M
M
MaklaySPb2020-02-19 13:11:54
Anonymity
MaklaySPb, 2020-02-19 13:11:54

Is TOR anonymous?

Immediately I apologize for the amateurish question. I just want to know the opinion of experts, which I myself am not.
The issue is the anonymity of TOR.
Is it true that if I leave some requests on the website of departments or send emails using TOR, then it is impossible or almost impossible to establish my identity? Taking into account the fact that neither the CIA nor the Pentagon will do this, but perhaps the KGB.
Isn't this all fake?

Answer the question

In order to leave comments, you need to log in

7 answer(s)
R
Ronald McDonald, 2020-02-19
@MaklaySPb

It is impossible to give a definite answer to the question.
Tru-paranoid does not believe even carrier pigeons.
For liberal comments on Yahoo, his security is enough.

S
Sergey Ryzhkin, 2020-02-19
@Franciz

No, not anonymous.
Search the net for a bunch of videos on how TOR breaks down (it’s enough to be the owner of the node) and how quickly people are calculated in it.

C
CityCat4, 2020-02-19
@CityCat4

Is TOR anonymous?

No.
If I use TOR to leave some appeals on the website of departments or send emails, is it impossible or almost impossible to establish my identity?

Maybe. And depending on what kind of appeals and emails they will be, there will be a speed with which you will be put with your nose into the asphalt (it is quite possible that this is really true)
neither the CIA nor the Pentagon will do this, but perhaps the KGB.

The Pentagon is a building of the US Department of Defense, it cannot do anything - it is a building :) But the rest can and probably will :)

S
Stalker_RED, 2020-02-19
@Stalker_RED

call a familiar major and asks him to identify the sender as best he can.
Ayishnik Dutch.
Is there anything else that will be done in this direction? What are the chances?

You are starting from the assumption that IP is the only parameter that can be tracked.
In fact, this is far from the case, and in addition to ip, a lot of other information can be collected about your system. Monitor size, installed fonts, sound settings, and more ( partial list ).
And then you will go to the conditional VKontakte from the same computer, for example, and it will be possible to compare the parameters and calculate you.
If it’s interesting, on Habré there is a publication about evercookie, browser fingerprinting, whonix and tails, you can read what it is and how it works, dispel some of the illusions.
Well, if your comment is not a couple of words, then you can even try to figure out the author by the style of the text. And the bigger your "digital footprint" on the internet, the better it works.

K
Karpion, 2020-02-20
@Karpion

TOR provides pretty decent anonymity at its layer of the OSI model. However, it is necessary to observe certain "rules of hygiene" in order not to inherit at other levels.
A lot depends on whether the enemy (special service) looking for you can find an approach to the owner of the site / server where you applied.
Read articles about TOR on Habré, it is well described there. And in general, study "methods of detective work on the Internet."

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question