TOR CHATBy now you should know that any type of messaging system is likely compromised orstoring your data for an unknown period of time, and if you ever become a person ofinterest can be looked back upon for 5+ years.This means things like Gmail, Hotmail, Yahoo Mail, Skype Messaging, FacebookInstant/Private Message, Text Messages, and other forms of communication are all likelybeing monitored to some degree, at the very least logging the meta data. But you shouldalways treat everything as if those who are monitoring it can read the content of the emailas well.We have talked about communicating with PGP, we have talked about using TOR andhidden services, and we have talked about good practices of OpSec. But some of us wantto be able to instant message somebody else. The good news is; you can do this withsomething called TorChat.TorChat is a decentralized anonymous instant messenger that uses Tor hidden services asits underlying Network, in other words it communicates over the Tor network through the.onion URL protocol. This provides end to end encryption that we talked about inprevious posts. It provides cryptographically secure text messaging and file transfers forbusiness dealings, and confidential communication between two people. The best news, isthat you can use TorChat on your Windows, Linux and your smart phones. A Frenchdeveloper released a version for MAC users, but it still in beta and should be used at yourown risk. You can get TorChat for the iPhone in the Apple store, you can get TorChat inthe Android Market as well, so you can even use it as a means of text messagingsomebody else who also has TorChat.In TorChat, every user has a unique alphanumeric ID consisting of 16 characters. This IDwill be randomly created by Tor when the client is started the first time, it is basically the.onion address of a hidden service. TorChat clients communicate with each other by usingTor to contact the other’s hidden service. For example, the first time you open TorChatyour computer might generate d0dj309jfj94jfgf.onion and from here on out,d0dj309jfj94jfgf will be your TorChat ID that you give out to people that you want to beable to message you. Here is the home page of TorChat.https://github.com/prof7bit/TorChathttp://www.sourcemac.com/?page=torchat – MAC usersUnfortunately, at this time, TorChat does not run properly in Tails, so you will either needto run it on your Windows, Linux or MAC system. It is pretty straight forward, downloadit, unpack it and run it and everything else should happen automatically for you. Once theavatar beside your TorChat ID turns green, you are online and same with your contacts.You can add contains by right clicking and choosing Add Contact and just enter theirTorChat ID.At this time there is some people debate as to whether or not TorChat is completely safe,and I would say that TorChat is about as safe as Tor is, just make sure you practice the
same good practices you are used to. Do not give out personal information, if you aresending sensitive information use PGP encryption and so forth.Here is another article on how TorChat works going into a little bit more detail. You canaccess it over the onion network.http://kpvz7ki2v5agwt35.onion/wiki/index.php/Hacking_TorChat
- Page 2 and 3:
Tor and The Dark NetRemain Anonymou
- Page 4 and 5:
A FEW RECOMMENDATIONSCOLD BOOT ATTA
- Page 7 and 8:
INTRODUCTION TO TOR, HTTPS,AND SSLF
- Page 10 and 11:
PGP, TAILS, VIRTUAL BOXSo keep in m
- Page 13 and 14:
PGP Continued..Ok, so by now I am a
- Page 15:
and save it on your SD card or USB
- Page 18: The reasoning behind this is that s
- Page 21: Please get a clearer idea of how th
- Page 25: EXIF DATAI forgot to mention above
- Page 28: Third, drop the attitude. Do not ar
- Page 31 and 32: subscriber. No matter how tough the
- Page 34 and 35: THE ADVANTAGES ANDDISADVANTAGES OF
- Page 37 and 38: CONNECTING TOR -> VPN FORWINDOWS US
- Page 40: TRACKING COOKIESNext time I want to
- Page 43 and 44: And in this particular case, the fe
- Page 46 and 47: LEARNING FROM OTHERS’MISTAKES. HO
- Page 48: So when you are doing your freedom
- Page 51 and 52: user sup_g to his real identity.“
- Page 54 and 55: WHERE YOU MIGHT CONSIDERRUNNING TO,
- Page 57: SECURING YOUR ACCOUNTS FROMFBI MONI
- Page 60: encryption keys and SSL keys that p
- Page 63: TOR. And since Tails establishes it
- Page 66 and 67: where it says verify the integrity
- Page 68: Manager. We are going to import the
- Page 74 and 75: transportation, wear a hat, and all
- Page 76: creating a wallet and logging in to
- Page 79 and 80: you are using it. There is no reaso
- Page 82 and 83: MONITORING YOU WITH ANANTENNAFirst
- Page 85 and 86: COOKIES & JAVASCRIPT REVISITED,PLUS
- Page 87: whole, it can make it easier to ide
- Page 91 and 92: COLD BOOT ATTACKS,UNENCRYPTED RAM E
- Page 93 and 94: only disks, not RAM (memory).Keep i
- Page 95: with DDR1, DDR2 and DDR3 and their
- Page 98: defeated CryptoLocker, and this is
- Page 102 and 103: “5.20.130.121:9001 63dd98cd106a95
- Page 104 and 105: enforcement or the NSA would do. So
- Page 106 and 107: relay broker the connection between
- Page 108: Currently there are other pluggable
- Page 112 and 113: BITCOIN CLIENTS IN TAILS -BLOCKCHAI
- Page 115: ConclusionI hope this book was able