Is Tor Really Anonymous and Secure?

Status
Not open for further replies.

Kent

Level 10
Thread author
Verified
Well-known
Nov 4, 2013
468
Source------- http://www.howtogeek.com/142380/htg-explains-is-tor-really-anonymous-and-secure/

ome people believe Tor is a completely anonymous, private, and secure way to access the Internet without anyone being able to monitor your browsing and trace it back to you – but is it? It’s not quite that simple.

Tor isn’t the perfect anonymity and privacy solution. It has several important limitations and risks, which you should be aware of if you’re going to use it.


Exit Nodes Can Be Sniffed
In summary, when you use Tor, your Internet traffic is routed through Tor’s network and goes through several randomly selected relays before exiting the Tor network. Tor is designed so that it is theoretically impossible to know which computer actually requested the traffic. Your computer may have initiated the connection or it may just be acting as a relay, relaying that encrypted traffic to another Tor node.

However, most Tor traffic must eventually emerge from the Tor network. For example, let’s say you are connecting to Google through Tor – your traffic is passed through several Tor relays, but it must eventually emerge from the Tor network and connect to Google’s servers. The last Tor node, where your traffic leaves the Tor network and enters the open Internet, can be monitored. This node where traffic exits the Tor network is known as an “exit node” or “exit relay.”

In the below diagram, the red arrow represents the unencrypted traffic between the exit node and “Bob,” a computer on the Internet.

htw2.png


f you’re accessing an encrypted (HTTPS) website such as your Gmail account, this is okay – although the exit node can see that you’re connecting to Gmail. if you’re accessing an unencrypted website, the exit node can potentially monitor your Internet activity, keeping track of the web pages you visit, searches you perform, and messages you send.

People must consent to run exit nodes, as running exit nodes puts them at more of a legal risk than just running a relay node that passes traffic. It’s likely that governments run some exit nodes and monitor the traffic that leaves them, using what they learn to investigate criminals or, in repressive countries, punish political activists.

This isn’t just a theoretical risk. In 2007, a security researcher intercepted passwords and email messages for a hundred email accounts by running a Tor exit node. The users in question made the mistake of not using encryption on their email system, believing that Tor would somehow protect them with its internal encryption. But that’s not how Tor works.

Lesson: When using Tor, be sure to use encrypted (HTTPS) websites for anything sensitive. Bear in mind that your traffic could be monitored – not just by governments, but by malicious people looking for private data.

JavaScript, Plug-ins, and Other Applications Can Leak Your IP
The Tor browser bundle, which we covered when we explained how to use Tor, comes preconfigured with secure settings. JavaScript is disabled, plug-ins can’t run, and the browser will warn you if you attempt to download a file and open it on another application.

JavaScript isn’t normally a security risk, but if you’re trying to hide your IP, you don’t want to use JavaScript. Your browser’s JavaScript engine, plug-ins like Adobe Flash, and external applications like Adobe Reader or even a video player could all potentially “leak” your real IP address to a website that tries to acquire it.

The Tor browser bundle avoids all these problems with its default settings, but you could potentially disable these protections and use JavaScript or plug-ins in the Tor browser. Don’t do this if you’re not serious about anonymity – and if you aren’t serious about anonymity, you shouldn’t be using Tor in the first place.

This isn’t just a theoretical risk, either. In 2011, a group of researchers acquired the IP addressesof 10,000 people who were using BitTorrent clients through Tor. Like many other types of applications, BitTorrent clients are insecure and capable of exposing your real IP address.

Lesson: Leave the Tor browser’s secure settings in place. Don’t try to use Tor with another browser – stick with the Tor browser bundle, which has been preconfigured with the ideal settings. You shouldn’t use other applications with the Tor network.

tor-browser-external-content-warning.png



Running an Exit Node Puts You At Risk
If you’re a big believer in online anonymity, you may be motivated to donate your bandwidth by running a Tor relay. This shouldn’t be a legal problem — a Tor relay just passes encrypted traffic back and forth inside the Tor network. Tor achieves anonymity through relays run by volunteers.

However, you should think twice before running an exit relay, which is a place where Tor traffic comes out of the anonymous network and connects to the open Internet. If criminals use Tor for illegal things and the traffic comes out of your exit relay, that traffic will be traceable to your IP address and you may get a knock on your door and your computer equipment confiscated. A man in Austria was raided and charged with distributing child pornography for running a Tor exit node. Running a Tor exit node allows other people to do bad things that can be traced back to you, just like operating an open Wi-Fi network – but it’s much, much, much more likely to actually get you into trouble. The consequences may not be a criminal penalty, however. You may just face a lawsuit for downloading copyrighted content or action under the Copyright Alert System in the USA.

comcast-dmca-letter.jpg


The risks involved with running Tor exit nodes actually tie back into the first point. Because running a Tor exit node is so risky, few people do it. Governments could get away with running exit nodes, however – and it’s likely many do.

Lesson: Never run a Tor exit node — seriously.

The Tor project has recommendations for running an exit node if you really want to. Their recommendations include running an exit node on a dedicated IP address in a commercial facility and using a Tor-friendly ISP. Don’t try this at home! (Most people shouldn’t even try this at work.)

