1201
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 05:14 pm »In like 2004 to maybe 2007 when TOR was incredibly slow, I would modify the config file and have TOR go through specific IPs that I had selected from the list. Ones with more bandiwdth and I just felt in my gut were safer lol. It helped with the speed a lot. I connected to private drug marketplace boards like that for years with no problems. Before I had modified it, I would time out and have to change my identity all the time. My memory is awful but I would assume that I wasn't going through an internet connection that didn't belong to me. I really had no idea that I was compromising my security back then
Yeah, if your entry guard operator was malicious, he could notice 'this guy only goes through very high bandwidth nodes', or 'only nodes that share these properties', 'let me spin up a few exit nodes that meet those requirements and pwn him'.
One of the more common biases that I've seen is people don't want to use nodes in their own country, but again, if your entry guard operator is looking for suspicious people, that certainly makes you look suspicious. Someone looking for "red tape" protection is probably worried about LE.
It would be ok if every Tor client behaved that way, but when only a small subset of users are doing it, they stick out of the crowd.
It's interesting how studying anonymity theory improves your thinking skills -- at least it did mine -- because it forces you to think logically about a problem whose solutions are often unintuitive. Lots of people intuitively do things that they think make them safer, but actually harm their anonymity.
I'm sure you also remember when TOR was ridiculously slow astor.
Oh yeah. People who complain about how slow Tor is have no idea how painfully slow it used to be.