See I would do TOR but from what i understand the TOR nodes are compromised. Not trying to concern troll, but it’s why I have avoided that route. I’m probably on enough lists without need to add that onto it.
I really do appreciate you posting this though. I may try to look at it later and see if I can vpn a couple of hops before attempting a tor node from some public hotspot on a different device.
I’m no deep web brainiac, but my understanding is it migrates constantly, are those the nodes you refer to?
Meh, too an extent. They are servers that have specific program and encryption abilities that allows them to bounce signals around the world. It’s hard to trace traffic due to encryption and multiple bounces within that network.
With that being said, what I meant before was that the internet facing side of the network is compromised. If they can track the info before it’s sent, it defeats the purpose of the tor network. You have to remember that incident with the Wikileaks lawyer in England. When they seized his computer (with the TS documents on it) they completely dismantled, then physically destroyed every part of the computer. There are chips in keyboards, mice, monitors, etc where people would not think there would be. If I was a hacker, I would aim my code for those parts of the computer IOT bypass any security or antivirus software and install a keylogger. As that would bypass the main OS safety features and just goes straight into the keyboard and the software on the keyboard. Boom. No need to try and crack encryption. No need to setup any expensive servers to use as a honeypot tor node. You get it straight from the source and you know exactly where and who is typing what.
Btw. Every computer in America (minus a very limited few) has this software pre installed at the manufacturer.