![]() The attacker – be they a hacker or the FBI – can just put together 1 and 1 to get 2. You essentially slow down your internet connection for no practical benefit. If all someone needs to track you down using Tor is the ability to force you to download a large file and the ability to monitor some data, they can see both the entry and exit points and ignore Tor’s routing completely. ![]() There have been a lot of big raids from the FBI, the NSA, Europol, and other law enforcement agencies. It’s also not quite as anonymous as people would like to think it is. ![]() It’s slow, much slower than using the Internet normally, or even through a single proxy server. You enter it and they have no idea where you exit. You essentially put a cloud in the way of anyone trying to track your traffic. The idea of layered connection bouncing through an anonymized network with semi-random exit nodes is a good one, when it comes to security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |