Pages:
Author

Topic: How anonymous is TOR really? - page 2. (Read 24528 times)

sr. member
Activity: 350
Merit: 250
June 07, 2013, 06:35:11 PM
#34
I don't understand how would anyone benefit from VPN or offshore VPS !?! Well imho noone can even know what traffic is your and what is not when you are connected to Tor (you are a node) - as there is know way to know where the the message originated. Or am I mistaken?
hero member
Activity: 574
Merit: 500
June 05, 2013, 06:11:24 PM
#33
I like the idea of anonymous internet activity - trouble is all the baddies that use it too...
full member
Activity: 168
Merit: 100
Want some pi with that?
June 05, 2013, 05:53:03 PM
#32
I use TOR from time to time but usually use VPNs because of security and peace of mind (but mostly just something to spend bitcoins on)
hero member
Activity: 574
Merit: 500
June 05, 2013, 04:21:35 AM
#31
This guy proved it was anonymous - the only way they caught him was due to his ego...

http://www.bbc.co.uk/news/technology-22248692

This is a great article, however I'm not sure if this truly proves tor is completely anonymous.

From bbc website:
Quote
After Mr Katayama's arrest, the NPA sought guidance on how to handle similar cases. The industry report drawn up for the NPA recommended considering a ban on Tor and other anonymising networks as they had been found to be used in a wide variety of crimes.

Japanese ISPs have not welcomed the recommendation.

If the ISP's begin to intervene, then I agree. Anonymity will be compromised. Until then however, if you used it correctly according to all the guidelines... it is anonymous.
newbie
Activity: 14
Merit: 0
June 04, 2013, 09:49:02 PM
#30
This guy proved it was anonymous - the only way they caught him was due to his ego...

http://www.bbc.co.uk/news/technology-22248692

This is a great article, however I'm not sure if this truly proves tor is completely anonymous.
legendary
Activity: 4228
Merit: 1313
June 04, 2013, 07:15:59 AM
#29
The advice above is good, but also check out the links below.  Tor is great, but still has issues which one hopes will be remedied in the future to make it even better:

1. "Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration." -- https://www.torproject.org/about/overview

2. Also read this section of an overview, then check out the links:   http://en.wikipedia.org/wiki/Tor_(anonymity_network)#Weaknesses

3. https://lists.torproject.org/pipermail/tor-dev/2012-September/003992.html

4. https://tails.boum.org/forum/Who_carries_half_of_all_Tor_traffic__63____38_operators/

5. http://www.syverson.org/tor-vulnerabilities-iccs.pdf

One longer-term issue is the centralized nature of the Tor directory servers.


I have the impression that TOR is not completely secure to keep you anonymous if you use the same session (IP) to visit several websitess since your IP-address will be saved in those websites logs.

Another scenario is Google & other big sites sharing data about their users with each other to get a better understanding of their registered and unregistered users. Even fragments of information can match with a real identity, for example the patterns of the languange used in your google searches, your blogs, tweets, emails, forum discussions (at bitcointalk) can easily be analyzed. Google has been indexing internet for years so they have all data they need. The more sources they got, the more accure they can match different mails, tweets and forum posts with each other, even if the IPs used are completely different (with help of TOR).

One solution for cautious people is of course to use encryption in all communication and never share data at public places (never writing posts at forums like this). I guess guys like Satoshi change their language pattern in forums and mails so they can remain anonymous.
legendary
Activity: 2912
Merit: 1060
June 04, 2013, 06:14:03 AM
#28
http://ra.fnord.at

Don't forget to use the TWO virtual machine method, disable js and plugins, check ssl certs, don't accept bad ones.
What do you mean with 2 virtual machines?
legendary
Activity: 1176
Merit: 1280
May Bitcoin be touched by his Noodly Appendage
June 04, 2013, 06:04:57 AM
#27
Quote
Don't forget Govt monitors darkweb too..
Government suits monitoring darkweb is like staring at Goatse image all day long and being paid for it. They cannot do much about information in darkweb. Unless someone does something unimaginably stupid.
Actually laughed
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 04, 2013, 05:57:36 AM
#26
Don't forget to use the TWO virtual machine method, disable js and plugins, check ssl certs, don't accept bad ones.
What do you mean with 2 virtual machines?
legendary
Activity: 1512
Merit: 1049
Death to enemies!
June 01, 2013, 08:40:17 AM
#25
Quote
https://www.torproject.org/docs/faq-abuse.html.en
"Tor aims to provide protection for ordinary people who want to follow the law."
What a hypocrisy. In same time they say it is meant for chinese and iranian dissidents as a tool to help break Chinese or Iranian law.

