doctorow at July 4th, 2014 15:00 — #1
japhroaig at July 4th, 2014 17:07 — #2
The initial circuits set up be the default Tor bundle are ridiculously easy to monitor. It is orders of magnitude harder to monitor inter node traffic, but not impossible (if you own a significant number of entrance and exit nodes).
Tor is great, but two things--ease don't use it for torrents or syncing blockchains, and for the love if FSM obfuscate the fact you are hitting an entrance node.
tekna2007 at July 4th, 2014 17:10 — #3
What is that, is that a torrent thing too?
How? And what's the issue there?
japhroaig at July 4th, 2014 17:23 — #4
Torrents are one problem, the blockchain for crypto currencies is another. In summary they are high bandwidth activities that strain already limited resources.
Second, tunnel your traffic to a non Tor server (ssh, openvpn, encoded DNS ) before hitting the Tor entrance node.
japhroaig at July 4th, 2014 17:28 — #5
Oh and the issue is even encrypted if I see packets coming from you with high entropy/randomness, you have just made yourself a target. If you tunnel via ssh to a VPS in say Brazil before you set up your Tor circuit, then it forces your adversaries to go beyond simply Tor stats.
Oh, and the NSA runs 1/3 or there about of routers. So if you enter and exit a captured router the NSA doesn't even have to do any work.
boundegar at July 4th, 2014 21:23 — #6
They hate us for our freedoms.
anthonyc at July 4th, 2014 22:09 — #7
I saw the picture before reading the title, totally thought the guy on the right was peeing.
davide405 at July 4th, 2014 23:45 — #8
What is it about every TOR thread that brings out the FUD slingers?
japhroaig at July 5th, 2014 00:01 — #9
Tor is a great tool, but depending on your mission and location it is faaar from adequate. That isn't FUD, it is just good sense.
doctorow at July 9th, 2014 15:01 — #10
This topic was automatically closed after 5 days. New replies are no longer allowed.