This is one of those moments when I should say "I told you so"...well, I told you so.
To anyone who still believes that Tor is safe for anything is a complete asshat. It is being monitored and recorded for your protection.
dont blame tor. blame the site admin and whiteknights.
Anyway I saved most of the good ones.
This is now a pm thread, in memory of...
Tor is obviously being run through some log server somewhere along the way recording as people pass through. It would be the only way they could catch people so fast. 400 sites? That wasn't one operator getting sloppy
oh look, another misinformed idiot.
It was infiltrated by a fed who they unknowingly hired, idiot.
If your theory is true and they can shut down any hidden services on Tor, why is Agora and countless other darknet markets operating just fine at this very moment?
Not to mention endless cp imageboards
True, and a good example of how a proper set up can defend against governmental attacks. Look at piratebay. They have sites on all different protocols including clearnet and darkwebs and still sailing free.
Believe it or not this bitch was number one for two years. lol
That and the admins didn't sign in via TOR and a variety of other issues.
The problem is that despite every safeguard, people make mistakes, and several prosecutors have a hardon for "Deep Web", as do many LEAs due to it being high profile and good for their career.
If anon really wanted them off their ass, they would fight a heavy PR campaign against them. Instead of hacking some company and dumping their customers credit cards as a "punishment", they'd target the prosecutors/judges/FBI and dig up dirt on them. Dig through their emails and release any wrongdoing. Are they squeaky clean boyscouts? Bet their family or close friends aren't.
You threaten them/go after them physically, or do something that makes them be the victim, they will come at you even harder. But if you promise that the lives of those who come after you are as transparent as glass, they will suddenly find far less dangerous people to go after. Like drug cartels.
Just don't ever refer to your real life email or name or any other information that could point to where or who you are and you will stay anonymous.
Encrypt when possible, but always assume you are being monitored. The whole point isn't to avoid detection. It's simply to stay anonymous.
i concur. its fuckin beaurocracy and posturing. pm will be back.
Keep in mind, doxbin had something like 5 .onions. I'm sure in their "we took 5 million dollars worth of crank off the streets" cop math, it was probably closer to ~100, many of which were hosted on a single server.
facebook is on tor now. for whatever reason. a site designed for identification purposes sets up shop on a slow connection made for anonymity. I can't think of anything more retarded.
Nope. But it is suspicious. And now every time you post to this thread, i'm sure moot shares the posting addresses of everyone, along with all posts (likely only the pictures if the thread is flagged for size consideration) with the FBI and other law enforcement agencies.. So unless you're using TOR to connect or some other VPN service (which is unlikely as most of them are banned from posting on here) the IP you are using is archived and added into watch lists. So every time you connect out using that connection, its possible they can be watching - including watching your tor activity, vpn, etc.
And these fuckos are getting really good at data correlation. And they don't need warrants anymore, and they don't need cause to wiretap.
Some animal rights hippy dippy group broke into a mink farm and released them into the wild. Instead of criminal tresspass/breaking and entering, the prosecutor is trying to charge them under terrorism provisions. Eventually many crimes will be tried as terrorism, or at least they will try, until legal precedent has been set in either way. Suddenly, no trials, no habuus corpus, no rights.
Nice looking future.
Those are two examples I gave. You can do it a variety of ways - proxies and open wifi and cracked wifi and breaking into externally facing machines and setting up port relays and setting up a server on a hosting company with fake information and spoofing and yadda yadda. The list goes on. I chose VPNs and TOR for brevity, as well as it is most likely what BTC monkeys would use almost exclusively.
But sure, retardation.
No, they were not examples, you assumed the user was using a VPN or tor. But they don't have to be. (Untrue statement => whatever ) is always valid, but also useless.
Fear not /b/ros. Thats all they want is for you to be scared like a sheep.