Hundreds of Tor Relays are Being Used to De-anonymize Users

Share This Story, Choose Your Platform!

About the Author: NC Scout

NC Scout is the nom de guerre of a former Infantry Scout and Sergeant in one of the Army’s best Reconnaissance Units. He has combat tours in both Iraq and Afghanistan. He teaches a series of courses focusing on small unit skills rarely if ever taught anywhere else in the prepping and survival field, including his RTO Course which focuses on small unit communications. In his free time he is an avid hunter, bushcrafter, writer, long range shooter, prepper, amateur radio operator and Libertarian activist. He can be contacted at [email protected] or via his blog at brushbeater.wordpress.com .

12 Comments

  1. Captain Mike December 13, 2021 at 13:09

    Massive move like the fake jews Pegasus backend to Microsoft in exchange for child sex on pedo island for Gates with asstein and fucksaad, I mean Epstein and Masad fuck wits.

  2. James Carpenter aka "Felix" December 13, 2021 at 13:39

    The old might become new again – little slips of code attached to a bird’s legs worked well enough back in the day…

  3. Sad Trombone December 13, 2021 at 13:43

    You mean a honey pot created by DARPA and the Pentragram isn’t all it’s cracked up to be?
    Sad trombone is so sad, always so sad.
    Go with an in home proxy server or use the neighbor’s Wi-Fi in exchange for tech/security support.
    Keep an offline box for Samizdat.

    • DirtNasty December 13, 2021 at 15:50

      You may want to explain how a in home proxy server is better then the tor network? Are you talking about being a host for other people to connect? Proxy servers are typically not encrypted and guess who’s ip all that traffic comes back to? You!

      Tor is mathematically harder to break then even VPN traffic, everything can be compromised.

      Here is a good short explanation.
      https://www.privateinternetaccess.com/pages/tor-vpn-proxy

      Good VPN services these days can run a combination through the ttor network then connect to a VPN server or vise versa.

      Sorry man this is bad advise, proxy servers were cool like 20+ years ago.

    • vyt1az December 14, 2021 at 22:03

      Hahaha. A sad trombone plays whenever you give out advice.

      A home proxy server. I can’t stop laughing at that one. Talk about controlled opposition. Hey everyone, you can be “anonymous” by proxying your remote connection through your own home internet so that it’s actually easier for an ISP or an agency to identify your traffic when you’re not at home.

      Share WiFi with the neighbor? Oh yeah, two people connecting on the same ISP connection is twice! as “anonymous” as one person connecting.

      The entire point of VPNs and Tor is to mix your traffic with thousands of others in order to obfuscate who you are. It’s one part of a multitude of mitigation techniques.

      The US Gov. funding something as an argument that it’s inherently compromised is absurd. The gov funded things like the internet, the space program, GPS, etc. with the broader engineering and scientific communities because private industry needs federal infrastructure and the gov needs creative people who actually innovate.

      The vast majority of the technology you use today had at least some funding from the US Government.

  4. Chris December 13, 2021 at 13:54

    Not surprised at all.
    Never did the tor thing…zero trust.
    My attitude…if its electronic, its a Rat, or can be made To be.

    Hell, i’m goin old school, back to the dope book.
    The kestral though great….is electronic. Therefore…untrustworthy for silence.

    • vyt1az December 14, 2021 at 22:26

      This kind of attack works on “old school” networks too. An analogous situation would be If king George had enough money and people to infiltrate the colonies with so many spies that close to 1/2 of every pub, shop, town, Church, etc. was filled with loyalists listening in on the conversations. King George just didn’t have that kind of money or time to place all of those resources. Our government does, at least digitally.

      Because the domain is digital, and it’s not as easy to see what’s going on, it seems different but it’s really an age-old strategy.

      This situation shows how resistant Tor has been to surveillance as this kind of thing is the act of someone who can’t hack / compromise easily enough, and so they’re throwing every resource they have in order to become a global adversary and take over the whole Tor network.

  5. DirtNasty December 13, 2021 at 16:12

    This guy is exactly right, I need to fire my tor server back up!

    • vyt1az December 14, 2021 at 22:04

      This is the way.

  6. Another Nobody December 13, 2021 at 22:13

    Pigeons, dead drops…

    The “old ways” are better for everything you may wish to do that could compromise you. You have to take the time to understand and utilize the “new ways”, however… the gains they offer are exponential. Considering the fact we are all on lists anyway, why not set up a relay to help all those actors (both good and bad) that are up to things you’d like to be doing? ;)

  7. […] 103: I dive into the story regarding compromised TOR routers and discuss operating practices which should become standard in an effort to protect you online. […]

  8. Captain Mike December 14, 2021 at 00:04

    Alex jones owns a lot of networking assets as an example or he wouldnt be talking right now. Also crackhead obama stole many common TLD when he signed them over to the mongoloid bastard jews. Lets kick the shit out of them when we see them.

Comments are closed.

GUNS N GEAR

Categories

Archives