Of course it is common sense not to write on official homepage that the Tor is meant to enable childporn, drug trade, hacking and such communications and show middle finger to government censorfags.

There is no VPN that does not save session logs or financial data that can be used to trace you. Many hackers have fallen to this trick. Being offshore means nothing. Combining Tor + VPN is less secure than Tor alone or combining Tor + hacked WiFi in another part of city. Because VPN is more likely to closely watch the traffic (and save Tor traffic timings) compared to regular ISP (it depends from country and ISP).

Quote
Don't forget Govt monitors darkweb too..
Government suits monitoring darkweb is like staring at Goatse image all day long and being paid for it. They cannot do much about information in darkweb. Unless someone does something unimaginably stupid.
pro
full member
Activity: 138
Merit: 100
June 01, 2013, 08:40:03 AM
#24
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.


what about the us goverment who still tries to shut down silkroad for 2 years but cant...
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 08:33:54 AM
#23
Here's what I find dumb about the govt not liking Bitcoin. The average idiot will leave massive trails when hiring a hit man or buying drugs. MUCH more than cash.
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 08:32:28 AM
#22
Wrong the govt USES the dark web and hence never attacking it. Don't forget to use the TWO virtual machine method, disable js and plugins, check ssl certs, don't accept bad ones.
legendary
Activity: 1274
Merit: 1004
June 01, 2013, 08:29:27 AM
#21
https://www.torproject.org/docs/faq-abuse.html.en
"Tor aims to provide protection for ordinary people who want to follow the law."

It's safe and secure as long as you are not doing illegal things. If you need more privacy and security,
Use VPN + TOR or
VPN (That doesn't saves logs) + TOR on a offshore VPS.

+

Don't forget Govt monitors darkweb too..
legendary
Activity: 1512
Merit: 1049
Death to enemies!
June 01, 2013, 08:27:40 AM
#20
How exactly do they compromise your CA store?

Tor is not trustworthy, it is not safe to use for anything at all.

Many exit nodes are currently SSLstripped.
The do it with radio waves coming from black helicopters. They also disable bad node detection mechanism in Tor if the computer is not shielded with tin foil.

I welcome you to start modifying traffic going trough Your Tor exit node. Will see what happens. The conclusions from this experiment will make you feel a little bit better.
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 08:21:21 AM
#19
How exactly do they compromise your CA store?

Tor is not trustworthy, it is not safe to use for anything at all.

Many exit nodes are currently SSLstripped.
legendary
Activity: 1512
Merit: 1049
Death to enemies!
June 01, 2013, 08:19:27 AM
#18
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.
Tor is as secure and anonymous as it can be. Reasons for this myth:

1. Hackers who work for government usually are total noobs and assholes. They get caught in first place before being "converted" to white hats. This fact alone speaks about their overall security proficiency.

2. Because they are such a lamers they cannot distinguish anonymity from security. They think that traffic being sniffable by exit node means "Tor is not anonymous".

3. They cannot do much about Tor being used for thing they cannot control. They spread FUD in hope that few will eat this bullshit.
sr. member
Activity: 434
Merit: 250
June 01, 2013, 08:18:46 AM
#17
Tor is not trustworthy, it is not safe to use for anything at all.

Many exit nodes are currently SSLstripped.
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 08:17:54 AM
#16
You are supposed to disable plugins and javascript.. Or yes facebook and google will know exactly who you are
hero member
Activity: 588
Merit: 500
Hero VIP ultra official trusted super staff puppet
June 01, 2013, 08:10:20 AM
#15
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.

Are you a hacker who works for the government?  How would you know this?  Are you laughing right now?

Are you a shill for CoinGator? How would you know they're not a scam? Are you laughing right now?
Pages:
Jump to: