2/15/2023 0 Comments Tor browser bundle 2017![]() ![]() ![]() ![]() In my experience, HTTPS makes you more distinct and trackable than plain HTTP. However, I view this from the attacker's perspective and as someone trying to profile users. Similarly, there are people who claim that they only use TOR with HTTPS to ensure a secure connection. I don't think there's a single TOR guard node operating in a country that permits these, so there is no legal way to be a customer of these services. Even Amsterdam doesn't permit cocaine, heroine, or child prostitution. Seriously: if a TOR hidden service offers hard-core drugs or human trafficking or fake IDs, then they should be shut down. My TOR hidden service for the Internet Archive is averaging 96% network attacks and hostile activity per day, and 4% non-hostile traffic.Īlthough the Tor Project could promote options to restrict these malicious actions, they choose to do nothing. Everything from spam and network attacks to trafficking people and contraband. For this reason, TOR is used for a huge amount of hostile activities. The things that makes TOR useful for people avoiding prosecution also makes it useful for people involved in malicious and criminal activities. TOR offers better network security for many things, but it does nothing beyond the network component. For example, I don't like how the rabid TOR supporters describe it as a secure solution. And most of these problems are associated with the people and not the technology. However, there are just as many things that I don't like about TOR. I like it enough that I run a couple of TOR hidden services - they offer much more network security than anything I've seen on the open Internet. It does an excellent job of anonymizing part of the network route (from your browser to the TOR exit node). On one hand, I like what the technology offers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |