New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
I am pretty sure that @ub3rstar is a pedophile. Those who cry the loudest.... ;-)
Excuse me for repeating myself, but TOR has many uses. The majority of TOR users are not using it illegal activities.
There are many who use TOR for illegal activities, such as child pornography. It would not surprise me to learn that the vast majority of those who deal with child pornography are familiar with TOR and use it to cover up their activities. The number of people who deal in child pornography is probably higher than most of us would like to think, but they are still very low in numbers compared with the general population. Just because most child pornographers use TOR does not mean that most TOR users are child pornographers. Just because many illegal activities are performed with TOR does not mean that most TOR users are performing illegal activities.
TOR is a frustrating thorn in the side of law enforcement and other government agencies, and eliminating it would make it easier for them to do their work. They have grown accustomed to having unfettered access to the communications of the general population. They worry that TOR and other technologies will deny them that access. It makes sense that they would bring out terrorists, child pornographers, drug dealers, copyright pirates, and other scary examples to gain popular support to eliminate unrestricted use of those technologies. At the very same time, law enforcement and government agencies value and use those technologies for themselves. Yes, they use TOR. A lot.
Law enforcement and government agencies have a deeply entrenched, near religious belief in a world where everyone has the best, strongest security to keep data safe, while at the same time, law enforcement and governments have trusted, unrestricted, secret access to that same data. They believe that they can be trusted to use their authority and access only for "good", however you define the term. They believe that "key escrow" failed due to poor implementation and politics, not because the concept is fundamentally unsound. They do not understand that providing their desired access to data weakens security for all, and leaves everyone open to harm. (Sometimes they believe that the harm that backdoor access causes is less than the harm that would be done by those that they target if we continue to allow unrestricted access to encryption and anonymity technologies.)
Imagine a world where law enforcement eliminates TOR and enforces laws so that Google and others can only build systems with backdoors installed. Law enforcement is trusted to obtain warrants when they want to use the backdoors. What happens when the recognized, legitimate government of France wants access to the same backdoors? What about Algeria? Russia? China? Venezuela? Liberia? Cuba? Iran? Bhutan? North Korea?
I will say it again - the majority of TOR users are not using it illegal activities. The ones who use it for illegal activities get the spotlight for many reasons, and that spotlight fulfills many ulterior agendas.
No.
The "legitimate government" of France is already doing its own NSA-like snooping. Here's the law that allows it to (in French): http://www.senat.fr/dossier-legislatif/pjl12-822.html
word
I still cant believe no one's mentioned how google's cloud has obviously been compromised, they are/were using google cloud ip's =P #YourCloudDataIsNowPublic
https://cloud.google.com/
They probably just used the free trial.
Lousing your time to hack something without to win a dollar its lame. If there are kids np, but what the hell are doing the adults
Most TOR nodes are compromised, at least the exit nodes.
Source?
But because the request comes from another relay, they don't know which IP originally made the request. Isn't that why Tor is ideal?
Yes. Tor protects the surfer, not the content.
http://www.smh.com.au/it-pro/security-it/revealed-the-young-men-who-ruined-christmas-for-xbox-and-playstation-gamers-20141230-12foc5.html
ohh god this is so cliche.
THANK YOU . been trying to explain this to a few people i know
seems to go over their head
You can run relays without worrying. They are very important to protect the IP of the surfer, even if the exits are compromised and you are not using "HTTPS anywhere". The server will know you are coming from Tor, the exit will know what you are doing, but will not be able to pin it to you.
So, for example, NSA (chinese, russian, iranian, israeli secret services, etc) will know someone using Tor posted a call for civil disobedience, but will not be able to track who did that, unless you give that information yourself (for example logging on to your twitter account without Tor at least once or giving real data at the registration).