Is TOR Still Anonymous? and How Were People Caught Using TOR?

512,673
0
Published 2019-08-08
PIA Internet Access Affiliates Link
www.privateinternetaccess.com/pages/buy-vpn/LRNSYS
Parrot Security Linux Anon Surf Mode Using TOR
   • Parrot Security Linux Anon Surf Mode ...  

The Tor Project
www.torproject.org/

Darknet Diaries Operation Bayonet
darknetdiaries.com/episode/24/

DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught
   • DEF CON 22 - Adrian Crenshaw- Droppin...  

www.defcon.org/images/defcon-22/dc-22-presentation…

Adrian Crenshaws Site
www.irongeek.com/


Connecting With Us
---------------------------------------------------
+ Hire Us For A Project: lawrencesystems.com/hire-us/
+ Tom Twitter 🐦 twitter.com/TomLawrenceTech
+ Our Web Site www.lawrencesystems.com/
+ Our Forums forums.lawrencesystems.com/
+ Instagram www.instagram.com/lawrencesystems/
+ Facebook www.facebook.com/Lawrencesystems/
+ GitHub github.com/lawrencesystems/
+ Discord discord.gg/ZwTz3Mh

Lawrence Systems Shirts and Swag
---------------------------------------------------
►👕 lawrence.video/swag


AFFILIATES & REFERRAL LINKS
---------------------------------------------------
Amazon Affiliate Store
🛒 www.amazon.com/shop/lawrencesystemspcpickup

UniFi Affiliate Link
🛒 store.ui.com/?a_aid=LTS

All Of Our Affiliates that help us out and can get you discounts!
🛒 lawrencesystems.com/partners-we-love/

Gear we use on Kit
🛒 kit.co/lawrencesystems

Use OfferCode LTSERVICES to get 5% off your order at
🛒 lawrence.video/techsupplydirect

Digital Ocean Offer Code
🛒 m.do.co/c/85de8d181725

HostiFi UniFi Cloud Hosting Service
🛒 hostifi.net/?via=lawrencesystems

Protect you privacy with a VPN from Private Internet Access
🛒 www.privateinternetaccess.com/pages/buy-vpn/LRNSYS

Patreon
💰 www.patreon.com/lawrencesystems

All Comments (21)
  • @TILR
    You can have as many locks on your front doors as you want, but the moment you forget to lock them is the moment someone can take advantage of.
  • @liondovegm
    "I cite my sources." Subbed. Too few people do.
  • @Ejohns1004
    So basically, you're only as secure as your patience allows you to be.
  • @uiopuiop3472
    I wish IT companies were this cool and knowledgeable in my country, these videos are on a different level education-wise
  • The downfall usually comes as soon as one cuts corners on OPSEC...and thus it is as with most vulnerabilities in cyber security: the user is likely the weakest link, not the system.
  • @Yoshi4d
    this video is in everyone's watch history so you're already compromised
  • @adrianzolla9737
    I stopped watching to eat chilli and you randomly said my first name at 2:52 and I got paranoid
  • Donating directly to the tor project is great and all but if you really want to help the Tor network, the best way is to run a Relay/Bridge/Exit Node to add more servers to the Tor network, I've been running an exit node for a few months or so
  • @boro057
    +1 for Darknet Diaries, great podcast. Casefile ep 76 also did an incredible breakdown of Silk Road which heavily ties into tor.
  • @holyravioli5795
    So in short, TOR is plenty secure as long as your not stupid.
  • @thenew77
    One key point with Tor that I didn't hear in this video is the fact that whoever controls the exit node(3rd hop,this is where your encrypted traffic hits the internet) is the one in control. Whoever has control over an exit node can abuse this to monitor traffic, among other things, just be careful, TOR is great, but its not 100% secure if you don't know what you're doing.
  • @youssefwolfx
    WOW you did deep research and your information is solid keep the hard work 🔥
  • Informative no waffle and very funny dude you insight and research is appreciated 🥰
  • @ThouguohT
    Moral of the story: use Tor, don’t do illlegal shit on Tor
  • Computerphile also made awesome videos explaining Tor hidden services and how Onion Routing works. really worth watching!
  • @Replicant2600
    It’s hard to anonymize behavior. You almost need another application with an entropy source that takes you input and randomizes your behavior, securely, on the other side :).
  • Another great video. I’m a long time fan of TOR and the more credible privacy oriented VPNs. And you’re absolutely correct the devil is in the details. Those who 100% follow best practices are likely to remain anonymous while those who are lazy and take a 95% anonymity is good enough approach probably shouldn’t even bother as they’re likely leaving an obvious trail nearly anyone could follow despite their half assed effort at privacy. Just like it takes just one unwanted pic on social media to ruin a politicians life it also takes just one lapse in anonymity to undo years of trying to be anonymous.
  • @MrNaporowski
    My problem with Tor is that it doesn't seem to do much fingerprint spoofing, other than resolution... so, when you log in to the same website, your fingerprint will be pretty much the same, even though you changed your identity. Now, if the website is not very popular, they might easily figure out that it's the same person that has all those accounts...