Is TOR Still Anonymous? and How Were People Caught Using TOR?

preview_player
Показать описание
PIA Internet Access Affiliates Link
Parrot Security Linux Anon Surf Mode Using TOR

The Tor Project

Darknet Diaries Operation Bayonet

DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught

Adrian Crenshaws Site

Connecting With Us
---------------------------------------------------

Lawrence Systems Shirts and Swag
---------------------------------------------------

AFFILIATES & REFERRAL LINKS
---------------------------------------------------
Amazon Affiliate Store

UniFi Affiliate Link

All Of Our Affiliates that help us out and can get you discounts!

Gear we use on Kit

Use OfferCode LTSERVICES to get 5% off your order at

Digital Ocean Offer Code

HostiFi UniFi Cloud Hosting Service

Protect you privacy with a VPN from Private Internet Access

Patreon
Рекомендации по теме
Комментарии
Автор

You can have as many locks on your front doors as you want, but the moment you forget to lock them is the moment someone can take advantage of.

TILR
Автор

So basically, you're only as secure as your patience allows you to be.

Ejohns
Автор

So in short, TOR is plenty secure as long as your not stupid.

holyravioli
Автор

this video is in everyone's watch history so you're already compromised

Yoshid
Автор

"I cite my sources."
Subbed. Too few people do.

liondovegm
Автор

The downfall usually comes as soon as one cuts corners on OPSEC...and thus it is as with most vulnerabilities in cyber security: the user is likely the weakest link, not the system.

-----REDACTED-----
Автор

Moral of the story: use Tor, don’t do illlegal shit on Tor

ThouguohT
Автор

I wish IT companies were this cool and knowledgeable in my country, these videos are on a different level education-wise

uiopuiop
Автор

I stopped watching to eat chilli and you randomly said my first name at 2:52 and I got paranoid

adrianzolla
Автор

+1 for Darknet Diaries, great podcast. Casefile ep 76 also did an incredible breakdown of Silk Road which heavily ties into tor.

boro
Автор

Donating directly to the tor project is great and all but if you really want to help the Tor network, the best way is to run a Relay/Bridge/Exit Node to add more servers to the Tor network, I've been running an exit node for a few months or so

AwesomeNickGaming
Автор

TOR is one of those things that I enthusiastically cheer for, yet will not use personally.

Why? Well, I approach it using torrent etiquette. I only feel right using it if I'm providing as much or more bandwidth to other users as I'm consuming. That means running a TOR node. Knowing the kinds of traffic some users turn to TOR to hide, I don't need that coming back to my IP. Sure, plausible deniability, but I'll leave it to others to be the brave social justice warriors and present that case in court. I don't need that in my life.

Again, I wholeheartedly endorse the project, their pursuit of privacy, and the people that provide the nodes.

sethwilliamson
Автор

I need help.
I'm having trouble logging in using Tor. I put the info in but it just
keeps saying, log in. Does anyone know how to fix that? Does anyone know
if there is another browser out there like Tor?

trikkerman
Автор

moi il me mes se message ? """ Tor Browser is already running, but is not responding. The old Tor Browser process must be closed to open a new window. """" ?? pourquoi

SSGGo_Pro
Автор

i personally drive 20 miles to an open wifi set up an aws instance running kali linux than i spin up a 2 vms through that instance whonix gateway and whonix workstation and after all that i brows cute cat videos.

franciscruz
Автор

Thank you, I'm pretty new to this.

theflowerhead
Автор

I'm just still confused ..how do I simply make my device n network private?

INFERNO-bthz
Автор

I just installed it. I use it to exceed my free download limit and converting limits of ebooks. I hope the government doesn't find me, lol.

godhateseveryonewhodoesntr
Автор

but how do the nodes know if they never knode the other nodes?

radicaledwards
Автор

One key point with Tor that I didn't hear in this video is the fact that whoever controls the exit node(3rd hop, this is where your encrypted traffic hits the internet) is the one in control. Whoever has control over an exit node can abuse this to monitor traffic, among other things, just be careful, TOR is great, but its not 100% secure if you don't know what you're doing.

thenew