So if I understand correctly, honeypots are websites or services that promise to provide you the desired service but instead is used by authorities to log your information like your IP address. But if they use this for hidden services how does it work? they won't know the true IP address of the user anyway because in the tor protocol the user and server meet at a rendezvous point so that the server doesn't knows anything about the user and vice versa. So how do people get trapped in them?
>But if they use this for hidden services how does it work? javascript/browser exploits, or bad operational security of the user (for example using a username that you use elsewhere, on non-hidden services).
Aiden Price
just use curl with tor hidden service and be safe desu
Hudson Edwards
I forgot, the timing that you connect to tor can also be something that gives you away, especially if you're already under surveillance. Look at how the FBI got Jeremy Hammond.
Austin Peterson
I too was about to mention timing. Cant explain right now because I cant remember my past knowledge about it. Might have to look it up.
Ayden Reyes
Yep. Also correlation attacks are possible. e.g. they own the exit and entry node. Unlikely and does not effect hidden services. Or by doing traffic analysis, it is possible to time you activity.
Landon Smith
I run at TOR at the "Safest Preset" that disables javascript on all websites. Anything else I should do? are traffic generators a good workaround for this?
also I saw Tor officially released it's browser for android on f-droid. is it as safe as the desktop version or are there any drawbacks?
Austin Russell
Why is tor such shit? Literally everything is ddos'd
Dude, don't do it. You're too technology illiterate to do stupid things on the dark web If you don't want to get caught doing illegal shit, just don't do it