why you thonk that this is normal?) i go on .ru not on .ua
Good day,
Because that is Yandexâs redirection when using an exit node to access the Russian version of their page. You have literally spent hours of everyones time here because of something that is expected and correct behaviour.
Have a nice day,
Ego
i dont understand you. yandex.ru is the russian site. i go on yandex.ru whith like german ip, why they redirect me to UkRAINE searching⌠not on rus or german
Good day.
Because and Iâll say it again, THAT IS THE WAY THE PERSON WHO MADE THIS PAGE SET IT UP. This redirection has been coded by the provider of Yandex. Simple as that.
Have a nice day,
Ego
but u dont redirecnig like you say, why? wht the different betwen my tor browser and yours
ps. dont get mad, im noob on this, just trying to understand.
âi stayed on russian versionâ that ur words
Good day,
As mentioned, I also get redirected to the Russian version of the TLD .ua. The .ua server is used but the site displayed is in Russian. Again, expected behaviour. Otherwise this would make no sense from a provider perspective.
Have a nice day,
Ego
hm interesting⌠tnx to you
Despite others persist on using TOR instead of firefox, I should mention that considering any software which communicates to the network in some way, and running it on Whonix workstation must be enough for the user to be confident that the destination party which receives data from the aforementioned software cannot specify the source and the real IP address of the machine on which the software runs. No difference whether it be firefox or any other software. User mistakes or in general what we usually refer to as bad habits may counteract these privacy reinforcement measures but the source of the problem is not the browser itself. So letâs avoid guiding the users in a way they confuse for what reason Whonix has been developed in the first place and degrading it to the level of sole Tor Browser Bundle. Whonix workstation is by itself safe to use when anonymity is desired since itâs isolated from the regular network traffic of the host machine. This is the users who should understand not to do anything related to their real personal life such as logging in to the websites which already have their geographical or personal information recorded at their database. Tor browser is for worst case usage because it generally refrains from sending anything related to the past usage of the browser or in other words neither does it remember what the user did before nor it helps websites to remember. The other important issue in conventional browsers which Tor browser addresses, is that they make possible (even easy in some scenarios) for adversaries to link the the behavior of one user in different websites. With all the advantages using Tor Browser exhibits, we should still help everyone remember to what goal Whonix has been introduced initially.
Yes I have previously read it, maybe you misunderstood me but I said nothing that contradicts what is explained there.
Good day,
Yes, you actually did by stating:
That is objectively wrong as pseudonymity allows one to identify a source in a lot of situations.
You even go further by stating:
Again, if you read and understood what I linked to, youâd know that you actually contradict yourself here.
Furthermore:
This isnât correct either. During a session, cookies are usually stored. So, the TBB actually does âremember what the user did beforeâ during a session. Keeping something over a session would be a problem and prevent users from being anonymous.
And that goal was? Right, to suplement things like the TBB. To give a better environment and added fail-safes for things like the TBB. The goal, and âwe should still help everyone to rememberâ that, of Whonix was to suplement, not to replace.
Have a nice day,
Ego
Again you did not get the point. Maybe I should have clarified my thoughts more to be easily understandable but unfortunately Iâm too busy to extend every explanation I propose. In brief what I say is by preventing bad habits and by taking enough precautions the user is not limited to use TBB whenever he wants to surf websites. You think everybody who installs Whonix is going to provide themselves with fail safe measures while using Tor Browser Bundle? If this, you have not heard about hackers. Whonix workstation can and actually is used for many things one can do in his very operating system. The difference is that the network is anonymized through Tor network. This same goal can be attained by configuring a conventional Linux OS (Debian for example not whonix) to route all traffic through tor channel but in the case of having OS compromised its security, the identity of the user is also compromised. This is where virtualization comes handy; simulating a physical gap between the OS and the default router. Whonix isolates the OS that is used and needs its network activity to be anonymous from the entity that is providing the anonymity service (Gateway), effectively lowering the chance of getting user identity and location compromised after workstationâs possible security breach. That is all the purpose of using something like Whonix.
This isnât correct either. During a session, cookies are usually stored.
I didnât know I should explicitly assert that I am not talking about user sessions. This case is clear enough to explain what I mean and I donât see a reason to be more specific and delve into the technical topics here. Thus an argument like this is actually useless to pursue though you can still disagree with me.
