Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
Posted by: 2980539?
Posting time: 1.9 years ago on
Last edit time: never edited.
Archived on: 4/19/2019 10:00:00 AM
Views: 308
SCP: 1
1 upvotes, 0 downvotes (100% upvoted it)
Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
view the rest of the comments →
[–] 16204043? ago
Even if you connect to a node owned by the FBI, they still cannot know your identity. The only way for you to be infected is if you have SCRIPTS turned on, like javascript. There is no way of someone know your identity if you simply browse and post online unless you use a unique way of typing (some pedo who owned a large pedo site was only found due to typing "hiyas" in each announcement and some posts, they then searched for this usage of the unique word and found him on a facebook page advertising his pickup truck).
The only way anyone has found a TOR users identity is via a vulnerability in a script or if the user downloaded a compromised file. Make sure the site has HTTPS/TLS.
[–] 16204285? ago
TOR !=Anonymity
compromised directory nodes and traffic analysis can give away the location of users not taking additional precautions.
[–] 16204313? ago
TOR isn't perfect but it's better than nothing.
[–] 16204080? ago
Text analysis will all kill because we all write English.
Also: Panopticlick. Use what everybody uses.
[–] 16204052? ago
Technically, they could deduce it if your were already a suspect in a crime not to mention that you could give away your identity if you don't take the proper safety precautions already outlined in OP's excellent presentation.