NSA actually developed the whole protocol of TOR. It was originally meant to be used only by internals to remain anonymous on the web. But there was an issue - after a while, they'd start figuring out that whenever a TOR exit node connected to a website or somewhere else, they would say "oh, another agent connecting", and some may even block the access altogether. That's why TOR has been released to public for free and why anyone can set up their own TOR relay node. Because if other people, ordinary people, use the very same network, agents are much better concealed. Concealment doesn't work if an agent is in a room full of agents. They have to blend in amongst other people in the same room. Basically if there is a room that only agents have access to, then it is not very useful hideout. But if the very same room allows general public access, then agents hide there very easily. Not only that, TOR is also very useful in those parts of world where you have quite restricted access to the web or you're basically constantly surveilled online (like China). Hidden services are only added for convenience for those who really need to hide. You can find even government sites in TOR network, though they're most likely access restricted and require an authentication key (like a private room only for agents). But guess what? Anyone can run their own hidden service. You only need a public IP address and TOR network set up.
even if it was still "safe". i still would take precaution. if a group like kak17 would ever try to deanomynise us, we should always fight back with our own safe nodes and tor exits.
You missed the entire part where the same party can run a compromised exit and entry node. If you happen to be using both, they have everything.
You also missed the part where HTTPS isn't bulletproof, and also does nothing to save you from browser fingerprinting, WEBRTC, unencrypted DNS, and so on.
I like the channel. But kids, if you're going to use TOR for actual sensitive purposes, you need more information than you're going to find in 40 second videos.
So once people get hold of numerous nodes then they can in theory control the entry and exit then cross reference data and sniff you out....only way to make it "safe" is if everyone hosts a node....but. don't feel like getting raided due to unknown traffic....so I'll pass
Do you know Jim Browning? He tracks scammers, and in some of the newer videos he gets control of the scammer's pc and spys on it without them knowing. I know payloads that gives access to the victims files but not the whole computer including the graphical display.Any idea how he does it?
I know that but after he stops the software he still secretly spys on the scammers computer, I don't think hes doing it with the software they suggested as it shows he's connected to their computer
Hello crypto I have a question How did you set up the WiFi abapter on Linux, every time when I plug in my WiFi adapter the macchine is not recognizing it does it need some configuration What should I do?
After wondering about TOR, Finally he is saying if anyone have entry or exit nodes will spy on you For this, I can only use google with targeted ads instead of giving a person my whole browsing history
No java, but javascript. Its a programming language on a web site, that can run scripts. That means, your PC thinks, that its running the web page, while it actually runs a code to exploit your computer. Basically you execute code with your browser.
Both of you are wrong in so many countless ways. Anyone who comes across this - don't get your information from illiterate Youtube comments. Go do actual research instead.
NSA actually developed the whole protocol of TOR. It was originally meant to be used only by internals to remain anonymous on the web. But there was an issue - after a while, they'd start figuring out that whenever a TOR exit node connected to a website or somewhere else, they would say "oh, another agent connecting", and some may even block the access altogether. That's why TOR has been released to public for free and why anyone can set up their own TOR relay node. Because if other people, ordinary people, use the very same network, agents are much better concealed. Concealment doesn't work if an agent is in a room full of agents. They have to blend in amongst other people in the same room. Basically if there is a room that only agents have access to, then it is not very useful hideout. But if the very same room allows general public access, then agents hide there very easily. Not only that, TOR is also very useful in those parts of world where you have quite restricted access to the web or you're basically constantly surveilled online (like China). Hidden services are only added for convenience for those who really need to hide. You can find even government sites in TOR network, though they're most likely access restricted and require an authentication key (like a private room only for agents). But guess what? Anyone can run their own hidden service. You only need a public IP address and TOR network set up.
4 likeseven if it was still "safe". i still would take precaution. if a group like kak17 would ever try to deanomynise us, we should always fight back with our own safe nodes and tor exits.
2 likesWhoa, you just roasted the NSA.
7 likesYou missed the entire part where the same party can run a compromised exit and entry node. If you happen to be using both, they have everything.
1 likeYou also missed the part where HTTPS isn't bulletproof, and also does nothing to save you from browser fingerprinting, WEBRTC, unencrypted DNS, and so on.
I like the channel. But kids, if you're going to use TOR for actual sensitive purposes, you need more information than you're going to find in 40 second videos.
Replies (2)
No he didn't miss they part about both entry AND exit nodes, did you even watch the video
2 likesAh... who even thinks that a 40 sec video can cover a whole InfoSec 101 ?
0 likesSo once people get hold of numerous nodes then they can in theory control the entry and exit then cross reference data and sniff you out....only way to make it "safe" is if everyone hosts a node....but. don't feel like getting raided due to unknown traffic....so I'll pass
1 likeExcept if they run a large enough fraction of the entry and exit nodes to do correlation attacks.
1 likeDo you know Jim Browning? He tracks scammers, and in some of the newer videos he gets control of the scammer's pc and spys on it without them knowing. I know payloads that gives access to the victims files but not the whole computer including the graphical display.Any idea how he does it?
3 likesReplies (3)
he just uses software they tell him to download so they can get access
1 likeI know that but after he stops the software he still secretly spys on the scammers computer, I don't think hes doing it with the software they suggested as it shows he's connected to their computer
1 like@Bernd Lauert What
1 likeSSL over TOR is redundant and commonly used by NSA/CIA honeypots.
0 likesUr the best keep it up man
3 likesI swear to God this man works for the area 51 cyber security team
1 likeMiss the "Crypto Out" Outro
10 likesdid u hear about how recently someone was controlling over 30% of all tor nodes to spy on cryptocurrency related traffic
0 likesWhat can i study on the internet to become an ethical hacker
0 likesHello crypto I have a question
0 likesHow did you set up the WiFi abapter on Linux, every time when I plug in my WiFi adapter the macchine is not recognizing it does it need some configuration
What should I do?
Replies (2)
Forums are your friend here.
0 likesInstall the driver
0 likesAfter wondering about TOR,
0 likesFinally he is saying if anyone have entry or exit nodes will spy on you
For this, I can only use google with targeted ads instead of giving a person my whole browsing history
Replies (4)
Not "or" but "and"
0 likes@Jimbo what do you mean by the way
0 likes@Circuit Lover entry and exit nodes
0 likes@Jimbo ya 😅 typo
0 likesDidn't realize until u say
So how to save us from hacker while surfing on tor?
4 likesReplies (4)
Vikram Soni don’t log into any accounts and don’t enter any personal info on any sites.
0 likes@Eric J how about burner or temporary accounts ?
0 likesuse onion sites whenever possible
0 likes@Eric J why not? As long as the site is https it shouldnt be a problem
0 likeshow does turning on java compromise your data on tor?
0 likesReplies (1)
No java, but javascript. Its a programming language on a web site, that can run scripts. That means, your PC thinks, that its running the web page, while it actually runs a code to exploit your computer. Basically you execute code with your browser.
0 likesHow do I get all my information from my own IP address?? Is there any script?
0 likesReplies (2)
TECHNO TECH I’m 100% damn sure I would
0 likesTECHNO TECH my lost password and stuff
0 likesI am a beginner in security
1 likeAny advice
Which OS you use crypto??
0 likesGotem
0 likesWhy would you go to dark net....isnt it bad......
0 likesReplies (2)
Facebook has a darknet site !!!
0 likesActually yeh its all bad !
Both of you are wrong in so many countless ways. Anyone who comes across this - don't get your information from illiterate Youtube comments. Go do actual research instead.
4 likes