TOR Network
Hey guys. I’ll be honest, I’m fairly new to this kinda stuff, although not a complete n00b.
Just wondering what the general consensus is on the TOR Network. I’ve done some research, but I’m not sure what to make of it. Is it worth all the hype, and does it truly keep your identity hidden or is it something that you are easily traced through?
Any and all information you can give me is very much appreciated.
Very Informative. TY. The thing that still bugs me is that this guy is still worried about the NSA knowing what is hes doing. i guess my next question is if that worry is justified. i mean i guess if its a dummy site set up by them, but even then if your being routed through the Tor network, i don’t see how he could be tracked. so why is he worried?. would you recomend the whole suite or just the browser as he has done?
This whole idea is a lot bigger than just tor. i.e. All the stuff in the news you hear about such as the NSA tracking everyone, monitoring phone calls, Edward snowmen etc etc. I haven’t really looked into this much to be honest but i do remember seeing something about the NSA using vulnerabilities in firefox to intercept internet traffic on the TOR network. If you want to gain as much anonymity as you want you could go as far as using TOR whilst connected to a proxy/VPN whilst sitting in an internet cafe. It is totally up to you.
Uhm…He is making a video over Youtube, with his face in it, entering a site that’s supposedly illegal.
I think Tor, IF USED CORRECTLY, is a very nice thing (network, browser, all that). The way I read it, NSA have methods to partially track things done using Tor. But it’s usually part of the path your packets went through. It is theoretically plausible that at some point, they can get the whole path (so actually find you). But it has never been said to have happened, since the routes Tor chooses are pretty long (hence the considerable slow-down while using Tor).
Don’t post answers on the forums!
Search other forums before making new threads called “help” !
I’m still slightly confused on 1 point. when sending a request from your computer to a site in the tor network, is everything encrypted right up until it leaves the tor network and is the visible for the final jump back to you, or does your computer do the decryption itself, thereby ensuring the data is encrypted until you have it?
I have read that the NSA is monitoring exit nodes because at that point alot of the data is not encrypted
The exit nodes are not encrypted, thus if you use the tor network to access a non Tor site, it will appear as if the exit node made the request , that’s why a lot of exit nodes get raided sometimes, when the police think the exit node is a user doing illegal stuff.
You can hide your traffic from the exit node by using https , when sending a request the exit node decrypts the last layer , when receiving your computer decrypts the last layer (99% sure of it). Lastly, its advisable not to use JavaScript if you truly want to stay hidden . (also don’t access your Facebook account lol)
[quote=ME]when receiving your computer decrypts the last layer[/quote]
sorry , not too sure about that one anymore
Just an update, I finally decided to go for it and download TOR, when i noticed this option. “Vidalia Exit Bundle” Yhis option will allow you to run an exit node. as too wether or not you can privatize this exit node so that only you can recieve data from it has yet to be seen. Im kinda cautious on getting this just because I don’t want to be looked at if i can’t privatize it and it’s sending data to others. any thoughts?