View Single Post
Kort oppsummert: Sålenge du ikke gjør grove forbrytelser (terrorisme osv) er det tilnærmet lik null sjanse for at noen myndigheter vil bruke tid på å spore tor-trafikken tilbake til deg HVIS omstendighetene tillater det, ref tidligere liste:

Although generally safe, Tor has known vulnerabilities
Tor vulnerabilities include the following:

The final Tor exit node could be exposed.

The exit node is the last node to handle the Tor data before it reaches its final destination. The data on the exit node is completely decrypted. Unless the traffic is via an HTTPS connection, the information is exposed to the operator running the exit node. (See below.)

Tor can be defeated through confirmation attacks.

Powerful entities like the NSA as well as unfriendly foreign governments can compromise Tor user anonymity. Using powerful and relentless surveillance techniques, Tor attacks correlate user transmissions between entry and exit nodes to determine use patterns, for example.

Tor nodes can be compromised along the path to the final exit.

Tor’s safety is based on the assumption that most of the Tor volunteers are honest and do not spy on the traffic. Tor forensic investigators, however, have found exit nodes that actively interfere with users’ traffic to perform man-in-the-middle attacks.

A study by Guevara Noubir at Northeastern University also highlights some sinister and sophisticated infiltration techniques by Tor hackers. User detection ranged from automated probing to dangerous SQL injection into databases to steal system login data.

Windows digital files are vulnerable.

Downloading and opening Windows DRM copyrighted digital files can compromise the identity of Tor Browser users. Setting up a so-called deanonymization attack requires resources typically within the means of government and law enforcement agencies. The user opens the DRM file and downloads the code to decloak Tor Browser user location and identification.
Vis hele sitatet...
Med andre ord, som kjøper av syre på darknet er det høyst usannsynlig at noen vil bruke ressurser på å identifisere din tor trafikk, og det ikke alle scenarioer dette engang lar seg gjøre.

Det finnes en haug andre ting som også kan gjøre bruk av Tor browser unsafe, gjerne via day-1 sårbarheter. Husk også at dersom en side har blitt overtatt av en tredjepart (hackere, myndigheter osv..) har de muligheter til å ikke bare legge inn sårbarheter, men også logge all eventuell informasjon du frivillig gir, i tillegg til informasjonen nettleseren din innehar som kan være unikt (kombinasjoner av keyboard-oppsett, installerte fonter, tidssone, screen res etc.)



Det enkleste svaret å gi er at du burde være mye mer redd for opplysningene du frivillig deler enn internett-trafikken som går fra din mobil til en random web server i nord kypros eller sveits.