Follow us on Twitter!
You cannot teach a man anything; you can only help him find it within himself. - Galileo
Tuesday, April 28, 2015
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Members Online
Total Online: 19
Guests Online: 17
TeamSpeak Online : 5 Members Online: 2

Registered Members: 88100
Newest Member: simrat
Latest Articles
Our sponsor needs your help!

One of our sponsors needs your help,
Go check out their video and Don't forget to vote !

~ Thanks for your help
View Thread

HellBound Hackers | Computer General | Networking


RE: TOR a few questions and about redirecting.


Your avatar

Joined: 01.01.70
Posted on 21-02-08 14:54
If you didn't know this about Tor yet, while nobody might know where it's coming from, they can still read the data from the exit nodes, meaning all the data you send via the Tor network. There was a hacker named Dan Egerstad who took advantage of this flaw, and was able to intercept government and embassy e-mails, which were sent over the Tor network, but unfortunately did not use SSL or some sort of encryption to make their e-mails unreadable to others. Tor is useless for you if you're sending sensitive data without protecting the content, but if you want to send data and don't care who reads it and you just don't want someone to know exactly where it came from, then yes, it's fine.

I don't know if it's a fact Tor keeps logs or not, but if you're truly concerned about someone tracing you, you can use a combination of different public proxy servers that many people use and chain them together so it's much harder to match the times in the logs and track you.