Author

Topic: How anonymous is TOR really? (Read 24516 times)

full member
Activity: 128
Merit: 250
Free Crypto in Stake.com Telegram t.me/StakeCasino
April 19, 2019, 09:08:46 PM
#54
Actually, TOR helps you anonymously through many different workstations. But with genius hackers, you always leave personal information even when using TOR.
legendary
Activity: 2562
Merit: 1873
Leading Crypto Sports Betting & Casino Platform
April 19, 2019, 06:44:28 PM
#53
I got a way that Tor is totally anonymous, if you use tor and link it with operamini through an add-on, you will not only use the multiple IP that Tor
 can handle, if you activate the VPN option in Operamini you can have anonymity assured, and if You do some
 virtual machine, I think it will be more impossible to trace.
hero member
Activity: 2968
Merit: 605
April 14, 2019, 03:29:56 AM
#52

tor in itself is not completely anonymous but combined with other small tricks you can get good results, for example a vpn paid in crypto (monero) then firefox with tor and a public wi-fi without password, and eventually obscure the mac address of the pc /mobile phone...
legendary
Activity: 2562
Merit: 1873
Leading Crypto Sports Betting & Casino Platform
April 13, 2019, 03:30:10 PM
#51
It may not be totally secure, so it should be done with other add-ons, if you have VPN it is an ideal way for the IP that generates TOR to have its completion in the same cloud, that way it is much easier to have more anonymity. Also protect yourself with a virtual machine, so you will have fewer vulnerability options.
legendary
Activity: 2030
Merit: 1568
CLEAN non GPL infringing code made in Rust lang
February 21, 2019, 01:26:40 AM
#50
If you are truly paranoid, stick to "hidden services" (.onion addresses) and avoid the normal web (no exit nodes), use the Tor Browser from a live linux like Tails. The rest depends on your attitude, as mentioned earlier some people can't control their ego...

Tor is vital in oppressive regimes. People living nice countries only think about doing "bad" things, but under oppressive regimes a "bad thing" might mean reading an article from a "banned" media outlet or buying bitcoin. There is people who can get imprisoned years without seeing any lawyer or family only for expressing their political opposition on social media against the regime they live under.

Of course the original intention was protecting navy operatives passing Intel while remaining undetected behind enemy lines. It HAS to be anonymous enough, as there are people lives at risk here. But not everyone knows how to use it properly as that requires a strict discipline.
newbie
Activity: 185
Merit: 0
February 20, 2019, 05:10:43 AM
#49
He is pretty good at anonymity if you know how to use it.
sr. member
Activity: 613
Merit: 305
August 15, 2017, 02:42:24 PM
#48
They (feds) have only ever caught people using Tor who talked to much in IRC/forums. So if you aren't telling the feds where you live and everything about yourself while you engage in freedom fighting activities then you are basically as anonymous as it gets.

Although unlikely, it could be possible for an ISP to scan looking for Tor connections. China does this, but they don't dispatch black helicopters they just shut the connection down. So if you are worried about this obviously you would want to tunnel Tor through a VPN, or use Obfsproxy to hide the Tor connection from your ISP.

It could also be possible they trap you in some sort of page full of browser exploits and then learn what your real IP is, though unlikely if java plugins are all removed and you aren't randomly going to suspicious pages people have emailed or linked you in IRC. If you are worried run it in a vm, or even better use virtual routing in openbsd to lock down the Tor daemon to local IP, chroot it, and set up your firewall to deny all outbound connections that aren't through Tor and these exploits are foiled.

Feds found out who China's l337 haxors were because they were dumb enough to log into facebook while hacking the gibson and the NSA got their cookies and found their real names. So, if these idiots are the super dangerous government hackers you are worried about sounds like they have no idea what they are doing and no chance at all tracing their own hand on a piece of paper let alone some sort of hollywood-esque backtrack through Tor hops to find you.



Did they login to FB from TOR or did they use a separate non-TOR browser for that ?
hero member
Activity: 899
Merit: 1002
June 12, 2013, 05:54:16 PM
#47
They (feds) have only ever caught people using Tor who talked to much in IRC/forums. So if you aren't telling the feds where you live and everything about yourself while you engage in freedom fighting activities then you are basically as anonymous as it gets.

