitoring nodes as possible. This decreases anonymity of everyone who uses the network since data relayed to an "infected" node unveils the direct previous node and if there are many "untrusted" nodes, nodes by real users are more likely to attract attention so participating as relay node and tracking accesses can also help.
From what I gather they communicated with plaintext SMS and not TOR.Well, think about it this way: If we had shut down Tor some time before the Paris Attacks, then they would've had to find another way to communicate. Now, there is a good chance that whatever new system of communication they would choose will be hackable by counter-terrorism organizations. Meaning that if we had taken down Tor before the Paris Attacks, hundreds of people probably would still be alive. Even though it's too late to save those people now, ISIS undoubtedly is planning and will plan many other deadly attacks. If we take down Tor as soon as possible, there is a very good chance that that would save the lives of many people. Now, it's possible you understand something about this that I don't. If that is the case, would you mind elaborating on your statement "This is one of the stupidest ideas I've ever heard."? Also, as jamieyello pointed out, after ISIS is gone, the DDoS attack on Tor could stop and the network could be used again!
Well, I just did some more research, and it looks like you are partially right. They do use other methods of communication sometimes, but the darkweb through Tor is also a HUGE asset to them. It's where they get a lot of their guns and ammunition, and they also do a lot of recruitment there too. Also, a lot of the other communication systems they use require the Tor network. Here, take a look at these articles:From what I gather they communicated with plaintext SMS and not TOR.
Correct! Now, since Tor is built to be completely anonymous, how do you think anyone can be caught doing this?What you're trying to orchestrate is what's known as a DDoS attack, which is a federal crime in every civilised nation.