Tor isn’t a magic solution that grants you anonymity. It achieves anonymity by cleverly passing encrypted traffic through a network, but that traffic has to emerge somewhere – which is a problem for both Tor’s users and exit node operators. In addition, the software that runs on our computers wasn’t designed to hide our IP addresses, which results in risks when doing anything beyond viewing plain HTML pages in the Tor browser.
 

scot

Level 9
Verified
Dec 5, 2014
405
Even if you use bridges, the packets tell the service provider that you are using tor.
The major issue with tor is the exit nodes. If you access your email a/c using tor, you are just making it easy to identify yourself clearly.
If you let the traffic pass through you, you will only make it more difficult to identify who is using tor.
I think everything has some Good & Bad coming along with it, you can't point out only the Good for some and Bad for some.
I can conclude by saying that tor has helped lot of people in countries where free speech is a crime. Thankyou.
 

Vipersd

Level 6
Verified
Dec 14, 2014
285
Basically US NAVY developed basics in Tor browser for their personal use in the first place. So it is not unusual for US government to sponsor it.
 
  • Like
Reactions: nissimezra

rienna

Level 2
Verified
Mar 28, 2015
64
Honestly, this is one of the many reasons why if you use Tor you NEED to run a VPN with it.
Preferably one without logs or minimum logs that cannot be used to identify you.
This way even if they manage to sniff your traffic through an exit node, all they'll see is another layer of encrypted data, but encrypted data they can't trick into unencrypting.

Not to mention I recommend not using NoScript alone. It does not block trackers.
Something like bluhell (actual name), or Ghostery on the other-hand does.
 
  • Like
Reactions: Kent and nissimezra

scot

Level 9
Verified
Dec 5, 2014
405
Honestly, this is one of the many reasons why if you use Tor you NEED to run a VPN with it.
Preferably one without logs or minimum logs that cannot be used to identify you.
This way even if they manage to sniff your traffic through an exit node, all they'll see is another layer of encrypted data, but encrypted data they can't trick into unencrypting.

Not to mention I recommend not using NoScript alone. It does not block trackers.
Something like bluhell (actual name), or Ghostery on the other-hand does.
Never use Tor and VPN together. I can only say that it will land you in lot of trouble(Legally). Even if they sniff your traffic through the exit node, they cannot trace back to you,it is impossible to track the route.
 
  • Like
Reactions: Kent and nissimezra

rienna

Level 2
Verified
Mar 28, 2015
64
Never use Tor and VPN together. I can only say that it will land you in lot of trouble(Legally). Even if they sniff your traffic through the exit node, they cannot trace back to you,it is impossible to track the route.

I'm sorry but you obviously have no idea what you're talking about.
Using Tor + VPN does not and has never landed anybody in legal trouble. Maybe in some far of land that I've never heard of.
But otherwise no it will not and does not land you in legal trouble. In-fact it does the opposite it AVOIDS it.
Also it is possible to trace back. The FBI has been doing it time and time again. Why do you think so many darknet sites keep going down?
Do you think they willingly turned themselves in out of the blue? I highly doubt it. Even your ISP has the power to sniff tor traffic now.
The days of Tor being secure on it's own are over.
 
  • Like
Reactions: nissimezra

scot

Level 9
Verified
Dec 5, 2014
405
Your interpretation of the facts are totally baseless. Please read about Bridges, all your doubts will be answered.
The culprit in this regard is CISCO Systems, who specialize in supply of equipment to identify tor traffic. The only question is the tor has any back door, other than that it is absolutely safe to use tor. Tor with VPN is not safe to use, it is up to us to take the decision on that. Good luck.
 

rienna

Level 2
Verified
Mar 28, 2015
64
Sorry but again no Tor with a VPN is perfectly safe. I don't know what you're smoking Brah.
 

Vipersd

Level 6
Verified
Dec 14, 2014
285
Using Tor with VPN can not have legal consequences if you do not do anything illegal that could trigger police or federal investigation. Probably in today's light of government surveillance you would be person of interest for using such combination but crosschecking would remove you from any in depth investigation.

In any case I don't see why would using Tor + VPN be any problem.
 

Atlas147

Level 30
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 28, 2014
1,990
I agree use a VPN with TOR network for maximum privacy. From what I understand TOR encrypts your traffic straight from the TOR browser, therefore anything information passing through your VPN provider would just be encrypted traffic. Using a VPN would provide another layer of encryption for that traffic by tunneling it to a VPN server (Double the protection). Your VPN would not be able to see the information, TOR exit nodes would not be able to track the source of the traffic, win win.

If in any case that the traffic was tracked back to the VPN provider, they would also be unable to identify the source because nowadays most VPN providers don't keep logs or keep very minimal logs that would essentially be useless in tracking who was in what server at that point of time. At the worst case scenario even if they are able to get the names of who are using the VPN servers at that point of time, there are at least 40 people using that same server, how would anyone identify that the traffic came from you?

There are a lot more safeguards in place than most people notice, if you want to be sure that your VPN provider protects your identity you should check out torrentfreak's best VPN providers of 2015 where they show the policies of all the VPNs and tell you which are the best.
 

adema

New Member
Aug 7, 2016
1
The best way to remain 100% annonimous online is to:
a) trick a dumb friend to borrow you his laptop while drunk- so he won't remember anything later :));
b) make your own ISP company and deliver fake data when FBI comes knoking at you door-good luck with that.;
c) fake identity when creating the account (possible in some 3rd world countries)

So, nothing is 100% secure without some "social engineering"
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top