NSA vs Tor

talk about your computer or ask what program to use or what video card you like. others includes things like wordlists or color temps on monitor
Post Reply
User avatar
Legu
Allie
Allie
Posts: 232
Joined: Sun Dec 18, 2011 6:47 pm

NSA vs Tor

Post by Legu »

This is your daily reminder that:

- The NSA is logging all Tor traffic.
- The encryption algorithms used by Tor will be broken in less than two decades.
- All saved Tor traffic will be decrypted and analyzed then.

You can hide… for now.

--- from 4chan.... What do u think?

Related post:

If Tor traffic isn't easily distinguishable, then how have Iran/China been able to block it? Most US users don't even use bridges, which makes it a trivial matter of referencing the receiving IPs against the publicly available index of node IPs. It's not possible to perfectly replicate plain old SSL traffic, and the Tor Project admits this.

US is building a data center in Utah with data storage on the order of yottabytes, and are planning to use it to log all Internet traffic (plus cell phone calls, receipts, and other things) in the US. 100 petabytes over fifteen years is pleb-tier for them. They'll probably store more than that in a month. Get with the times, grandpa.

>Secondly, ISPs can't be compelled under US law to give over user information without a warrant…not even to the NSA.
>without a warrant
>warrant
>NSA

https://en.wikipedia.org/wiki/NSA_warra ... ontroversy

Let me guess: you think the US is a democracy where the rule of law prevails?
User avatar
Sethioz
Admin
Admin
Posts: 4762
Joined: Fri Jul 27, 2007 5:11 pm
Custom: Gaming YT > https://youtube.com/SethiozEntertainment
Game Hacking YT > https://youtube.com/sethioz
Game Hacks Store > https://sethioz.com/shopz
Location: unknown
Contact:

Re: NSA vs Tor

Post by Sethioz »

I think this is bullshit, TOR has option to use it as client and lot of people run it from home, meaning if THEY don't keep logs, NSA can't do shit.

for example, if you send me a file and i re-send it to someone else, they don't know who sent it to me unless i say who it was.
Encryption i don't know about, never did any research on it.
Also TOR routes thru 3 relays before going into destination:

you > relay 1 > relay 2 > relay 3 > destination

what if one of the relays is in russia? you think russia co-operates with NSA? .. i don't think so, they give them middle finger.
so if one of the nodes is outside USA, they can't do much. they can request for info, but if the client simply does not keep logs .. then there is nothing they can do about it.

also in germany, some ISPs are not allowed to log even IPs, meaning as soon as you request new ip (renew ip), then you're not trackable anymore.
so i say its untraceable, unless your own ISP records what you are doing, then they see every site you visit, since its from your side.

as a small note, about 6-7 years ago i hacked into NSA sister website via TOR and nothing happend :)
User avatar
Legu
Allie
Allie
Posts: 232
Joined: Sun Dec 18, 2011 6:47 pm

Re: NSA vs Tor

Post by Legu »

as a small note, about 6-7 years ago i hacked into NSA sister website via TOR and nothing happend :)
implying u didnt seriously fuck it up so much that they had give the effort to do smt about it. I remember when sarah palin got hacked and the guy posted her stuff on 4chan, he was behind tor too, yet he got traced bk. But it was a national issue so idk.
User avatar
Sethioz
Admin
Admin
Posts: 4762
Joined: Fri Jul 27, 2007 5:11 pm
Custom: Gaming YT > https://youtube.com/SethiozEntertainment
Game Hacking YT > https://youtube.com/sethioz
Game Hacks Store > https://sethioz.com/shopz
Location: unknown
Contact:

Re: NSA vs Tor

Post by Sethioz »

you should get your facts straight. David Kernell who "hacked" her account was a retard and so was Sarah ... only retarded moron would use password that can be guessed based on family / personal stuff, like date of birth, name of college, name of your teacher ... etc.
he didn't really hack anything, he got lucky with guessing. anyone can do that by digging around in internet about someone.
and he was not behind TOR + he was so dumb that he used his own email to post from .. DUH.
all NSA had to do, is put his email into google LOL.

THEN what they probably did, is contacted his ISP as him being suspect, then his ISP gave them logs and from there they saw where he connected to, proxy or not, requests were sent direct to that yahoo account.
they can put together time and ip and there's all the proof they need.
The hacker left behind traces of his activity. His IP address was logged at the proxy he used, CTunnel.com, and he also left his email address [email protected] when he posted at 4chan. Furthermore, the attacker revealed the original web address used by the proxy[17] by leaving this information in the screenshot which according to experts can also help the investigation.[17] 4chan's /b/ board is not archived, and posts are only retained for a short time. However, with the great interest surrounding the posts of Rubico, many, including wired.com, archived the original posts. The email address left behind was then connected to David Kernell through various social networking profiles where it was used,[18] though no official investigation took place at this time.
from this i understand that he really is a retard.
not sure what they mean by leaving original web address used by proxy, i think they mean he used a web based proxy ...
you can't compare this to a real hack lol.

i can't say what i did or did not do, but apart from that, i have also "hacked" some government agents' emails. i got 2 yahoo emails from one, he had tons of government related shit there.
and few famous actors.


Lets put it that way, i'm quite sure that TOR is untraceable, but if i'd do it again, hack into NSA, FBI or something like that, i would not rely on TOR. i would go somewhere with netbook/laptop, crack myself a network and use that or just put antenna on window and take somebody's wireless, still better not to do it near where you live.
Only way you can get cought using TOR, is when they get lucky. lot of tor nodes are hosted by some ISPs or website companys, most likely they DO keep logs (ip connection logs, not traffic), so if you are very unlucky and they are lucky, then all 3 nodes might be ones that keep logs, then you would be fucked, but what are the chances of that?
User avatar
Legu
Allie
Allie
Posts: 232
Joined: Sun Dec 18, 2011 6:47 pm

Re: NSA vs Tor

Post by Legu »

Lets say u had go like 30km far, crack a great wep and use it. Would u then still use tor, when hacking? Extra security is not bad i think, but what for if the only thing they can get is ur mac, which can get easily faked too.
User avatar
Sethioz
Admin
Admin
Posts: 4762
Joined: Fri Jul 27, 2007 5:11 pm
Custom: Gaming YT > https://youtube.com/SethiozEntertainment
Game Hacking YT > https://youtube.com/sethioz
Game Hacks Store > https://sethioz.com/shopz
Location: unknown
Contact:

Re: NSA vs Tor

Post by Sethioz »

That depends on what im doing, if i want to leave false traces, i would not use TOR and let them think it was someone who knows the pass.
if i don't want to get traced or make it extremely hard and time taking, i would use TOR.

Legu lol ... you really need to learn about networking. MAC never leaves local network.
if your router does not keep logs of MACs, then it never leaves router. it would have to be pulled from router and as far as i know, none of the routers are configured by default to keep log of MACs and even if they do log, they won't log the time and date.
at least all the routers ive used, don't have such feature to log all MACs.

as about tracing by MAC, i don't think so. maybe.
depending on the company, each company should be able to trace the purchase by MAC, but what can they do?
MAC is no proof, even if they find you by purchase of the hardware, they can't prove it was really you, can they? because MAC can be faked. you deny the whole thing and they can't do anything, MAC is no proof.
but for extra security, you can just steal somebody's MAC, best is to take MAC of someone who uses that network you using.
Post Reply