Is Tor compromised ?

Is Tor compromised ?

Attached: 1552711228417.jpg (480x480, 48K)

Other urls found in this thread:

github.com/loki-project/loki-network
youtu.be/eQ2OZKitRwc
youtube.com/watch?v=7G1LjQSYM5Q
theregister.co.uk/2017/12/15/crypto_mathematical_backdoors/
blackhat.com/docs/eu-17/materials/eu-17-Filiol-By-Design-Backdooring-Of-Encryption-System-Can-We-Trust-Foreign-Encryption-Algorithms.pdf
en.wikipedia.org/wiki/Bullrun_(decryption_program)
twitter.com/NSFWRedditVideo

>is the honeypot compromised

gib evidence pls

Attached: 1552711228418.jpg (480x480, 59K)

It's always been compromised.

spordormon

HOW CAN I BE TRULY ANONYMOUS AAAAAAAAH

This

>but you can trust the navy funded spook network with your privacy
>I have a degree in math, here's an esoteric type theroy proof that doesn't prove a damn thing that shows you can trust tor.
>Trust me I am not bought and paid for shut up FBI shill

Common sense.
Someone creates something for free and gives it to you, knowing you're going to use it for unlawful things.

That's like giving a gun to a mentally unstable person just to be able to arrest them after they shoot someone.

Tor has been backdoored from day one. The wikileaks dump proved it

Attached: CIAPresentationOnTorBackdoor.jpg (298x259, 10K)

Then my best bet is to learn a shit ton of info about how the internet works and make my own handcrafted solution
sounds pretty exhausting desu

I actually did exactly this, onion routing is hard, stateless onion routing is a pipe dream don't listen to anyone that peddles that bullshit you'll end up using bloom filters to protect against replay attacks lol.
github.com/loki-project/loki-network

thanks for the link, I'll check it out

Link pls, im lazy

yeah but this just looks like a Tor redesign, what guarantee is there that most nodes aren't owned and monitored by three-letter agencies ?

absolutely none, i made it assuming that'd happen right away. I have plans for a second layer that acts as a buffer zone between you and the main relay cloud. that's not there yet however.

security through obscurity, it's not that hard

Hey, Tor expert here.

Tor is compromised, but there are some workarounds to preserve your anonymity.

When using Tor, make sure you're using it on Windows 10. You want to "blend in" with the pack, and this isn't ideal on an OS with a 0.5% market share like Linux.

If you've tried to disable telemetry on Windows 10, re-enable it. Microsoft doesn't care if you're using Tor but they will care if you run into any problems along the way. This makes Tor a better experience for everyone.

When signing up for darknet services (like drug and/or gun markets) use a gmail account with your real name, address and phone number. This creates "security through ineptitude"; no one will actually believe you're stupid enough to do this, instead believing a bad actor is using your personal information to get you in trouble.

Always enable Javascript while browsing. Many darknet website developers are sad to find out their users never see the full potential of their websites because Javascript is often disabled on Tor. Turn it on for the best experience!

This one I can't stress enough -- NEVER USE PGP! Not only are you almost certain to lose your decryption key at some point (rendering all of your messages unreadable), but it gives NSA shinenegros probable cause to ARREST you!

Optional, but highly recommended tip: Keep refreshing your nodes until all three are located in the USA. This will speed up your connection considerably.

Stay safe, fellow Jow Forums posters.

Fuck you

They are mostly funded by the us state department. The exit nodes can be monitored.

okay this is epic

And to think you spent over 10 minutes writing something this unfunny.

>Common sense
*I don't know shit about how tor works I just read a pasta on Jow Forums that's all I need to know

It may be compromised but if it is the 3 letter agencies are only using their access for Real Important Shit. I base my opinion on using LexisNexis remaining scrupulously updated on any federal US case that mentions TOR. If TOR were compromised to the point the feds had real access, the law would reflect it. That is not currently the case.

Look here geniuses:
youtu.be/eQ2OZKitRwc
All it basically boil downs to are Javascript exploits and comically bad opsec. High tech shit, high tech shit.

