hobune Channels Contact About Donate

The TRUTH About Malicious TOR Exit Nodes!!

Back to video page | Download comments jsonl

Comments (archived 2022-07-01 16:45; 22 top, 42 total comments)

CZghost 2021-06-01 10:16:32

NSA actually developed the whole protocol of TOR. It was originally meant to be used only by internals to remain anonymous on the web. But there was an issue - after a while, they'd start figuring out that whenever a TOR exit node connected to a website or somewhere else, they would say "oh, another agent connecting", and some may even block the access altogether. That's why TOR has been released to public for free and why anyone can set up their own TOR relay node. Because if other people, ordinary people, use the very same network, agents are much better concealed. Concealment doesn't work if an agent is in a room full of agents. They have to blend in amongst other people in the same room. Basically if there is a room that only agents have access to, then it is not very useful hideout. But if the very same room allows general public access, then agents hide there very easily. Not only that, TOR is also very useful in those parts of world where you have quite restricted access to the web or you're basically constantly surveilled online (like China). Hidden services are only added for convenience for those who really need to hide. You can find even government sites in TOR network, though they're most likely access restricted and require an authentication key (like a private room only for agents). But guess what? Anyone can run their own hidden service. You only need a public IP address and TOR network set up.

4 likes
????? le ???? 2021-12-16 22:48:45

even if it was still "safe". i still would take precaution. if a group like kak17 would ever try to deanomynise us, we should always fight back with our own safe nodes and tor exits.

2 likes
Jewel Bency 2020-08-21 04:01:42

Whoa, you just roasted the NSA.

7 likes
Leo 2020-09-02 19:22:10 (edited 2020-09-02 19:23:40 )

You missed the entire part where the same party can run a compromised exit and entry node. If you happen to be using both, they have everything.

You also missed the part where HTTPS isn't bulletproof, and also does nothing to save you from browser fingerprinting, WEBRTC, unencrypted DNS, and so on.

I like the channel. But kids, if you're going to use TOR for actual sensitive purposes, you need more information than you're going to find in 40 second videos.

1 like
Replies (2)
Daniel Mcshane 2020-09-04 10:43:37

No he didn't miss they part about both entry AND exit nodes, did you even watch the video

2 likes
// w1z4rd // 2021-05-30 04:10:26

Ah... who even thinks that a 40 sec video can cover a whole InfoSec 101 ?

0 likes
Z M 2021-09-11 02:15:12

So once people get hold of numerous nodes then they can in theory control the entry and exit then cross reference data and sniff you out....only way to make it "safe" is if everyone hosts a node....but. don't feel like getting raided due to unknown traffic....so I'll pass

1 like
Punocchio 2021-12-16 22:24:54

Except if they run a large enough fraction of the entry and exit nodes to do correlation attacks.

1 like
AtMaclon 2020-08-21 14:35:11

Do you know Jim Browning? He tracks scammers, and in some of the newer videos he gets control of the scammer's pc and spys on it without them knowing. I know payloads that gives access to the victims files but not the whole computer including the graphical display.Any idea how he does it?

3 likes
Replies (3)
Gunga 2020-08-23 03:28:37

he just uses software they tell him to download so they can get access

1 like
AtMaclon 2020-08-23 06:32:33

I know that but after he stops the software he still secretly spys on the scammers computer, I don't think hes doing it with the software they suggested as it shows he's connected to their computer

1 like
AtMaclon 2020-09-02 13:14:08

@Bernd Lauert What

1 like
Ghost Samaritan 2020-11-16 21:14:18

SSL over TOR is redundant and commonly used by NSA/CIA honeypots.

0 likes
Purple Hoser 2020-08-20 21:16:43

Ur the best keep it up man

3 likes
Presto 2020-08-21 07:00:23

I swear to God this man works for the area 51 cyber security team

1 like
Sumeeth C M 2020-08-23 06:27:38

Miss the "Crypto Out" Outro

10 likes
nameless 2020-09-08 23:48:29

did u hear about how recently someone was controlling over 30% of all tor nodes to spy on cryptocurrency related traffic

0 likes
RGSgerada_ god 2020-08-21 16:51:05

What can i study on the internet to become an ethical hacker

0 likes
red fox 2020-08-21 10:41:07

Hello crypto I have a question
How did you set up the WiFi abapter on Linux, every time when I plug in my WiFi adapter the macchine is not recognizing it does it need some configuration
What should I do?

0 likes
Replies (2)
Tom Dillon 2020-08-27 23:18:28

Forums are your friend here.

0 likes
CloudyYT 2020-09-16 13:45:29

Install the driver

0 likes
Circuit Lover 2020-08-21 09:01:21

After wondering about TOR,
Finally he is saying if anyone have entry or exit nodes will spy on you
For this, I can only use google with targeted ads instead of giving a person my whole browsing history

0 likes
Replies (4)
Jimbo 2020-08-21 12:23:07

Not "or" but "and"

0 likes
Circuit Lover 2020-08-21 13:31:26

@Jimbo what do you mean by the way

0 likes
Jimbo 2020-08-21 14:34:49

@Circuit Lover entry and exit nodes

0 likes
Circuit Lover 2020-08-21 15:51:44

@Jimbo ya 😅 typo
Didn't realize until u say

0 likes
Mike Hussy 2020-08-28 21:04:26

So how to save us from hacker while surfing on tor?

4 likes
Replies (4)
Eric J 2020-09-05 21:33:28

Vikram Soni don’t log into any accounts and don’t enter any personal info on any sites.

0 likes
// w1z4rd // 2020-12-20 09:25:38

@Eric J how about burner or temporary accounts ?

0 likes
Mert Yavuz Indie Development 2021-05-11 11:36:45

use onion sites whenever possible

0 likes
Cookiekeks 2021-05-11 12:37:46

@Eric J why not? As long as the site is https it shouldnt be a problem

0 likes
labrudina 2020-08-21 02:05:43

how does turning on java compromise your data on tor?

0 likes
Replies (1)
Filip Priečinský 2022-05-15 00:41:35

No java, but javascript. Its a programming language on a web site, that can run scripts. That means, your PC thinks, that its running the web page, while it actually runs a code to exploit your computer. Basically you execute code with your browser.

0 likes
AlexGta5Gaming 2020-08-20 22:52:10

How do I get all my information from my own IP address?? Is there any script?

0 likes
Replies (2)
AlexGta5Gaming 2020-08-22 17:26:45

TECHNO TECH I’m 100% damn sure I would

0 likes
AlexGta5Gaming 2020-08-22 18:54:02

TECHNO TECH my lost password and stuff

0 likes
Red skull 2020-08-21 19:50:44

I am a beginner in security
Any advice

1 like
PHANTOM_GAMING 2020-08-23 14:34:56

Which OS you use crypto??

0 likes
Anes Gamer 2020-08-20 21:18:44

Gotem

0 likes
Pranav K 2020-08-21 06:33:05

Why would you go to dark net....isnt it bad......

0 likes
Replies (2)
jnex26 2020-08-25 22:32:54

Facebook has a darknet site !!!

Actually yeh its all bad !

0 likes
Leo 2020-09-02 19:20:07

Both of you are wrong in so many countless ways. Anyone who comes across this - don't get your information from illiterate Youtube comments. Go do actual research instead.

4 likes