How TOR exit nodes can keep getting away with it?

If I undertand correctly when a website is requested it gets all the info about the exit node (IP, ISP, etc) and then deliver the content.
So how is possible that TOR exit nodes are still operating with cp and drug deals going through them? they are operated by glownigger or what?

Attached: 342454665.png (754x400, 118K)

Also how the onion sites work? I'm guessing the page is served through an exit node too.

those sites operate as tor hidden services, the exit nodes and those sites are protected by two additional layers of anonymity.
even if such sites operate on clearnet the exit nodes cannot filter the content which is often encrypted

exit nodes only work for access to public internet, not for the onion services that commonly host such things
try to run drug market on public internet, you will get shut down quickly

Traffic only leaves the Tor network if its destination is on the Internet. I'd say most traffic stays within the Tor network, so exit nodes don't need to worry about this kind of traffic (it's encrypted).

Exit nodes are only used for accessing clearnet destinations. Tor hidden services are fully encrypted and anonymous from end to end.

There's still tons of illegal shit being hosted on clearnet servers, like altchans and shit. They may or may not be honeypots, but I'm not sure why they would be considering that using Tor with JS disabled is sufficient to gain free access to the site without risk of being caught. It seems counterproductive for LEOs to just put that shit out there for anyone to access safely and securely. Then again, the FBI operated a child porn site for half a year and as far as I can tell, didn't manage to get a single conviction out of it. There's really no accounting for glownigger stupidity.

Yes, you're right, and exit node owners do often get into trouble for it. Often they're able to get away with it just by stating that they run an exit node.

> glownigger
in fact, many easily accessible tor sites are honeypots and most nodes are government operated.

there are alternatives that actually work and arent government.

its quite interesting that time and time again people use cyber security tools made by alphabet agencies.

>the FBI operated a child porn site for half a year and as far as I can tell, didn't manage to get a single conviction out of it

Are you talking about Playpen or some other case? Because the Playpen op did lead to a few convictions. The convictions weren't overturned because the appeals court considered that even though the warrant was illegal, it was not the FBI's fault for using an illegal warrant in good faith but the magistrate's fault for granting an illegal warrant. Interestingly, there was also a case where the FBI preferred to drop the charges than reveal how their malware worked.

>Interestingly, there was also a case where the FBI preferred to drop the charges than reveal how their malware worked.
That's because it's a simple JavaScript exploit and they didn't want people disabling JS and breaking their only tool for deanonymizing tor users.

I got fuck over multiple times for this exact reason. Bad traffic leaving my computer getting me DMCA'ed and worse.

Why don't people use I2p for torrenting?

Attached: 1555387852412.gif (480x480, 2.97M)

Why are people interested in technology that will shield them from scrutiny by organizations whose purpose is to protect citizens from crime?

I would gladly use an online privacy service that acted as a government honeypot, because my data would be protected from the corporate elite, which is what actually matters. And, hell, if I found any pedophiles on there while I was at it, I'd gladly assist however I could in reeling them in and getting them put in prison, hopefully for life.

Attached: the 16-yard-wide scriggly scroomer.png (960x540, 692K)

Ah, the classic I have nothing to hide argument. Antisocial neets just don't like society

The government doesn't care about your data because it's not selling and/or mining it for profit

>Malicious people don't work for the government
>The government would never abuse its authority

PRISM
R
I
S
M

They cant risk only using evidence that is obviously collected illegally.

but the pedophiles are the government

who do you think the government's in the pocket of dummy?

your ISP only can know when do you connect TOR and when you go out.

They have lawyers, when the governments pay them a visit (usually it's trivial shit like someone pirating something, sometimes it's more serious) the lawyers tell the government that that traffic was generated by being an exit node.
>inb4 how they can prove that
The Tor Project keeps track of what exit nodes were active at what time, therefore they can use that as evidence.
>inb4 can I run an exit node and start doing illegal shit?
No, if they figure out that you have been using your exit node for personal traffic, your ass will be busted immediately, which is why most exit nodes are operated at data centers.

A lot of websites will block (or attempt to block) Tor users, either by putting captchas on the site or just outright denying access.

1) The hidden service picks a few nodes in the network as its introduction points and builds circuits to them
2) The hidden service creates a descriptor containing its public key and information about the introduction points and gives it to a distributed hash table
3) You query this table and find the descriptor for the hidden service you want to visit
4) You create a circuit to one of the nodes in the network, it acts as a rendezvous point
5) You encrypt a message with the public key of the hidden service, containing the location of the rendezvous point, and send it to one of the introduction points
6) The hidden service receives and decrypts this message, then makes connects to the rendezvous point via another circuit
7) You and the hidden service communicate via this rendezvous point

fuck off with these stupid threads