Quote from: IForgotMyFuckingPassword on October 04, 2013, 06:53 pmQuote from: bouclelan on October 04, 2013, 03:41 pmhttp://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymityPossible solution to setting up a unnoticed tor> Get the program on thumb drive from an internet cafe etcInstall on a hidden virtual machine.Most of it says that they can identify TOR traffic, not individual users, with some notable exceptions. And that's never been a big secret. Wouldn't surprise me if the NSA was running exit relays to spy on traffic.To be honest, the part about the vulnerability of TBB is very old news/ (like 1-2 months old). It's believed that that's how they found Freedom Hostings servers. It attacks older versions of Firefox (TBB uses FF 17 ESR). The malware they use phones home with the OS version and real IP of the user. There's information about it on the torproject site.TOR never promised anyone complete anonymity. Torproject has always stated that there is still a risk of being unmasked if you're careless.When you say careless, how do you mean.Like when one would do business without using encryption or that one may use some site which is registered to their real name while other dark sites are open??Just any elaboration on your post would teach me a slight bit more in keeping anonymous on here. Peace out,Evoc