On Tue, Jul 2, 2024 at 5:27 AM jeremy ardley wrote:
>
>
> On 2/7/24 16:24, Lee wrote:
>
> And if I don't want to leave Internet footprints - or if I just want
> to give the finger to whoever is watching, I'll use the tor browser.
>
>
> That is probably the worst thing you can do. On my last check *most* Tor exit 
> points are operated by intelligence or police agencies.

OK.. I'll bite.  How do you know most Tor exit points are operated by
intelligence or police agencies?

I mean, it sounds reasonable, but how do you *know*?

> Going about your business just using a regular ISP makes it unlikely anyone 
> will pay attention to you unless you frequent disreputable sites.
>
> Using Tor will automatically put you on a watch list.

Yeah.  I've heard that too.  But using tor - or any encryption, is
still legal, so what I'm doing doesn't even rise to the level of civil
disobedience.
So if they're going to put me on a list, they're going to put me on a
list.  I've been using tor since however long ago when it came bundled
with privoxy, so I doubt that me not using tor now is going to make a
difference.

> Your identity can easily be found because your ip address at the exit point 
> will be recorded and matched with ISP records.

Indeed.  The TOR documentation used to be up-front about tor not being
proof against a global adversary, so I doubt the NSA needs to bother
my ISP asking for records.
I was just poking around on torproject.org (which has been rumored to
be enough to get one on a watch list) and I don't see any strong
warnings about using tor :(  Or even much of anything that would
discourage one from using TOR.
Oh well.. I guess they need lots of cannon fodder to provide covering
traffic for .. who?

Regards,
Lee

Reply via email to