Torfags WILL defend this

>Igor Pustogarov presented Deanonymization Techniques for Tor & Bitcoin in 2014 to a crowd of about 20 of us at Stanford. For ~$12,000/month for 12 months, the odds of revealing a hidden service were 99%. Imagine what it is today..
>crypto.stanford.edu/seclab/sem-14-15/stanford-2014.svg

Attached: m.jpg (608x553, 123K)

Other urls found in this thread:

wired.com/2017/03/feds-rather-drop-child-porn-case-give-exploit/
youtu.be/RZ_3MKomQzY
youtu.be/7G1LjQSYM5Q
illinoislegalaid.org/legal-information/difference-between-dismissed-or-without-prejudice
youtube.com/watch?v=XrsHJS7ELFQ
twitter.com/NSFWRedditVideo

what about memecoiners?
tl;dr?

>deanonymization of bitcoin

What does that even mean? Your name is never linked to your bitcoin wallet unless you're doing something really stupid with a 3rd party service and this group hacked them.

that's why I use 3 VPN's + Tor at the same time.
I even access Facebook using an onion link, I bet you didn't even know that's possible?

translation: I can't read

Tor was released by CIAniggers to create a bigger drugmarket and to do other black ops. Many people don't want to buy drugs face to face from some creep. If you think they would release something like this without backdoors you're fucking retarded

nice disinfo shill
not buying a VPN

Literally named after torvalds himself

I bet you connect to the VPN first you dumb dumb.

I use HTTPSEverywhere with Tor and pipe everything through proxychains.

>she doesn't vpn-->tor-->vpn
It's like you hate privacy

So what? You need your private botnet to remain private?

>what about memecoiners?
they got a crapload of tor exit nodes banned from bitcoin nodes so you have to use something else
in the slides that means using your real IP, retards

so basically nothing

good job spoonfeeding you fucking sack of shit

U MAD

So what? Everyone has known this for years. The NSA can take down kiddy fiddlers or whatever with continuous, concentrated effort and money, and more power to them, while doing that for mass deanonymisation of users would be thoroughly infeasible. Nothing is a guarantee of anonymity, but a project like Tor sure beats the shit out of a VPN, and commercial VPN shills performing FUD is one of the two possible explanations for your post. The other is you being an idiot. Either way, fuck off.

Everything you get back from tor will be seen by your vpn retard.

CIA makes extensive use of Tor. If only CIA niggers use an internet service, then people would know that CIA niggers are connecting if it pops up. Opening Tor to the public helps them blend in.

Sounds great in theory but it's just fantasy
People getting caught off Tor always comes down to a poisoned node, user incompetence or inside men. If simply throwing money at the problem would solve things then a law enforcement department would have gladly been the one to 'clean up the dark web'.

So in that case all you have to do is to hack your neighbour's wifi through your average interception + deauth and use that so you real IP address cannot be revealed and use a clean live distro that can't be identified as you (no persistence, no JS), buy bitcoins with an ATM for cash with no phone number attached and use your wallet only once when transferring to "user markets". That way the link between your location and your entry IP address is broken, the link between your identity and bank and the bitcoins is broken and that's all if they spend $12,000 x ~12 on you. It would be honestly much easier to just put a mole on an "user market" as a seller and just collect addresses sent to you with orders if you really want to deanonymize clients. That said, for server demonetisation this seems to be good, that's why you should never trust a market.

>demonitisation
de-anonymisation dammit

fed post

As long as it keeps the Google tracking down I’m happy. Shit was invented by the NSA anyway so why wouldn’t it have some back door or flaw?

>actually assuming that Tor and especially Bitcoin are anonymous

You forgot to MAC address spoof and now you're going to prison.

>all these child porn websites are still up
hmm

>what is a honeypot

That's like putting a large sum of money on the sidewalk and hiding behind the bushes. When someone picks it up you spring on them to arrest them for grand larceny.
Preying on peoples temptations to ruin their lives instead of ridding them of avenues to succumb to their temptations is so fucking unethical and wrong.

You can't keep counting your Dollars up like that buddy.

wired.com/2017/03/feds-rather-drop-child-porn-case-give-exploit/

they did

wew

Yep. Then they arrest your neighbor, and even if you used macchanger they will check out all the neighbors.

>they will never suspect a 23 yo white guy with a hackerman poster on his door

Would they really be able to track you down with just a MAC address?

I highly doubt they would be legally allowed in most countries to seize all electronic devices in an apartment building due to a simple suspicion that someone had hacked another’s wifi. The real suspect could have been wardriving for all they know, and wouldn’t that be unreasonable search and seizure for anyone not directly involved ie the person who’s IP was exposed?

>Imagine what it is today..
not possible as tor project fixed these issues years ago. imagine being this computer illiterate and out of touch as you? top fucking kek.
nice try, FBI. get fucked.

Did you read the above wired article? The suspect in that case would have had a case brought against him again if the technique the FBI used to catch him was no longer effective, which isn’t something that seems to have happened. How would the TOR project be able to fix a vulnerability they don’t know about?

Reposting from another thread:
>bitcoin
All I needed to see. You do know that your actual bank has to be involved in the process of you transferring bitcoins when that Ponzi scheme was still in power? It was never possible to be truly anonymous by paying with bitcoin. And guess who knew it all along?
youtu.be/RZ_3MKomQzY
It's trivial if your banking information (bad opsec or personal information available somewhere else in cases other than bitcoin) is involved along the way. And that's how the cases of people actually getting caught went:
youtu.be/7G1LjQSYM5Q

lul

That sounds like double jeopardy and thats not allowed under the US constitution. So maybe he wouldn't.

> wired
what a dumb cunt. the NIT the FBI have be SO DESPERATE to keep quiet is NOTHING MORE THAN A JAVASCRIPT. these NITs were distributed on hidden forums when they were discovered and laughed at. It is fucking hilarious. these scripts targeted retards with no opsec whatsoever.
> BUT.. but... TOR is compromised
shut the fuck up.

Did you read the link in the OP?
Honestly you sound like an agent trying to keep people in your honey pot. Or maybe you're just an idiot.
It makes sense to sit on an exploit like this and pretend nothing is wrong.

Uh, no, retard. Please try to use your brain for at least five seconds before posting.

you seem to think the FBI has some magical method to uncover TOR users when all they have are JAVASCRIPTS. what a dumb cunt. I've seen the FBI's NIT efforts. they're embarrassing.
>Honestly you sound like an agent trying to keep people in your honey pot
stay mad, FBI. you've lost this war. suicide is your only recourse.

>some magical method to
So you didn't read the OP.
Why bother replying at all?

Catch what exactly?
Assuming you're using Tails your MAC was randomized. Even if they suspect you what evidence will they have?

>open this SVG file to find out
Very cleaver way to de anonimize Tor users dumb enough to not have SVG disabled on their browser.
SVG is even better than JS and revealing your identity to the world

Attached: denzel_intro.jpg (300x226, 8K)

illinoislegalaid.org/legal-information/difference-between-dismissed-or-without-prejudice

>Why bother replying at all?
He's a compulsive troll.
Ignore him and he'll go away... having done his damage.

Ok fags give me the quick rundown. Is OP still eternally BTFO as with all the other “muh tor compromised” threads or is there actually anything to this one?

>$144,000 and a year’s work to find my shitposting vs an email or a piece of paper subpoenaing my ISP
Yeah I think I’ll stick with tor.

I don’t think anyone can definitively say. In any case for my purposes TOR is still entirely fine, and still better than a VPN. That purpose being just simply trying to remain a little more anonymous online and retain some online privacy. For anything illegal though or any sort of activism or journalism in hostile nations I think the ground may be a little shaky seeing as how the NIT the FBI declined to expose still has never been made public. I did hear about the JavaScript explanation but I think that came about from an entirely different investigation.

>>demonitisation
>de-anonymisation dammit
>Demonization
Fixed it for you user ^_^

>You forgot to MAC address spoof and now you're going to prison.

...and you dont collect $200.

>but a project like Tor sure beats the shit out of a VPN

An offshore VPN affords you more security than TOR. Have fun trying to force and offshore company to hand over details.

Attached: 1556501004786.png (514x437, 327K)

LOL nice try mr fbi man. Either that or you are posting from a home for the mentally disabled.

>When you connect to a Tor hidden service, your true public IP address shouldn't be revealed to the server. However, Uncle Sam's NIT hidden on the commandeered Playpen website was able to determine the IP address of the forum's users. The Feds then took these addresses to ISPs, such as Comcast, and demanded details of the subscribers assigned those IP addresses.

>the agency has actually dropped cases against suspected sharers of underage sex videos rather than reveal details of its Tor privacy exploit.

>Rule 41 of the Federal Rules of Criminal Procedure – to allow US crimefighters to probe machines anywhere in the world, with a warrant.

So it’s nothing, thanks.

read the op

Wasn’t the playpen investigation determined to have been a JavaScript exploit?

is that what malwarebytes found on your pc you pedo

No it only found nudes of your mom

>I bet you didn't even know that's possible?
i didn't know that
then again, i've never so much as considered using facebook

>caring about anonymity
>on a website whose purpose is sharing information about yourself
what is the point?

dumbshits

Cops legitimately do this
youtube.com/watch?v=XrsHJS7ELFQ

It's only good when they prey on nigs. Reminds me of the electrified bike left alone for niggers to steal.

Forget bikes
There was a thing a couple years ago where Chicago cops used trucks full of Nikes

>Just open a SVG file despite svg file exploits being well documented
uh no thanks

>Wasn’t the playpen investigation determined to have been a JavaScript exploit?
yes
this autistic faggot makes this thread literally every single day

wait,buying bitcoins is illegal?
since when?

>the odds of revealing a hidden service were 99%
>Imagine what it is today..
Who wrote this?

an fbi agent

Not even gonna quote the rest of the retards in this thread

>ONLY USE TOR VPNS ARE JUST A MEME
>ONLY USE VPNS TOR IS COMPLETELY WORTHLESS
You people are faggots, retards, or glow in the dark CIA niggers. Maybe a combination of all 3.

