This Forum has been archived there is no more new posts or threads ... use this link to report any abusive content
==> Report abusive content in this page <==
Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
TOR Browser traceability question?
04-08-2014, 06:43 PM
Post: #1
TOR Browser traceability question?
From what I understand, TOR connects you via a VPN to the internet and if 'your' IP Address is traced the resultant would only go as far as the VPN rather you.

Question, what's to stop the VPN itself, or the provider, from tracing the IP to the VPN and from the VPN back to you?

Ads

Find all posts by this user
Quote this message in a reply
04-08-2014, 06:51 PM
Post: #2
 
Tor bounces among many servers thus making tracing extremely difficult although not impossible. The last IP address is the one shown to a tracer.

Ads

Find all posts by this user
Quote this message in a reply
04-08-2014, 07:00 PM
Post: #3
 
You can be traced across TOR.

When you send DATA it goes first to your ISP then out into the WWW. Then to TOR.

Usually this is encrypted for plain html pages. BAD NEWS the CIA/NSA/FBI/MI5 have ALL cracked the encryption.

As soon as your ISP starts noticing TOR traffic it RECORDS - the security services then take a GOOD look - its encrypted for a reason.

http://www.bbc.co.uk/news/technology-24429332

You know many will say BS when you tell them their precious TOR is cracked. There is the news story, its cracked. You will just be sending out a "TRACK ME IM HIDING" signal.

Before the cops used to chase pedophiles to TOR servers, now they chase them to the actual homes. Pedophiles RUIN the net.

Seriously that is what got them after tor in the first place, police kept crying they couldnt be tracked. Once they found a flaw in they went - AND you can be CERTAIN they are still IN there.
Find all posts by this user
Quote this message in a reply
04-08-2014, 07:08 PM
Post: #4
 
Not exactly.

On TOR, data is repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and then sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.

A VPN, on the other hand, enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network. Basically, it tells that internet that you're on one network, while you're really on another, and that's the extent of it's effects.

You can't backtrace someone on TOR (at least not easily), because no one router knows all the details of your request. Only one router knows where the traffic came from, and only one router knows where the traffic ultimately ended up... and there are several jumps in between those two points on the chain, all of which are encrypted.

Sure, you could try too backtrace someone on TOR... but it's not easy to do, and you may still come up empty-handed in the end, because the intermediary routers don't hold onto data indefinitely. You might trace something back a step or two, but the next step may have already purged the information by the time you get there so you can go back any farther.

Also @Captain, I wonder if you even bothered reading the article you linked to. It said absolutely nothing about TOR being "cracked". It said that the NSA had been exploiting a vulnerability in the FireFox browser (which has since been patched) that allowed them to track a small number of TOR users who were using compromised systems.
Find all posts by this user
Quote this message in a reply
04-08-2014, 07:09 PM
Post: #5
 
Hi,

You can use NAT technique to do that hope that answers your question.

Good Luck.
Find all posts by this user
Quote this message in a reply
Post Reply 


Forum Jump:


User(s) browsing this thread: 1 Guest(s)