No indeed, if you go surfing to remote sites by sector and then goes on to say “hey I am, important person,” or any real shielded browser or other uses and thus cookies or other things leak makes it all is quite simple for someone back to track by sector. For example, by exit nodes to have in your control.
But you can see it from the wrong position. Internal traffic, so traffic to .onion sites is much more difficult to trace back as you advance things take into consideration.
@velenski if it was really that easy to convert 80% of the traffic than it should TOR team would like you where you’ve been found leaking.
No comments:
Post a Comment