Is TOR Still Anonymous? and How Were People Caught Using TOR?
512,673
Published 2019-08-08
www.privateinternetaccess.com/pages/buy-vpn/LRNSYS
Parrot Security Linux Anon Surf Mode Using TOR
• Parrot Security Linux Anon Surf Mode ...
The Tor Project
www.torproject.org/
Darknet Diaries Operation Bayonet
darknetdiaries.com/episode/24/
DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught
• DEF CON 22 - Adrian Crenshaw- Droppin...
www.defcon.org/images/defcon-22/dc-22-presentation…
Adrian Crenshaws Site
www.irongeek.com/
Connecting With Us
---------------------------------------------------
+ Hire Us For A Project: lawrencesystems.com/hire-us/
+ Tom Twitter 🐦 twitter.com/TomLawrenceTech
+ Our Web Site www.lawrencesystems.com/
+ Our Forums forums.lawrencesystems.com/
+ Instagram www.instagram.com/lawrencesystems/
+ Facebook www.facebook.com/Lawrencesystems/
+ GitHub github.com/lawrencesystems/
+ Discord discord.gg/ZwTz3Mh
Lawrence Systems Shirts and Swag
---------------------------------------------------
►👕 lawrence.video/swag
AFFILIATES & REFERRAL LINKS
---------------------------------------------------
Amazon Affiliate Store
🛒 www.amazon.com/shop/lawrencesystemspcpickup
UniFi Affiliate Link
🛒 store.ui.com/?a_aid=LTS
All Of Our Affiliates that help us out and can get you discounts!
🛒 lawrencesystems.com/partners-we-love/
Gear we use on Kit
🛒 kit.co/lawrencesystems
Use OfferCode LTSERVICES to get 5% off your order at
🛒 lawrence.video/techsupplydirect
Digital Ocean Offer Code
🛒 m.do.co/c/85de8d181725
HostiFi UniFi Cloud Hosting Service
🛒 hostifi.net/?via=lawrencesystems
Protect you privacy with a VPN from Private Internet Access
🛒 www.privateinternetaccess.com/pages/buy-vpn/LRNSYS
Patreon
💰 www.patreon.com/lawrencesystems
All Comments (21)
-
You can have as many locks on your front doors as you want, but the moment you forget to lock them is the moment someone can take advantage of.
-
"I cite my sources." Subbed. Too few people do.
-
So basically, you're only as secure as your patience allows you to be.
-
I wish IT companies were this cool and knowledgeable in my country, these videos are on a different level education-wise
-
The downfall usually comes as soon as one cuts corners on OPSEC...and thus it is as with most vulnerabilities in cyber security: the user is likely the weakest link, not the system.
-
this video is in everyone's watch history so you're already compromised
-
I stopped watching to eat chilli and you randomly said my first name at 2:52 and I got paranoid
-
Donating directly to the tor project is great and all but if you really want to help the Tor network, the best way is to run a Relay/Bridge/Exit Node to add more servers to the Tor network, I've been running an exit node for a few months or so
-
+1 for Darknet Diaries, great podcast. Casefile ep 76 also did an incredible breakdown of Silk Road which heavily ties into tor.
-
So in short, TOR is plenty secure as long as your not stupid.
-
One key point with Tor that I didn't hear in this video is the fact that whoever controls the exit node(3rd hop,this is where your encrypted traffic hits the internet) is the one in control. Whoever has control over an exit node can abuse this to monitor traffic, among other things, just be careful, TOR is great, but its not 100% secure if you don't know what you're doing.
-
Thank you, I'm pretty new to this.
-
WOW you did deep research and your information is solid keep the hard work 🔥
-
Informative no waffle and very funny dude you insight and research is appreciated 🥰
-
Moral of the story: use Tor, don’t do illlegal shit on Tor
-
Computerphile also made awesome videos explaining Tor hidden services and how Onion Routing works. really worth watching!
-
I have tape over my phone camera rn
-
It’s hard to anonymize behavior. You almost need another application with an entropy source that takes you input and randomizes your behavior, securely, on the other side :).
-
Another great video. I’m a long time fan of TOR and the more credible privacy oriented VPNs. And you’re absolutely correct the devil is in the details. Those who 100% follow best practices are likely to remain anonymous while those who are lazy and take a 95% anonymity is good enough approach probably shouldn’t even bother as they’re likely leaving an obvious trail nearly anyone could follow despite their half assed effort at privacy. Just like it takes just one unwanted pic on social media to ruin a politicians life it also takes just one lapse in anonymity to undo years of trying to be anonymous.
-
My problem with Tor is that it doesn't seem to do much fingerprint spoofing, other than resolution... so, when you log in to the same website, your fingerprint will be pretty much the same, even though you changed your identity. Now, if the website is not very popular, they might easily figure out that it's the same person that has all those accounts...