Anonymous ID: 454b65 July 21, 2018, 7:21 p.m. No.2236368   🗄️.is 🔗kun

>>2236160

While the TOR browser may provide some anonymity, it is only as trustworthy as the "relay networks."

 

They claim:

a ""free"", worldwide, "volunteer" overlay network consisting of more than "seven thousand" relays

 

If you understand how BGP protocol works and how the DNS name servers are architected and how major carriers share co-located points-of-presence you would not feel so reassured.

 

Since about 1% or less of the population understands these basic facts (public info to too complicated for mere mortals), your next best bet is to consider the TOR description

 

world -wide

free

7,000 sites (or multiple devices at fewer sites)

 

It takes equipment, bandwidth and high-priced expertise to manage this, somebody is willing to "volunteer" all that infrastructure and expense to give it away for free and with a free browser.

 

No apparent financial benefit but a tangible cost.

 

Who provides these 7,000 nodes for free and who has the expertise to manage that part?

 

Honeypot? - Look it up if you don't know what is is.

 

Think about phishing - why do people voluntarily

click those links?

 

Answer: trust (who do you trust to secure your communications)

 

My contention is not that it is worthless, and likely useful to keep out the amateur hacker-wannabees, Traceroute wizards,etc. but am infinitely convinced it would not be difficult for a large number of organizations, that already have some access to the Internet infrastructure

 

Any 3-letter agencies come to mind?

Any service providers?

Anonymous ID: 454b65 July 21, 2018, 7:35 p.m. No.2236498   🗄️.is 🔗kun

>>2236369

That might be true WITHIN Syria, but impossible beyond their borders. I wouldn't count intra-country would be private since it is so easy to intercept and reroute invisible. An intercept and re-route would be trivial unless you own/control the cables. Wireless is trickier but not foolproof.

 

End-to-end encryption can be effective, but who controls the encryption programs and routines within your device?

 

Note: Israeli company by-passed encryption of Apple cell phone of San Bernadino shooter. Apple had a hissy fit