Does it work? Any tips?
Can one hook up Tor on any old computer and remain anonymous?
My childish understanding is it slows your browsing down to dial up speeds, and is a favorite of kiddy porn peddlers and online drug sales...
I could be wrong here, but I think it's used to view "deep web" pages that are monitored by the .gov anyway.
Well, I don't fit either scenario. It was on the computer of a guy involved in a lawsuit, and I didn't really know what it was. I've installed it on my computer and am screwing around with it just to see what the point is.
Seems to hide your IP address.
The link is from here ( http://www.centeronnationalsecurity.org/node/1567 ) and they release a daily brief that's fairly solid if you want to stay in the loop.
does responding to this thread mean we are part of the Jewbacca legal team?
In for compensation...
I hope so. I'm charging $250 a post.
I don't think it actually stops .gov from figuring out who you are if they really want to though. It just makes it a more involved process.
Oh, it's not my case or my client. Just naturally curious.
It seems to rely on a network of volunteer computers. I would presume the government has "volunteered" its services, so if your path of 3 computers hits 3 government computers, you are screwed.
T-Nation loads painfully slow with it.
You have to know how to use it properly. you basically have to disable everything like plugins, java, cookies, can't download anything really...
From what I've seen...most people get identified because they type personal information or use personal emails in the browser which is obviously identifiable. It's like real life. If you leave a paper trail to your id then they will find you.
this video is pretty good. starts at 24 mins on TOR.
Tor has been compromised for a while by law enforcement agencies.
There are various possibilities as to how, but basically it comes down to whether you trust other people that set up exit nodes.
The only thing that is certain is that the TOR network has been attacked and even people using best practices were targeted, so it's not secure.
There's no best practices that will save you on TOR because both law enforcement agencies and private hacking groups have control of many exit nodes and relays on it.
Depends what you are doing. Unless you are doing evil shit no one is going to waste resources on you.
Why would they need to waste resources, governments have access to 100% of TOR traffic at this point most likely.
This is a possibility, back to the OP what are you trying to achieve perhaps you do not need TOR at all...For a brief explanation of exit nodes for those who are unfamiliar -> https://hackertarget.com/tor-exit-node-visualization/
Imagine your connection is routed through 2-3 countries via tor and the final machine is in Ukraine for instance, the connection it makes for you to say T-Nation it can read all of the contents (cookies, logins etc) so technically speaking you can be tracked. HTTPS/TLS and such help to an extent but such things at this point are likely trivial for gov to eavesdrop on.
Data doesn't analyse itself and you don't end up in front of a judge one day. Investigations are costly, especially across jurisdiction boundaries. I think you'll find this capability is significantly less mature than you're assuming.
yeah idk, I think it's unlikely that they have control of that many exit nodes.
From what i've seen, most LE/Gov investigations did not rely on statistical analysis(guessing who your are from the exit node traffic) but rather straight up basic detective work. In one instance, they looked at who was using TOR and at what time they were using it on fairly small network(campus), and they guessed who it was.
have you guys seen that show mr robot on USA? pretty cool show. mentions tor in the first ep.