I can smell his s o y

hello fbi. still failing at life as per usual? don't you have child porn sites to run?

> hey, compulsive lying faggot here
i can't stress enough how you should put a shotgun into your mouth and pull the fucking trigger.

you smell like rancid pork, fbi.

kek

Here watch this, think the guys handle was IronGeek. I have read other papers on how with time and a few compromised exit node, ones location can be found.
youtube.com/watch?v=7G1LjQSYM5Q

So wat do then? is not a satisfying answer

no

Attached: 1552732457596s.jpg.jpg (250x250, 6K)

they had to fall back to using theater to capture the silk road guy

i think it's secure

1. use public vpn and bridge TOR
2. never from home, use public spaces
3. faraday your phone, obscure facial identity
4. always use a rooted throwaway device imho laptops are too heavy, phone preffered

Thanks user, that's some good advice

Is your PC compremised? [CLICK HERE] to find out!

np some more tips about above
- facial identity software currently has major problems with hair like beards/moustache especially if the nose is obscured, use it to your advantage
- use sdcard for sensitive files, make sure the sdcard is easily removed for quick disposal on the run, police can see you throw a phone/laptop they won't be able to see a tiny sdcard dropped or swallowed
- laser pointers work wonders on cameras, just sayin

Watch .

yes

look up: fbi lets 200 pedo's walk because it didn't want to disclose how it got the evidence against them

Shit sense you fucking faggot.
If you are a public computer network admin then there's a very tiny chance someone who uses tor on your network is some government worker hiding where he is connecting to from you.
And almost 100% chance it's just anyone else.
If Tor wasn't public then any time Tor traffic is detected you could just send a party van and bust the soldiers/spies.
Tor is public so that its intended users can blend in with the crowd.

Guys...I'm starting to feel strange. Something weird is going on. Whats happening?

Attached: 1552732457596.jpg (480x480, 68K)

...eee

Attached: 1552732457596.jpg (480x480, 34K)

I must save this pasta

oooooooooooooooooooooooooooooo

Attached: 1552732457596b.jpg (443x443, 16K)

Attached: 1552732457596c.jpg (443x443, 6K)

Then tor isn't compromised, you fucking shill

Any encryption algorithms that are selected by Five Eyes and its allies to be peddled to the public as the standard for a given use are either designed with a mathematical backdoor or were found to have a mathematical backdoor during the selection process.

If this is not the case, like for independently published encryption algorithms that gain traction among the public, then the Five Eyes and their allies would deploy strategies to compromise the software used to perform the encryption or, better yet, they would develop that software and push it onto the public with no direct connection to themselves.

This is how Tor was born. As criminals started to depend less and less on the Internet during an age where its very foundation was found to be inherently vulnerable by design, the Five Eyes took it upon themselves to design Tor and pass it off as the 'ultimate anonymizer' in order to get people reinvested in performing serious crime on a platform designed to be simple to monitor from its birth, the Internet.

Your best bet is to not do stupid shit on the Internet or abstain entirely or for the most part like God Stallman. There is no way to escape a tap into the network backbone if you're using encryption that was 'generously' handed to you by the same government agencies that feel the need to perform complete clandestine surveillance on its citizens.

just in case you step on exit node of fbi or cia

can i get an f for my nigga sp0dermen

T. brainlet who doesn't understand what encryption is.

theregister.co.uk/2017/12/15/crypto_mathematical_backdoors/

Any other concerns you have about my post?

Here's some more, brainlet.
blackhat.com/docs/eu-17/materials/eu-17-Filiol-By-Design-Backdooring-Of-Encryption-System-Can-We-Trust-Foreign-Encryption-Algorithms.pdf
en.wikipedia.org/wiki/Bullrun_(decryption_program)

>Those are the people saying Huawei is insecure

t. criminal

felon 2 years, learning from my mistakes

Attached: 5445763.jpg (833x625, 68K)

use Tor.

>Is Tor compromised ?
Name me something that isnt compromised.
If by, "uncompromised", you mean, "can I trust it 100%" then yeah it's compromised. Onnly if you have the skill and the means to study the source code and verify for yoursel that there is no compromise , only then can you trust it. If you dont have the skill or the means to verify the source is uncompromised can you trust it. In other words, to know if it is compromised or not means you need to haqve access to the source code, verify its authenticity, compile the TOR browser from souce, then run it. Otherwise everything else is untrustworthy. If you have to rely on others to tell you, then the default must be, dont trust it

are you retarded

brave spooderman sacrificed himself to distract the fbi from this thread
spam F

Attached: 1459106530948.jpg (600x417, 27K)

Attached: 60s_rorschach.jpg (498x697, 59K)

Attached: 1446476841243.jpg (500x357, 24K)

Attached: 1469663972040.jpg (461x343, 45K)

Attached: 1520140919846.jpg (544x400, 44K)

Attached: 1520473729658.jpg (300x200, 9K)

Attached: 1533030307693.png (852x846, 761K)

Attached: 1533034052441.jpg (544x400, 24K)

that's a very funny picture

>all pics posted slightly over one minute apart
based one man spidey army

>exit nodes
So what. Just use onion sites and block all javashitpt. What can they do then. Nothing.

use a fucking manually configured system-wide opensource vpn instead of your hipster bs

I smell criminal activity ITT

Attached: 1535761809805.jpg (800x450, 46K)

Attached: 1548604594310.jpg (482x361, 44K)

Attached: 1551548689762.png (500x354, 220K)

isn't spidey part of the avengers now tho?

Attached: aatHd.jpg (500x357, 122K)

Attached: Dropped_the_baby_-_Even_Spidey_makes_mistakes.jpg (500x375, 30K)

Attached: Extraextra_spiderman.jpg (475x453, 46K)

Attached: Faint_smell_of_danger.gif (499x281, 999K)

Attached: Fuck_the_police_2.jpg (472x334, 22K)

Attached: Fuck_the_police1.jpg (500x368, 54K)

Attached: Indeed_this_is_that_kind_of_thread_-_Spidey.jpg (260x194, 12K)

Attached: JUST_BOOKS-_YOU_GOTTA_BE_JOKING_-_Spidey.jpg (500x322, 28K)

Attached: LAZY_SPIDEY_SLACKS_OFF_ON_THE_JOB.png (500x351, 202K)

Attached: love.jpg (500x375, 34K)

Attached: Merry_christmas_shit_poster_-_you_get_what_you_give_-_spidey.jpg (320x237, 23K)

Attached: NOT_PEANUT_BUTTERASTOUNDING.jpg (481x358, 56K)

Attached: Spiderman_gets_creative.png (544x400, 258K)

Attached: Spiderman-refrigerator.jpg (560x400, 22K)

with love from /b/

Attached: Spider-nigga.jpg (560x400, 37K)

SpiderpMan

I think tor code is safe but the concept of tor itself is just safe enough from local PD but if enough resources is pooled then you can be traced. Also dont forget 0days that cia/nsa/fbi buy/develop and then use on people. They knew about openssl vulnerability for years, same with recent cpu exploits, Id bet intel knew about them even before implementing the features that caused it or were requested by government to do it.

Also consider that an official arrest usually include information on how the the suspect was caught and that will include computer techniques used. There was a case not so long ago when someone downloaded some illegal combinations of 1s and 0s and got caught, but then police refused to say how they got caught (it was by computer means though) and the suspect simply walked free. In other words if you are a petty criminal they will not waste a perfectly good 0day on you also consider that with recent spectre and spoiler attacks there might many more arrests because these exploits are now known and its relatively hard to patch them.

ok then brb imma just build my own computer fom the ground up

There's no evidence that Tor (the network) is compromised.
However, from time to time, a Firefox 0-day that unmasks the user IP when using the Tor Browser appears from time to time.

Attached: 1537842460748.jpg (1756x2492, 442K)

>from time to time, a Firefox 0-day that unmasks the user IP when using the Tor Browser appears
I am now reassured

nothing is 100% secure, try to minimize risk as much as possible then you just have to consider risk to reward ratio, is it worth doing it

>what is "parallel construction"
yeah, surely you can totally trust some random guy

What random guy?