|
Of course, I am not accusing anyone here of illegal activities, but I heard the Tor network isn't as "safe" as some people claim it to be. And this is related to cp investigations. There have been Tor users busted for cp, and it had nothing to do with "bad" OpSec. It is because the Feds/police are capable of compromising the Tor network's security protocols. For example, about 1 year ago, over a dozen people in the USA were arrested for downloading/uploading cp from a Tor hidden service. The LEA caught them by running a large amount of Tor entry and exit nodes. And they monitored who was connecting to Tor (at specific time frames) and matched that to when cp files were being downloaded/uploaded to catch the offenders. Yeah, LEA are definitely capable of running a large percentage of Tor nodes as honeypots to catch people in CP investigations. They have more than enough resources to run over 1/2 of the Tor nodes as honeypots (if not even run EVERY node as a honeypot). Of course, some cybercriminals are now using this special app/software called Whonix to mask their ip address. Whonix is a special app that hides your Tor usage behind an extra VPN, to disguise the fact you are using Tor. Whonix uses Tor + an extra VPN behind Tor, to hide your Tor usage from the government. Then again, even if you are using Whonix, you can still be de-anonymized by writing style/analysis and other means. |