• electric_nan@lemmy.ml
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    9 months ago

    The US probably runs a huge number of TOR nodes, and can therefore do correlation analysis* to unmask TOR users. I’m not an expert, so don’t take this statement at face value, but that’s my understanding. Also keep in mind that if your threat model includes the NSA or similar agencies, you are probably overly paranoid or else you are fucked.

    *edit to add: this is called a “Sybil” attack. Look it up in relation to TOR. Again, this doesn’t mean that TOR isn’t perfectly secure for most threat models, but neither is it impervious.

    • Possibly linux@lemmy.zipOP
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      9 months ago

      Do you have evidence of this? Because without evidence you are just spreading misinformation

      • electric_nan@lemmy.ml
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        9 months ago

        How would I have specific evidence that US intelligence (who created TOR, btw) runs a large number (majority?) of exit nodes? I happen to think it is quite likely, but if you read my comment carefully, you can see that I did not present a statement of fact. It’s not ‘misinformation’ but I would understand if you wanted to call it FUD.

    • delirious_owl@discuss.online
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      They do run lots of nodes. And thank god too, the more the better it is for us all.

      The ability for them to use those nodes to track Tor users is laughingly fleeting, if you’re running an up-to-date version of TAILS and not doing something stupid like checking your firstname.lastname@gmail.com at the same time as you’re uploading docs to SecureDrpp