this post was submitted on 08 Apr 2024
91 points (96.0% liked)
Privacy
31818 readers
533 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The US probably runs a huge number of TOR nodes, and can therefore do correlation analysis* to unmask TOR users. I'm not an expert, so don't take this statement at face value, but that's my understanding. Also keep in mind that if your threat model includes the NSA or similar agencies, you are probably overly paranoid or else you are fucked.
*edit to add: this is called a "Sybil" attack. Look it up in relation to TOR. Again, this doesn't mean that TOR isn't perfectly secure for most threat models, but neither is it impervious.
Do you have evidence of this? Because without evidence you are just spreading misinformation
How would I have specific evidence that US intelligence (who created TOR, btw) runs a large number (majority?) of exit nodes? I happen to think it is quite likely, but if you read my comment carefully, you can see that I did not present a statement of fact. It's not 'misinformation' but I would understand if you wanted to call it FUD.
What your describing is a fallacy
Neat.
They do run lots of nodes. And thank god too, the more the better it is for us all.
The ability for them to use those nodes to track Tor users is laughingly fleeting, if you're running an up-to-date version of TAILS and not doing something stupid like checking your [email protected] at the same time as you're uploading docs to SecureDrpp
This is exactly what they did