I tried (https://news.ycombinator.com/item?id=5843524) to do this before but it flopped.
I get that the government funds Tor; which doesn't really matter to me. The government also makes guns but I can still shoot a government official with it, if it came to that. What I want to know is whether or not, if I am using Tor correctly, can I be identified.
By correctly I mean:
- Only use Tor from bootable live, generic distro.
- Never use plugins
- Never use any identifying information
- Always use PGP for sending any personally identifiable information
- Never access any of my 'real' identities stuff.. like logging into my reddit account or gmail or something that I would do on the 'clearnet'.
If I, hyopthetically speaking, were going to engage in an illegal activity, such as clicking a hypothetical felony button on a hypothetical Tor hidden service; and I did it from my home network which I pay for with a direct deposit out of my bank account; from a technical and likely reality situation (regarding who controls Tor nodes), what are the situations that would lead to me being able to be convicted of said crime.
Further, what if I add a VPN, and which VPN do I need to add? I do get that a VPN is theoretically adding a layer of security, but it appears I have to trust the VPN itself; which is less than ideal, cus I may get unlucky and pick a honey pot.
It seems, in light of recent revelations, that some discussion surrounding this would be interesting and/or beneficial to many people.
The publicly available tools for making yourself anonymous and free from surveillance are woefully ineffective when faced with a nationstate adversary. We don’t even know how flawed our mental model is, let alone what our counter-surveillance actions actually achieve. As an example, the Tor network has only 3000 nodes, of which 1000 are exit nodes. Over a 24hr time period a connection will use approximately 10% of those exit nodes (under the default settings). If I were a gambling man, I’d wager money that there are at least 100 malicious Tor exit nodes doing passive monitoring. A nation state could double the number of Tor exit nodes for less than the cost of a smart bomb. A nation state can compromise enough ISPs to have monitoring capability over the majority of Tor entrance and exit nodes.
Other solutions are just as fragile, if not more so.
Basically, all I am trying to say is that the surveillance capability of the adversary (if you pick a nationstate for an adversary) exceeds the evasion capability of the existing public tools. And we don’t even know what we should be doing to evade their surveillance.