Serafim
Advanced
- Joined
- 28.09.20
- Messages
- 130
- Reaction score
- 1,196
- Points
- 93
How many words have already been said and articles written on this topic, but there are still individuals who represent TOR as an impregnable fortress, within the walls of which they can commit any outrages with impunity.
FBI easily carried out a successful operation and detained a Harvard University student who sent a message about a bomb in the University building. Even Tor did not help and now the Joker faces up to 5 years in prison and a fine of 250 thousand dollars.
The 20-year-old student "booby-trapped" the University and admitted that he wrote the letter in the hope of avoiding the final exam.to be sure, he duplicated the letter with a threat to the University's security Department and the University newspaper. Although he was successful here: because of the evacuation, all morning exams were postponed, but now the guy has more serious problems.
Tor will not save you from being calculated by the security services because the main character took measures to avoid identification. He created an anonymous email address and used the Tor anonymization service. However, it still managed to be calculated. According to the testimony of FBI agents in documents filed for trial, the secret service received a list of users of the local computer network in the University dormitory. They studied the traffic and determined which students use the Tor service. As you know, Tor traffic can be identified by its characteristic features. The FBI then questioned all the anonymous network users one by one. There weren't too many of them, so it was easy to figure out the culprit.
You can argue that the student was unlucky that he sent a message from the student's computer. If he did this from public Wi-Fi, passing traffic through some third-party machine, the FBI method would not work.
TOR won't save you from the police
History demonstrates the weakness of relatively rare information security tools, writes cryptographer Bruce Schneier. "The same thing that allows you to hide your involvement makes you a Prime suspect." The FBI didn't have to hack Tor, they just used standard methods to identify the sender.
Similar methods for identifying Tor users are suitable for use at the level of any provider. Don't be surprised if the security services already have a list of Tor users in every city.
Is it possible to track the use of the Tor?
Easy as pie. First of all, the security services have black keys in use in operating systems. This means that the user can sit at the Torus and consider himself completely safe, while his real IP address is merged along a parallel line. Second, the tor guarantees security only if the rules are strictly followed. Are you sure you know these rules 100%? For example, you can't enable JavaScript. But some sites don't work without it. Turned on — and your IP is already known to everyone.
Tor doesn't hide the IP Address
Very often, a site requires JavaScript to be enabled and refuses to continue working until the user fulfills this requirement. Be aware that if you have included the performance of Java in the Torah, then your IP is no longer a secret for an outside site.
Why is TOR not anonymous?
Because free cheese only happens in a mousetrap. TOR was created with the financial support of the US government. And that means something. TOR input nodes see your real IP address, and TOR output nodes see all your traffic. How can I hide the use of TOR?
FBI easily carried out a successful operation and detained a Harvard University student who sent a message about a bomb in the University building. Even Tor did not help and now the Joker faces up to 5 years in prison and a fine of 250 thousand dollars.
The 20-year-old student "booby-trapped" the University and admitted that he wrote the letter in the hope of avoiding the final exam.to be sure, he duplicated the letter with a threat to the University's security Department and the University newspaper. Although he was successful here: because of the evacuation, all morning exams were postponed, but now the guy has more serious problems.
Tor will not save you from being calculated by the security services because the main character took measures to avoid identification. He created an anonymous email address and used the Tor anonymization service. However, it still managed to be calculated. According to the testimony of FBI agents in documents filed for trial, the secret service received a list of users of the local computer network in the University dormitory. They studied the traffic and determined which students use the Tor service. As you know, Tor traffic can be identified by its characteristic features. The FBI then questioned all the anonymous network users one by one. There weren't too many of them, so it was easy to figure out the culprit.
You can argue that the student was unlucky that he sent a message from the student's computer. If he did this from public Wi-Fi, passing traffic through some third-party machine, the FBI method would not work.
TOR won't save you from the police
History demonstrates the weakness of relatively rare information security tools, writes cryptographer Bruce Schneier. "The same thing that allows you to hide your involvement makes you a Prime suspect." The FBI didn't have to hack Tor, they just used standard methods to identify the sender.
Similar methods for identifying Tor users are suitable for use at the level of any provider. Don't be surprised if the security services already have a list of Tor users in every city.
Is it possible to track the use of the Tor?
Easy as pie. First of all, the security services have black keys in use in operating systems. This means that the user can sit at the Torus and consider himself completely safe, while his real IP address is merged along a parallel line. Second, the tor guarantees security only if the rules are strictly followed. Are you sure you know these rules 100%? For example, you can't enable JavaScript. But some sites don't work without it. Turned on — and your IP is already known to everyone.
Tor doesn't hide the IP Address
Very often, a site requires JavaScript to be enabled and refuses to continue working until the user fulfills this requirement. Be aware that if you have included the performance of Java in the Torah, then your IP is no longer a secret for an outside site.
Why is TOR not anonymous?
Because free cheese only happens in a mousetrap. TOR was created with the financial support of the US government. And that means something. TOR input nodes see your real IP address, and TOR output nodes see all your traffic. How can I hide the use of TOR?
It's impossible. Your real IP will be replaced with another one, the output node of the torus. You can check this IP against the list of TOR network nodes and determine whether it is being used.