Although unlikely, it could be possible for an ISP to scan looking for Tor connections. China does this, but they don't dispatch black helicopters they just shut the connection down. So if you are worried about this obviously you would want to tunnel Tor through a VPN, or use Obfsproxy to hide the Tor connection from your ISP.

It could also be possible they trap you in some sort of page full of browser exploits and then learn what your real IP is, though unlikely if java plugins are all removed and you aren't randomly going to suspicious pages people have emailed or linked you in IRC. If you are worried run it in a vm, or even better use virtual routing in openbsd to lock down the Tor daemon to local IP, chroot it, and set up your firewall to deny all outbound connections that aren't through Tor and these exploits are foiled.

Feds found out who China's l337 haxors were because they were dumb enough to log into facebook while hacking the gibson and the NSA got their cookies and found their real names. So, if these idiots are the super dangerous government hackers you are worried about sounds like they have no idea what they are doing and no chance at all tracing their own hand on a piece of paper let alone some sort of hollywood-esque backtrack through Tor hops to find you.

full member
Activity: 223
Merit: 100
June 12, 2013, 03:05:13 PM
#46
Pretty anonymous I would say, I recommend you don't host a tor node on your personal computer though  Roll Eyes
legendary
Activity: 2912
Merit: 1060
June 12, 2013, 07:43:30 AM
#45
Your tor server should have its own vm.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 12, 2013, 07:23:11 AM
#44
Is this solution too paranoid?

1. You connect to internet via VPN on the router
2. You run one VM (virtual machine) with linux & TOR for each web-page. So you have one VM for Bitcointalk, one VM for google and so on...
3. You delete your VMs every night and use a fresh VM for every new session so you can be 100% sure you dont have any trojans, cookies and other parasites.
full member
Activity: 168
Merit: 100
June 12, 2013, 03:05:31 AM
#43
You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.

But your session ID won't.
newbie
Activity: 56
Merit: 0
June 12, 2013, 01:18:45 AM
#42
Let's just say that if Tor is not anonymous then nobody would bother to buy illegal stuff in silk road.
Once they visit the deep web/invisible web/dark net/onionland without using the Tor bundle they should expect Law Enforcers to bang at their door at any given moment. TOR is anonymous but purchasing a vpn software using your credit card will definitely tie your name to the VPN software. So don't be stupid do not purchase a vpn software using your money. Use free VPN software or better yet use only those that accept bitcoins.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 11, 2013, 07:37:01 PM
#41
If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
Sadly, such complexity only shrugs off non techies as they like most stuff easy to use, very quick and easy to learn and conveniant.

What our noob friends need is a black-box solution: a cheap small wifi-router with upgradeable software where you have three modes:
-VPN mode
-TOR mode
-Default mode (just as all other routers)

As I said before I dont trust TOR fully (some endpoints of TOR is run by criminals, and some are run by NSA), but it is somehow better than revealing ones real IP.
global moderator
Activity: 3766
Merit: 2610
In a world of peaches, don't ask for apple sauce
June 09, 2013, 04:22:24 PM
#40
If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
Sadly, such complexity only shrugs off non techies as they like most stuff easy to use, very quick and easy to learn and conveniant.
staff
Activity: 3290
Merit: 4114
June 09, 2013, 03:23:45 PM
#39
If used correctly it can be pretty good, but if you use it incorrectly then there really is no point is it?