Best security option for internet connection:
>public wifi
into
>VPN hosted OUTSIDE THE 14 EYES (I can't remember which countries those are off the top of my head but you can just startpage.eu it)
into
>Tor, also set to only use nodes outside the 14 eyes

That's just the internet side. As for your computer:
>Qubes or Tails run in RAM off a live USB stick (as in, put the stick in, boot and have everything running it ram, take the stick out - absolutely no permanent storage in the computer)
>Tor browser (pretty sure these are included and used by default in both of those OSes anyway)

Read Tor's guide on internet anonymity. There are a lot of obvious and some not-so-obvious protocols you need to follow if you actually want to be as anonymous as possible.

If you want to go full autismo and/or enemy of the state (aka defying Israel or Jews):
Find a laptop or computer with a pre-2007 Intel CPU or pre-2008 (I believe it was 2008) AMD processor. Both Intel and AMD have pretty severe state-sponsored (read: "do it or we'll gut you") backdoors in all their CPUs after those years. Intel's version is called Management Engine or ME, AMD's is called PSP or Platform Secure Processor. These are fully functional mini-CPUs inside of the full CPU that can give a dedicated adversary complete access to everything on your computer - everything in memory, everything in storage, every input and output, all network traffic, everything. And it can run regardless of whether or not the computer is on.

Follow all the advice here and even the most hardened CIA nigger won't be able to hunt you down. Combined taskforce teams given a long enough time and you eventually fucking up, sure. But one agent? Ain't gonna happen.

Have fun!

no pls.

>Preying on peoples temptations to ruin their lives instead of ridding them of avenues to succumb to their temptations is so fucking unethical and wrong.
Just a friendly reminder, alphabet agencies don't exist to "protect the public from our worst enemies".

Alphabet agencies exist to take care of problems the wealthy have. "Problems" being people who ask too many questions, speak out against Israel, or at risk for giving away damning information to the public.

The FBI has one of, but almost certainly THE largest collection of child pornography on the planet. Why? "To catch the bad guys". What that actually means is "so we can get rid of problems without anyone asking questions, because who the fuck is going to defend a pedophile? No one. That's who."

Attached: 1510373209672.jpg (334x249, 20K)

I should add:

>public wifi
Better option is non-public wifi away from cameras. If somehow they manage to trace it back to the starbucks you're using, they (may) have security footage. It would likely take days or weeks to get to that point, and the footage might have been deleted by then, but there's literally no way to tell. Only way to be sure is connect to wifi that's not anywhere near any cameras, especially not near any business cameras. Like this guy said: >There are a lot of obvious and some not-so-obvious protocols you need to follow if you actually want to be as anonymous as possible.
To be very clear: you cannot be 100% completely untraceable anonymous online. That's like wanting to be 100% completely impossible to rob - that's not a condition that can exist in reality. What you can do, though, is make it such an overwhelming pain in the ass for someone to rob you that it's *almost* certain that they won't. Following all those steps (particularly the Tor guide to anonymity or whatever it's called) is just the computer security equivalent of locking your front door and making sure your windows are closed when you go to sleep. Plus a few extra steps.

And, of course, a reminder that alphabet agencies and law enforcement at large do not work for you. They may occasionally do things that help the public but that is not their primary purpose. Their primary reason for existing is to keep problem (for the wealthy, mind you) citizens under control. Yes I am talking about the US and western countries. Russia and China do the exact same thing, they're just more open about it and don't care if people know, because their people don't have guns. Bazinga.

there is likely no point in using tor anymore since it became so popular that most nodes are captured, most service websites are honeypots and in the Internet it was also successfully blocked by every popular website including Jow Forums. Not talking about the fact that most part of the anonymous network (tor, i2p, zeronet) is dead.

Friendly reminder: posts like this are almost always glow in the dark CIA niggers or just useful idiots.

>There's no point in using tor anymore because it's compromised
And yet the provide no alternative, no explanation, no proof, no reasoning. Just "don't use it there's no point".

It's a dead-end post with no purpose other than the vague hope of convincing a few retards to do something illegal without any protection.

And if that's not the goal, if you aren't a glownigger, please enlighten us: if someone shouldn't use Tor, what should they use?

ITT: pedos in denial
your day will come you fucking scum

>in denial
hi!, welcome to Jow Forums

No, especially since it's random every time, the only way they'd be able to track you down with a MAC address is if they come in with laptops and shit and start scanning the network, see the Mac address and go around everywhere while measuring the signal strength. Since i live in a flat in a multi-apartment building and got a business downstairs that would take time, and be very noticeable, that said, i once found my lost phone on a campus by doing that since i had the mac address stored in one of those Kali tools (Armitage?) from my pentesting sessions back when i was CompSci
If my neighbour gets arrested i will at least have advance warning to burn everything

Completely defeats the purpose of tor if you go to Facebook