10

12 comments

[–] jobes 1 points (+1|-0)

This article seems to leave out how the US gov tracks tor users by hosting a huge number of relay and exit nodes. If every bounce hits their nodes, then they can track you. This is old af information from the Snowden drop

[–] smallpond [OP] 1 points (+1|-0)

If every bounce hits their nodes, then they can track you.

So if not every bounce hits their nodes, they can't? That sounds fairly good to me. The inconvenience of regularly using Tor for low-bandwidth browsing is minimal, and I think it's worth it just to help build momentum in privacy focussed technology.

Using Tor is better than giving up - and if you're not giving up, what would you recommend instead?

[–] jobes 1 points (+1|-0)

So if not every bounce hits their nodes, they can't?

As far as we know. That was their strategy 5-7 years ago - you can't catch them 100% of the time, so catching them in random occurrences is good enough. Many people think they're safe using tor for browsing illegal content, but lose their anonymity when they say view an image or video they downloaded on tor using an application on Windows that connects to the internet when viewing it. Most media players look for metadata in online databases every time you play something, so that old dl can connect you to you not being on tor.

what would you recommend instead?

There really aren't any better options than creating your own relay network.

[–] smallpond [OP] 1 points (+1|-0)

Well, I wasn't thinking of doing illegal stuff, but probably what I do is already illegal in places. I remember reading about Tails a while ago, but that seems to entail a way higher level of inconvenience.