You should check tor's guides, they are pretty in-depth and will help you getting started.
legendary
Activity: 1176
Merit: 1260
May Bitcoin be touched by his Noodly Appendage
June 09, 2013, 03:03:52 PM
#38
After the recent news of NSA spying on internet Im sure lot of the TOR network is run by the NSA itself...
Why would they spy internet if they were running the whole Tor?
It's like spying your grandma's toilet when your hot twin female cousins have their bathtub in your bedroom
Or mining Litecoins with your ASICs
member
Activity: 104
Merit: 10
June 09, 2013, 02:15:30 PM
#37
This is on the frontpage of HN right now: https://www.eff.org/pages/tor-and-https
global moderator
Activity: 3766
Merit: 2610
In a world of peaches, don't ask for apple sauce
June 09, 2013, 12:28:07 PM
#36
After the recent news of NSA spying on internet Im sure lot of the TOR network is run by the NSA itself...
The only secure way to protect ones privacy is to be really paranoid and not use internet or smartphones.
I think you might be on to something however here we are posting messages through the internet.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 09, 2013, 11:58:37 AM
#35
After the recent news of NSA spying on internet Im sure lot of the TOR network is run by the NSA itself...
The only secure way to protect ones privacy is to be really paranoid and not use internet or smartphones.
sr. member
Activity: 350
Merit: 250
June 07, 2013, 07:35:11 PM
#34
I don't understand how would anyone benefit from VPN or offshore VPS !?! Well imho noone can even know what traffic is your and what is not when you are connected to Tor (you are a node) - as there is know way to know where the the message originated. Or am I mistaken?
hero member
Activity: 574
Merit: 500
June 05, 2013, 07:11:24 PM
#33
I like the idea of anonymous internet activity - trouble is all the baddies that use it too...
full member
Activity: 168
Merit: 100
Want some pi with that?
June 05, 2013, 06:53:03 PM
#32
I use TOR from time to time but usually use VPNs because of security and peace of mind (but mostly just something to spend bitcoins on)
hero member
Activity: 574
Merit: 500
June 05, 2013, 05:21:35 AM
#31
This guy proved it was anonymous - the only way they caught him was due to his ego...

http://www.bbc.co.uk/news/technology-22248692

This is a great article, however I'm not sure if this truly proves tor is completely anonymous.

From bbc website:
Quote
After Mr Katayama's arrest, the NPA sought guidance on how to handle similar cases. The industry report drawn up for the NPA recommended considering a ban on Tor and other anonymising networks as they had been found to be used in a wide variety of crimes.

Japanese ISPs have not welcomed the recommendation.

If the ISP's begin to intervene, then I agree. Anonymity will be compromised. Until then however, if you used it correctly according to all the guidelines... it is anonymous.
newbie
Activity: 14
Merit: 0
June 04, 2013, 10:49:02 PM
#30
This guy proved it was anonymous - the only way they caught him was due to his ego...

http://www.bbc.co.uk/news/technology-22248692

This is a great article, however I'm not sure if this truly proves tor is completely anonymous.
legendary
Activity: 4130
Merit: 1307
June 04, 2013, 08:15:59 AM
#29
The advice above is good, but also check out the links below.  Tor is great, but still has issues which one hopes will be remedied in the future to make it even better:

1. "Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration." -- https://www.torproject.org/about/overview

2. Also read this section of an overview, then check out the links:   http://en.wikipedia.org/wiki/Tor_(anonymity_network)#Weaknesses

3. https://lists.torproject.org/pipermail/tor-dev/2012-September/003992.html

4. https://tails.boum.org/forum/Who_carries_half_of_all_Tor_traffic__63____38_operators/

5. http://www.syverson.org/tor-vulnerabilities-iccs.pdf

One longer-term issue is the centralized nature of the Tor directory servers.


I have the impression that TOR is not completely secure to keep you anonymous if you use the same session (IP) to visit several websitess since your IP-address will be saved in those websites logs.

Another scenario is Google & other big sites sharing data about their users with each other to get a better understanding of their registered and unregistered users. Even fragments of information can match with a real identity, for example the patterns of the languange used in your google searches, your blogs, tweets, emails, forum discussions (at bitcointalk) can easily be analyzed. Google has been indexing internet for years so they have all data they need. The more sources they got, the more accure they can match different mails, tweets and forum posts with each other, even if the IPs used are completely different (with help of TOR).

One solution for cautious people is of course to use encryption in all communication and never share data at public places (never writing posts at forums like this). I guess guys like Satoshi change their language pattern in forums and mails so they can remain anonymous.
legendary
Activity: 2912
Merit: 1060
June 04, 2013, 07:14:03 AM
#28
http://ra.fnord.at

Don't forget to use the TWO virtual machine method, disable js and plugins, check ssl certs, don't accept bad ones.
What do you mean with 2 virtual machines?
legendary
Activity: 1176
Merit: 1260
May Bitcoin be touched by his Noodly Appendage
June 04, 2013, 07:04:57 AM
#27
Quote
Don't forget Govt monitors darkweb too..
Government suits monitoring darkweb is like staring at Goatse image all day long and being paid for it. They cannot do much about information in darkweb. Unless someone does something unimaginably stupid.
Actually laughed
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
June 04, 2013, 06:57:36 AM
#26
Don't forget to use the TWO virtual machine method, disable js and plugins, check ssl certs, don't accept bad ones.
What do you mean with 2 virtual machines?
legendary
Activity: 1512
Merit: 1042
Death to enemies!
June 01, 2013, 09:40:17 AM
#25
Quote
https://www.torproject.org/docs/faq-abuse.html.en
"Tor aims to provide protection for ordinary people who want to follow the law."
What a hypocrisy. In same time they say it is meant for chinese and iranian dissidents as a tool to help break Chinese or Iranian law.

