Separate names with a comma.
Discussion in 'News / Open Lines / Conspiracy' started by Charleh, Apr 11, 2018.
Tor has a few weaknesses that have become a little better known. But if you use it properly, keep your nose clean and don’t do illegal stuff, there’s no reason for the most part that someone will go out of their way to try to compromise your connection to the onion router.
as long as you don't use a credit card with your name on it you will be safe. purchasing a vanilla card from Walmart is probably the safest online shopping method because if you do stumble onto something you shouldn't you won't be easily traced because many malicious site owners set up keyloggers that fish for credit card info, names etc at the exit node of the TOR browser.
Because of the deep web where you can buy guns, yellow cake plutonium and drugs steal identities...etc these keyloggers are set up by the cartels to track you right to your home address. the safest way to use it is NEVER use anything that is attached to who you really are.
also if you do plan on using TOR please watch all videos of its vulnerability before you do decide to use it. when a website asks you to install something like flash player because TOR does not use it your operating system will automatically switch off of TOR to install whatever tools needed to show the full page, that is when the keyloggers try and gather as much info on you as possible this also includes cookies most sites demand you have cookies turned on especially places like Facebook Twitter and most social media
Be very careful before using this.
There’s also the possibility of a deep packet search on someone. If there is absolutely no data about the original browser at the exit node, if there’s a search warrant handy the authorities can look at the times you made an inquiry (every time you click a link or type in an address) and just try to match those inquiry times with the request times made on another site. It takes a lot of guess work but it’s doable if they really want to find you.