A mysterious threat actor is running hundreds of malicious Tor relays
therecord.media
external-link
Since at least 2017, a mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network in what a security researcher has described as an attempt to deanonymize Tor users.

The original post

Well Tor has its limits but given the resourcefulness of this attacker, they’re probably someone who has/wants access to a lot of traffic even if it does not go through the tor network :)

@Zerush@lemmy.ml
creator
link
fedilink
-3
edit-2
3Y

If you use TOR in the OpenWeb, go to browserleaks and you’ll see, that it isn’t more private as any othher privacy focused browser with some extensions, only slower. The only proposit of TOR is the capability to access the .onion, but even this don’t protect you, when you use TOR there without a VPN.

I don’t understand your point. TBB is specifically hardened against leaks (that’s why WebRTC is entirely disabled for example) and fingerprinting. What kind of leaks exactly are you suggesting?

If you mean that using any random browser (eg. Chrome/Firefox) over Tor is insecure, we agree. That’s why we have Tor Browser in the first place, and that’s literally one of the first things taught in privacy workshops.

@Zerush@lemmy.ml
creator
link
fedilink
03Y

Have you tested it in Browserleaks? There you will see, how private is the browser. Apart it don’t serve me if the browser blocks trackers and fingerprints, when the Browser itself do it, also Firefox, which send data to Alphabet.Inc, NEST and Google.

Create a post
  • 0 users online
  • 1 user / day
  • 1 user / week
  • 2 users / month
  • 1 user / 6 months
  • 1 subscriber
  • 34 Posts
  • 21 Comments
  • Modlog