Of course it is common sense not to write on official homepage that the Tor is meant to enable childporn, drug trade, hacking and such communications and show middle finger to government censorfags.

There is no VPN that does not save session logs or financial data that can be used to trace you. Many hackers have fallen to this trick. Being offshore means nothing. Combining Tor + VPN is less secure than Tor alone or combining Tor + hacked WiFi in another part of city. Because VPN is more likely to closely watch the traffic (and save Tor traffic timings) compared to regular ISP (it depends from country and ISP).

Quote
Don't forget Govt monitors darkweb too..
Government suits monitoring darkweb is like staring at Goatse image all day long and being paid for it. They cannot do much about information in darkweb. Unless someone does something unimaginably stupid.
pro
full member
Activity: 138
Merit: 100
June 01, 2013, 09:40:03 AM
#24
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.


what about the us goverment who still tries to shut down silkroad for 2 years but cant...
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 09:33:54 AM
#23
Here's what I find dumb about the govt not liking Bitcoin. The average idiot will leave massive trails when hiring a hit man or buying drugs. MUCH more than cash.
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 09:32:28 AM
#22
Wrong the govt USES the dark web and hence never attacking it. Don't forget to use the TWO virtual machine method, disable js and plugins, check ssl certs, don't accept bad ones.
legendary
Activity: 1274
Merit: 1004
June 01, 2013, 09:29:27 AM
#21
https://www.torproject.org/docs/faq-abuse.html.en
"Tor aims to provide protection for ordinary people who want to follow the law."

It's safe and secure as long as you are not doing illegal things. If you need more privacy and security,
Use VPN + TOR or
VPN (That doesn't saves logs) + TOR on a offshore VPS.

+

Don't forget Govt monitors darkweb too..
legendary
Activity: 1512
Merit: 1042
Death to enemies!
June 01, 2013, 09:27:40 AM
#20
How exactly do they compromise your CA store?

Tor is not trustworthy, it is not safe to use for anything at all.

Many exit nodes are currently SSLstripped.
The do it with radio waves coming from black helicopters. They also disable bad node detection mechanism in Tor if the computer is not shielded with tin foil.

I welcome you to start modifying traffic going trough Your Tor exit node. Will see what happens. The conclusions from this experiment will make you feel a little bit better.
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 09:21:21 AM
#19
How exactly do they compromise your CA store?

Tor is not trustworthy, it is not safe to use for anything at all.

Many exit nodes are currently SSLstripped.
legendary
Activity: 1512
Merit: 1042
Death to enemies!
June 01, 2013, 09:19:27 AM
#18
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.
Tor is as secure and anonymous as it can be. Reasons for this myth:

1. Hackers who work for government usually are total noobs and assholes. They get caught in first place before being "converted" to white hats. This fact alone speaks about their overall security proficiency.

2. Because they are such a lamers they cannot distinguish anonymity from security. They think that traffic being sniffable by exit node means "Tor is not anonymous".

3. They cannot do much about Tor being used for thing they cannot control. They spread FUD in hope that few will eat this bullshit.
sr. member
Activity: 434
Merit: 250
June 01, 2013, 09:18:46 AM
#17
Tor is not trustworthy, it is not safe to use for anything at all.

Many exit nodes are currently SSLstripped.
legendary
Activity: 2912
Merit: 1060
June 01, 2013, 09:17:54 AM
#16
You are supposed to disable plugins and javascript.. Or yes facebook and google will know exactly who you are
hero member
Activity: 588
Merit: 500
Hero VIP ultra official trusted super staff puppet
June 01, 2013, 09:10:20 AM
#15
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.

Are you a hacker who works for the government?  How would you know this?  Are you laughing right now?

