1
-1

[–] derram 1 point -1 points (+0|-1) ago 

https://archive.is/W9xiF :

FBI’s use of Tor exploit is like peering through “broken blinds” | Ars Technica

This has been an automated message.

0
0

[–] DumpAcc98320948 ago  (edited ago)

Most people don't understand what they read because the article doesn't go into laymen terms and is frankly being alarmist.

FBI operated hidden services that were configured in a way to plant malware onto the victims computer that would phone home with the real IP of that user. So, to be compromised in this way, you must access a HIDDEN SERVICE that is being operated maliciously and employing this NIT technique. Honestly it sounds like Man On The Side Attack.

In the past, it has been other user error that caused the hidden service IP leak, like the user ran javascript or used a bad login portal or something like this. Not from exploiting a flaw in TOR itself.

I don't know of any HIDDEN SERVICE that is being used as part of the pizzagate investigation so most people who use TOR here will be using it to vist clearnet websites. When you use TOR to visit websites that are NOT hidden services, you will need to use an exit node that handles traffic in the clear. This is where hackers/agencies will try to do Man In The Middle attacks, but these are obvious because you will find certificate errors and with modern browsers today they will stop you from carelessly doing dumb shit like accepting fake certificates. TOR and its community regularly hunt and blacklist these malicious exit nodes. I have ran into them before and reported it. You can request new circuit/exit node easily from Tor Browser.

There is NO indication that you are able to be fingered from an exit node so long as you are using HTTPS and checking your certificates.

0
0

[–] ThePuppetShow ago  (edited ago)

It's most likely impossible to hide form the government if they're looking for you. Just look to the supposed anonymous VPN's for proof. "Privateinternetaccess" claims you can pay with a gift card, but they want you to prove ownership of that gift card. Which, you must reveal your identity to do.

TOR exit nodes have been compromised for a long time because they can see your real IP, if your just using TOR with no VPN. To do things right you need to set up your own VPN and run it like this.. VPN - TOR - VPN What I don't know is if their exploit can still pull you real IP from this, but I doubt it.

Or, find an open wifi in your neighborhood. There's always Starbucks too, just spoof your MAC address to be safe.

0
0

[–] DumpAcc98320948 ago 

How do TOR exit nodes reveal your IP?

How the FUCK is hosting your own VPN more anonymous? That is the dumbest fucking thing I have ever heard on here.

0
0

[–] ThePuppetShow ago 

If you control the TOR exit node you can see the real traffic.

Would you like to state why that's "the dumbest fucking thing you've heard on here"?