Bigtex
VIP Member
- Aug 14, 2012
- 1,137
- 1,680
One of the things I do like about Tor is it spoofs a lot very important information. Below is an example. I am not using Windows 7 or Firefox, it also spoofs the time given from your computer which may or may not match the time of the VPN and it also changes the screen resolution as well as information about the plug-ins you have installed.
Your Browser User Agent String is Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Operating System:
Microsoft
Platform:
Windows 7
Internet Browser:
Firefox 52.0
Beta Version:
No
Connection Speed:
623.20 Kbps
Restrictive Firewall:
It also disables WebRTC ( you should disable this manually other browsers too)
WebRTC Leak Test
WebRTC Support Detection
RTCPeerConnection ×False
RTCDataChannel ×False
ORTC (Microsoft Edge) ×False
IP Address Detection
Local IP Address n/a
Public IP Address n/a
IPv6 Address n/a
WebRTC Media Devices
Device Enumeration ×False
Has Microphone ×False
Has Camera ×False
×False
×False
Unique Device ID's n/a
NSA also has spy servers set up that intercept ALL internet signals. Email, PM's or anything else you do can be seen. All of this can be prevented with PIA by making a few adjustments in your encryption level.
Maximum Protection
Data encryption: AES-256
Data authentication: SHA256
Handshake: RSA-4096
NSA has not broken AES 256 encryption of the RSA-4096 handshake and Government uses both for sending document with security clearance. Most likely they use both because they feel there is no chance of breaking the encryption. AES 128 has been broken and is not recommended in Government.
PIA utilizes high grade encryption based on the cryptographically secure Blowfish CBC algorithm which can be adjust manually to AES-256. This is used in conjunction with the OpenVPN protocol and is able to secure your data transmissions. The more complex the algorithm, the harder the cipher is to crack using a brute force attack which NSA computers use. 128 may take hours using a supercomputer but 256 would take years. Edward Snowden also says the OpenVPN has not been compromised by NSA. OpenVPN has two parts, data channel encryption is used to secure your data and control channel encryption secures the connection between your computer and the VPN server. PIA uses AES 256, SHA 256 and RSA 4096 on both channels.
So with PIA you can manually switch from a good security level, Blowfish-128 to what is considered to be the gold standard of encryption, AES-256. Again, this is what the Government uses to send secure information.
Your Browser User Agent String is Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Operating System:
Microsoft
Platform:
Windows 7
Internet Browser:
Firefox 52.0
Beta Version:
No
Connection Speed:
623.20 Kbps
Restrictive Firewall:
It also disables WebRTC ( you should disable this manually other browsers too)
WebRTC Leak Test
WebRTC Support Detection
RTCPeerConnection ×False
RTCDataChannel ×False
ORTC (Microsoft Edge) ×False
IP Address Detection
Local IP Address n/a
Public IP Address n/a
IPv6 Address n/a
WebRTC Media Devices
Device Enumeration ×False
Has Microphone ×False
Has Camera ×False
×False
×False
Unique Device ID's n/a
NSA also has spy servers set up that intercept ALL internet signals. Email, PM's or anything else you do can be seen. All of this can be prevented with PIA by making a few adjustments in your encryption level.
Maximum Protection
Data encryption: AES-256
Data authentication: SHA256
Handshake: RSA-4096
NSA has not broken AES 256 encryption of the RSA-4096 handshake and Government uses both for sending document with security clearance. Most likely they use both because they feel there is no chance of breaking the encryption. AES 128 has been broken and is not recommended in Government.
PIA utilizes high grade encryption based on the cryptographically secure Blowfish CBC algorithm which can be adjust manually to AES-256. This is used in conjunction with the OpenVPN protocol and is able to secure your data transmissions. The more complex the algorithm, the harder the cipher is to crack using a brute force attack which NSA computers use. 128 may take hours using a supercomputer but 256 would take years. Edward Snowden also says the OpenVPN has not been compromised by NSA. OpenVPN has two parts, data channel encryption is used to secure your data and control channel encryption secures the connection between your computer and the VPN server. PIA uses AES 256, SHA 256 and RSA 4096 on both channels.
So with PIA you can manually switch from a good security level, Blowfish-128 to what is considered to be the gold standard of encryption, AES-256. Again, this is what the Government uses to send secure information.