Are you a shill for CoinGator? How would you know they're not a scam? Are you laughing right now?
sr. member
Activity: 798
Merit: 251
June 01, 2013, 08:12:06 AM
#14
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.

Are you a hacker who works for the government?  How would you know this?  Are you laughing right now?
hero member
Activity: 574
Merit: 500
May 31, 2013, 07:21:35 PM
#13
This guy proved it was anonymous - the only way they caught him was due to his ego...

http://www.bbc.co.uk/news/technology-22248692
hero member
Activity: 588
Merit: 500
Hero VIP ultra official trusted super staff puppet
May 31, 2013, 07:16:46 PM
#12
For what it's worth, hackers who work for the government laugh at people who say TOR is secure and anonymous.
sr. member
Activity: 350
Merit: 250
May 31, 2013, 07:14:19 PM
#11
You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.

it is not so often - I think i read about approximately few minutes - but you can change IP manually anytime Smiley

but there are also different issues (but I am not Tor expert to explain it)
sr. member
Activity: 403
Merit: 251
May 31, 2013, 12:06:52 PM
#10
Try using Anonymouth?

Interesting concept, but to be useful it needs to catch every unusual word, all grammatical mistakes,
basically need to understand natural language.

The other, simpler way would be: force the writer to use controlled/simplified natural language,
then apply synonyms and grammar reshuffling at random.
But AFAIK such a program doesn't exist.

member
Activity: 117
Merit: 10
May 29, 2013, 02:37:08 AM
#9
If tor didn't work, the illegal sites on the darknet would have been shut down long ago. They have not been shut down (for the most part), so we know that it does work. Of course there's no silver bullet for anonymity. If you were doing something really shady, you would still need to alter your posting style and be careful which sites you access through tor in order to keep your identity properly a secret.
newbie
Activity: 42
Merit: 0
May 29, 2013, 12:21:40 AM
#8
As Anonymous as it gets.
legendary
Activity: 896
Merit: 1000
May 28, 2013, 10:24:01 PM
#7
If you download the browser bundle it comes with Vidalia, and you can just hit "Use New Identity" so I would say pretty damn anonymous. Do you think half of the hidden services that exist on tor would be permitted to if they weren't completely anonymous?  Huh
hero member
Activity: 546
Merit: 500
May 28, 2013, 10:17:50 PM
#6
You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.

Yes I know my IP changes regulary with TOR. The issue Im most concerned of is Big Brother identifiying you  regardless of what IP you are hiding behind, based on the traces you leave at different sites (based on your writing style and keywords or subjects in your texts).


Have you seen this?

http://panopticlick.eff.org/index.php?action=log&js=yes
sr. member
Activity: 476
Merit: 251
COINECT
May 12, 2013, 06:50:51 PM
#5
Try using Anonymouth?
hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
May 12, 2013, 06:24:53 PM
#4
(based on your writing style and keywords or subjects in your texts).
Well, if you're worried about that, you're fucked anyway, unless you change your writing style deliberately.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
May 12, 2013, 06:14:49 PM
#3
You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.

Yes I know my IP changes regulary with TOR. The issue Im most concerned of is Big Brother identifiying you  regardless of what IP you are hiding behind, based on the traces you leave at different sites (based on your writing style and keywords or subjects in your texts).
legendary
Activity: 1311
Merit: 1000
May 11, 2013, 10:28:11 PM
#2
You ever use tor, and check your ip address? It changes like every 3 seconds, and page change.
sr. member
Activity: 434
Merit: 250
In Hashrate We Trust!
May 10, 2013, 07:58:13 PM
#1
I have the impression that TOR is not completely secure to keep you anonymous if you use the same session (IP) to visit several websitess since your IP-address will be saved in those websites logs.

Another scenario is Google & other big sites sharing data about their users with each other to get a better understanding of their registered and unregistered users. Even fragments of information can match with a real identity, for example the patterns of the languange used in your google searches, your blogs, tweets, emails, forum discussions (at bitcointalk) can easily be analyzed. Google has been indexing internet for years so they have all data they need. The more sources they got, the more accure they can match different mails, tweets and forum posts with each other, even if the IPs used are completely different (with help of TOR).

One solution for cautious people is of course to use encryption in all communication and never share data at public places (never writing posts at forums like this). I guess guys like Satoshi change their language pattern in forums and mails so they can remain anonymous.
Jump to: