Sysop: | Denn |
---|---|
Location: | Clearfield, Utah |
Users: | 20 |
Nodes: | 15 (0 / 15) |
Uptime: | 125:49:37 |
Calls: | 288 |
Files: | 221 |
Messages: | 17,492 |
I don't think the Tor network is inherently insecure. Exit nodes may
attempt to sniff at your traffic, but since every modern service you may
use on the clearnet is encrypted then it does not make much of a
difference, not to mention if you don't use Tor you give the chance to
watch your traffic to even more people.
i wouldn't trust it. you're sending your data through random people, most of them not very nice people. furthermore the us govt developed it and released it to the public.
The Exit nodes can potentially monitor your internet activity,
keep track of the web pages you visit, searches you perform,
and messages you send. No doubt some government institutions
are operating exit nodes.
But isn't there more confidence in privacy and encryted
sessions when using .onion destinations?
and messages you send. No doubt some government institutions
are operating exit nodes.
But isn't there more confidence in privacy and encryted
sessions when using .onion destinations?
if it's going through us govt nodes then encryption and privacy is probably useless.
The Exit nodes can potentially monitor your internet activity,
keep track of the web pages you visit, searches you perform,
and messages you send. No doubt some government institutions
are operating exit nodes.
But isn't there more confidence in privacy and encryted
sessions when using .onion destinations?
and messages you send. No doubt some government institutions
are operating exit nodes.
Well, I have doubts about that, considering most http traffic these days goes encapsulated in TLS.
An Exit node can't keep track of the sites you visit because different sites are accessed over different circuits. An exit node who gets a gazillion users through it cannot realistically determinate which site visits belong to a particular user either.
Searches cannot be tracked because the serch query is encrypted. Same with messages and the like.
the probably is, you trust encryption. don't you think all the big govts have cracked that encryption or have a way around it? they are probably 10 years or more ahead of what we think they are.
the probably is, you trust encryption. don't you think all the big govts have cracked that encryption or have a way around it? they are probably 10 years or more ahead of what we think they are.
I don't think they can crack something like modern TLS in real time. I am sure they have a bunch of pre-cracked primitives stored somewhere so they
Personaly I think it is not likely they can perform real time cracking, because when they have needed such a thing they have opted to bribe operators of the trust chain instead (in order to get fake certificates to attempt MITM).