Have a nice day too!
Good day,
First of all, that would only be valid if some of the things you wrote werenât objectively wrong. Not just not properly fleshed out, but wrong. For example:
That, as explained before is simply wrong. No way of using Whonix, no matter by whom will make this right when using a browser whose fingerprint does not ensure anonymity by design. Even if you attempt to recreate the TBB, anonymity may not be achivable due to certain tracking techniques. And, if you donât, you are never anonymous during normal internet and hidden web service usage.
Wait what? You do know what Whonix does? You do know Whonix is designed to fail safe, right? That is the point of Whonix. To fail safe. Why should one have to provide themselves with something that is part of the design?
Iâm sorry but what does a local attack have to do with anonymity? And even if we talk about local attacks, using something other then the TBB for browsing would also make local (or as youâd call it hacking) tracking easier due to system specific traces not present when using the TBB.
Please read a thread before posting in it. Because you just said a lot, not having to do with this discussion. If you would read the thread, youâd know we are talking about BROWSER SPEFICIF ASPECTS of Whonix. What does this have to do with any usecase of Whonix not connected to browsing? Nothing. This thread has been covering browser based tracking before you started writing. Additionally, you have still not delivered a single explanation of who the TBB is would not be required to ensure anonymity in any situation in which a browser is required.
Again, since all the talk was about normal browsing up to your comment (specifically in regards to Yandex and Google), you shouldnât be suprised if anyone reading your comment would soely attribute it to that topic.
Have a nice day,
Ego
First of all, that would only be valid if some of the things you wrote werenât objectively wrong
I for sure would rather be objectively wrong in your point of view than failing to understand a simple paragraph; making the writer repeat his sentences over and over again. Using insulting and judging someoneâs knowledge without knowing him is the least to show a childish behavior.
you shouldnât be suprised if anyone reading your comment would soely attribute it to that topic
The only thing that surprises me here is wondering in what way I should have explained more clearly than this? This argument lacks the fundamental requirements of a standard scientific discussion and you keep expressing your misunderstandings about what I said. You misunderstood what I mean by âIf this, you have not heard about hackersâ since I was not talking about to be attacked, be it local or remote, you misunderstood what I mean by saying âWhonix workstation is by itself safe to use when anonymity is desiredâ, you misunderstood ⌠and finally I doubt that you have correctly understood a single word of what Iâve said.
So letâs just stop this discussion as itâs getting worse than useless.
Good day,
Odd, I never did that. Isnât judging someoneâs knowledge something like this:
Explain this one, single sentence you wrote in your previous post:
With this you imply (and you stated it more clearly in the post prior to that) that if the user was âpreventedâ from âbad habitsâ and took âprecautionsâ, heâd stay as anonymous as when using the TBB.
This is NOT POSSIBLE. There are certain parts of a browser fingerprint that CANNOT be negated and PREVENT a user from being anonymous. What kind of precautions would make the simple fact of fingerprinting and pseudonimity go away?
Instead of calling my arguments âchildishâ, Iâd like to hear the precautions you talk about.
The only thing that âsurprises me here is wondering in what way I should have explained more clearlyâ that anonymity is known to not be achievable when using any browser other than the TBB.
Pseudonymity yes. Anonymity no. Because of the âherd immunityâ provided by the amount of TBB user.
No matter what precautions you come up with, you cannot imitate that. If you can, you have found a solution to a problem no one in the Tor community has been able to find.
So again, if you could tell us these âprecautionsâ, Iâm sure you will be celebrated by everyone relying and advocating on anonymity, including myself.
Correct, as stating that there are precautions that negate the advantages of the TBB, then not delivering, really shows a lack of fundamental requirements for any discussion, scientific or otherwise.
What were you implying then? The statement âyou have not heard about hackersâ does imply an active attempt of system sabotage, i.e. hacking. What else could one mean when mentioning âhackersâ. Because if you are simply talking about the initial, non primary meaning of âhackerâ, i.e. someone who uses something outside of its initial parameters, that would fit even less when talking about using an Operating System which does not have any set parameters inside an average usecase.
You yourself said:
You yourself talked about surfing. Something only possible anonymously in conjunction with the TBB.
Again, if you could tell anyone the parameters you talked about before, the entire community would be very thankful. There wouldnât and actually be a discussion if these parameters exist.
Have a nice day,
Ego