It wasn't a problem with Tor but with Firefox. It appears the FBI put some javascript on Freedom Hosting to ID people.
It wasn't a problem with Tor but with Firefox. It appears the FBI put some javascript on Freedom Hosting to ID people.
by InquirerThe only way I know of tracing somebody trough TOR is if you are sniffing the data both at the endpoint and at the victim at the same time, and matching the data that goes in to and comes out of the TOR loop. The other way you can expose yourself is if you share personal data on the Internet, as in post your name on a forum etc.
How the hell does one "sniff data at the endpoint"? What does that even mean? All this computer talk is really strange to me.
by Spatial MindThere was a loophole for uncloaking TOR in firefox, one can look up. They patched it, but one can also read about uncloaking TOR. There are hotshots who can. Basically TOR is a pain in the ass for people who are hunting pedophiles and bullies. In most cases it's probably not even worth the effort.
by DamagedIt wasn't a problem with Tor but with Firefox. It appears the FBI put some javascript on Freedom Hosting to ID people.
This is a perfect example of how Tony just pulls stuff out of his ass. Badly researched, distorted stuff, mostly because he's not very smart and has a shit memory. The problem is he truly believes his info and theories to be true and even spreads them as "knowledge". If you show him he's wrong, he'll either ignore you or become aggressive and insulting.
The data is encrypted when it bounces through TOR and it is impossible to trace that data back to you directly. When your request (data) exits TOR it gets decrypted so that the website you are trying to talk to can understand it, and if someone would be listening to all the traffic exiting the endpoint node (that you happen to use at that given moment) they'd be able to read and understand the data.
If you set up TOR correctly (like the preset TOR browser) no information that can lead back to you directly is sent through TOR. All one would see is that somebody sent a request to this forum, for example, but not from whom it originated. However, if someone would also listen to the data that was sent from your computer you could match that to the data you got from the endpoint node and verify that it really was you that sent that request. This is the only way I know of 'tracing' somebody through TOR, but please correct me if I'm wrong.
So, as you can see, the risk of getting caught by using TOR is very small and it would require you to somehow be under surveillance in the first place.
Oh, and by 'sniffing' I mean to listen to a certain point on the Internet (network, computer, server etc.) and record the data that comes out of it.
Long post is long.
Thank you.
I read a couple of things about how TOR works before I started using it, and I got the general idea about nodes. I also trust TOR because I took several dives into the deep web, and fuck, there's some really fucked up shit there. Snuff/gore films, pedo shit, criminal shit. If those people trust the system to protect their stinking asses from the jail they deserve, then the system is pretty secure.