[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor and Google error / CAPTCHAs.



On 2016-09-27 09:45, Alec Muffett wrote:
On 27 September 2016 at 09:42, Mirimir <mirimir@xxxxxxxxxx> wrote:

Exactly.  This manifests where folk on Twitter complain that "zomg i'm
using the onion site and it's blocked me!" - when in fact some perhaps code is running - code that someone took the time to write - to learn/remember
that you are a person who logs-in over Tor, that you really are who you
claim to be, and that this is all "okay".

Otherwise the first time that someone logs-in from a Tor exit node might be someone using Tor to experiment with your credentials, which they phished off you via an e-mail, or something. (This is another popular misuse of Tor
from the perspective of the big platforms.)

It is definitely a _tough_ problem.

    -a


This is exactly my issue. If I login to my Gmail or FB account then invariably Gmail or FB thinks I am a suspicious person hence "Something seems a bit different about the way you're trying to sign in. Complete the step below to let us know it's you and not someone pretending to be you" or worse "Google couldn't verify it's you, so you can't sign in to this account right now." In the FB case, I am asked to identify my "friends" half of whom have baby photos or the image is unclear.. Sometimes I get them wrong and am locked out for a few hours. And this is when connecting via the FB .onion address.

IMO, and I am curious to know what Alec thinks, Google, FB, etc are creating far too many false positives. Googling "Something seems a bit different about the way you're trying to sign in" results in numerous cases where innocent users have been locked out.

Two questions:

Is there a way that using an exit node for Gmail, FB, etc will not be considered suspicious? Is that even possible?

Is it possible to use a different proxy way to access Gmail, FB, etc without being seen as suspicious? For example, one could use proxychains with Tor followed by a SOCKS proxy to login.

In both cases above (exit node and exit node plus SOCKS) we assume that the IP address more or less matches the "normal" non-proxy login. I am in Paris and use a Paris exit node and a Paris SOCKS proxy for example.

Finally, thanks for participating in this discussion. It is rare to have people who work or used to work at the major webmail and social media companies from a) getting involved and b) providing a nuanced (not anti-Tor) perspective.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk