Is it REALLY compromised? asking for a friend

is it REALLY compromised? asking for a friend

Attached: howtousetor_thumb800.jpg (800x450, 19K)

Without question, Poohammed

Attached: 10FEB8C4-3829-459A-A1C9-85D392C8ED70.jpg (584x680, 75K)

no, don't listen to lamer Jow Forumsacks. they're all morons who don't even understand how tor works. sybil attack vulnerbility, which are inherit to any untrusted and decentralized sytem and virtually impossible to execute in practice without anybody noticing = MUH CIA SPOOKS ARE IN UR BASE. old ass firefox exploit being used to execute a driveby download = TOR IS COMPROMISED HURR TOR IS THE SAME THING AS TOR BROWSER WHAT ARE PATCHING VULNERABILITIES

Do you have a friend who's wanted by 3 letter agencies for political reasons?
If not then no, it's not compromised, if yes then yeah, it's compromised.

Source code is all online so check for yourself, but I can save you some time and tell you it's not.
You're still open to correlation attacks by NSA/GCHQ owning both your entry and exit relay (unlikely) or entry and destination address's traffic (more likely), but to have those be an actual threat to your security would mean you have to be doing some *really* illegal shit, talking terrorism level, and if you're asking for tips on Jow Forums I doubt that's you. Maybe if you've sloppy with opsec else where, owning just an entry or exit node could give info that could fit into a bigger picture of stuff they already have, but again that'd mean they're already specifically monitoring you.
Basically, Tor itself is fine, it's just open to the same things that basically anything is if you're high profile enough.

You can go research everyone who got caught running a big illegal drug market over tor, none of them were arrested or caught because of their tor browser
it was always a handful of tiny mistakes that caught up with them

you compromise yourself the minute you initiate the connection. at that point you're a criminal.

not at all. only the nodes, every single one. so u want to rape children or something like that...knock yourself out. you want to say mean things about nsa or fbi....you gettin the early morning wake up

>is it REALLY compromised?
the system? no, retard. but sites being hosted by onion addresses? oh my, yes. plenty.
thank you for your valuable contribution, mr. police officer.

your ISP is running enterprise grade snort instances and the minute your first packet leaves the gateway, you're marked as a deep gay and all they have to do is drive a stringray to your house and pick up your texts to your friend over buying 1/8th of weed

TOR is a small place. It's just too easy to correlate the data to bust people. Just think about it. How many people do you think browse TOR in the USA at any given moment, and what are they browsing it for? Yeah i'm real fucking sure they are all just EFF supporting privacy advocates and not degenerates. Your ISP logs all sessions with TOR exit nodes and can easily classify your behaviors and access patterns. How much data are you getting? What time are you accessing? How long is the session? The types of access are obviously quite different for different things. Timing attacks are legit. But the simplest approach would be to analyze every IP connecting to TOR and the real identities behind those IPs and flag them for review. Oh this person watches a lot of anime and buys creepy fucked up kids clothes on Amazon, I wonder what they could be doing on TOR??

>The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997.

I dunno user... you tell me

That's not why. It's because the feds own most of the nodes.

>deep gay
>pick up your texts to your friend over buying 1/8th of weed

Attached: 1535794581404.gif (355x360, 1.82M)

>It's because the feds own most of the nodes.
> [citation needed]

you jest but it's enough in 2019

Attached: el goblino.jpg (378x480, 75K)

look up parallel reconstruction Mr. Bigbrane

If he needs to ask questions like this he should find safer activities to do. This is like someone asking "hey is it safe to smoke meth?" Yeah, sure, it won't kill ya, you might even have fun, but if you're seriously asking, then maybe you should try drinking bleach first before you move up to big boy games

Пп

Yes, they hacked into or own all the guard and exit nodes so they can pair your entry and exit points in real time ready to decrypt your traffic. Everyone says encryption is safe but the NSA has billions of dollars to spare for looking for weakness. You are long fucked and you will read about it 10 years from now then the next Snowden leaks.

Attached: 1554800502312.jpg (453x410, 88K)

>David Goldschlag
Haha, that's even better than made up pol jewish names

>sybil attack vulnerability, which are inherit to any untrusted and decentralized sytem and virtually impossible to execute in practice without anybody noticing = MUH CIA SPOOKS ARE IN UR BASE
that's the definition of a sybil attack. go be clueless scrub parroting what you heard from other clueless scrubs somewhere else

there are a couple of chrome and firefox "vpn" extensions that tunnel everything through tor. Some people are using it without knowing.

tor is open source. the only ways to get pwned are through javascript and sybil attacks, and both are easily prevented.

Either way you shouldn't trust TOR to keep you safe. Governments with Hugh funding can have a lot of exit/entrance nodes which makes it possible for them to read the data both where it's going and what it's sending.
TOR is not a safe protocol.

Lamers are fucking retarded
They even have the audacity to spread their disinformation

abusive nodes get kicked off of the network.

Nice try NSA