This Is The Way Intelligence Is Used to Hack Tor Users And Follow Them?

in #tor7 years ago

In the beginning, some of you will tell me that there is no such thing as hiding 100% of the Internet. So do not get into a debate about it because some of you will say "no" Tor can not be tracked. It is a human leap in the world of computer science. Equipped with all the protection features that can not be hacked

Now I will tell you the scenarios that occurred with Tor browser, where people used this browser in child sexual abuse and forged passports, bank cards and so on, but were revealed by the FBI, Inter Services Intelligence, National Security Agency and other intelligence agencies in The world in general, which followed them and brought them and tried and paid fines and imprisonment for decades without even using the existing secret projects, such as spy projects on the Axet Nod and so on

  • how they do that ?

On the whole, there is a scenario that occurred almost a day ago, a person who used blackmail through a tor browser where he stole people's photos or forced them to send videos and then took these clips and posted them on social networking sites ,The FBI was mailing these sites and telling them they gave us that person's IP ,And social networking sites as this violates the policy conditions they give their IP to the FBI, and then they will know that the IP of one of the devices within the network tor .

The FBI involved in this topic what would you do? The FBI went to the court and took the permission that it would use the hacking methods to know where the person was. The government, since this person violates the privacy of others, gives them the authority to use hacking methods to determine the real location of that person 

The FBI then falsified a video and injected malicious software and sent the video to this target person on the basis that it was a video from one of the parties that the person blackmail him, and then the person downloaded the video on his computer and with malicious software

What malware did you do ? It sent a call from outside the Tor browser through a normal connection to the FBI servers, and in this way actually the FBI knew the original company or IP of the person who extorted the people, which is now exposed, they knew the type of the criminal's device and its state and its real location ,GameOver.

This news has been on  motherboard about a month ago ,In addition to more than 8000 breakthroughs by the FBI to track people and have been brought and signed through the courts, not only in America but in more than 120 countries

______________________________

If you take advantage of this post, do not hesitate to follow and upvote

Sort:  

Very informative post. Thank you for clearing that up for us.

There is no anonymity on the internet...the governments have ways around everything.

There is no absolute protection, neither we nor the government, it's like a race

Very true,,,and in that race, I always bet on the hackers...they one step ahead.

Of course, for the general masses, they are always one step behind.

What you say is true, hackers have more passion and more psychological motives, but government employees have the financial means and deal with it only as a job not more

This is a great talk about how the NSA tracks you, very interesting! By Bill Binney who was Technical Director at the NSA.

@a-a-lifemix got you a $1.62 @minnowbooster upgoat, nice!
@a-a-lifemix got you a $1.62 @minnowbooster upgoat, nice! (Image: pixabay.com)


Want a boost? Click here to read more!

Nice post
Done
Follow

This post recieved an upvote from minnowpond. If you would like to recieve upvotes from minnowpond on all your posts, simply FOLLOW @minnowpond

It seems like the vulnrabilities in services like tor lie with the end user. Based on posts like these it seems like the tor protocal is still very secure in cases of only accessing tor hidden service's.

nice poste

OMG!!! My elder brother and i used this browser thinking we would not be seen on the dark web. Thanks for sharing.