Silk Road forums
Discussion => Security => Topic started by: annunaki on May 05, 2012, 06:17 pm
-
If the police are watching your ip what does tor look like to them and can they hack into your connection
ty
-
Anybody on your wireless network can view the data you send through it if it isn't encrypted/secure, with the right software.
Not sure about tor.
-
Tor traffic looks like Tor traffic. It is fully encrypted and unreadable to them. They only can do timing attacks, such as watching time when your Tor node sends data and in same time the message appears in place they are already watching.
If You suspect that you are watched, encrypt your hard drive with TrueCrypt and chooze strong password. If they are looking at you, they will get a visit for sure.
-
Can you please explain an unexperienced like me, what is happening if LE visits you and check your computer..
What could they find? Having Tor installed is allowed, having some Encryption programs installed is allowed.. Having Bitcoins isn't a crime.
So what can they find ?
-
Can you please explain an unexperienced like me, what is happening if LE visits you and check your computer..
What could they find? Having Tor installed is allowed, having some Encryption programs installed is allowed.. Having Bitcoins isn't a crime.
So what can they find ?
The thing is, if they're "visiting" you, it's because of something they already know. So they're looking for evidence to corroborate whatever it is that caused them to pay you a visit in the first place...
-
your ISP has full records of every site you've been to, all your dns requests, every search you've ever done on google....
unless you used tor to look up this site all that info is available to them.
tor bridge also helps conceal tor traffic a bit but China already found a way to follow bridge users. they don't know what they're doing as tor is encrypted but they can tell they're using it. break into wireless lol
-
learn how to use wireshark
it will let you see all kinds of fun stuff coming out of your computer's network adapters
-
Oke..
So what's better then, format our HDD completely with DBan or something or to have some really good Truecrypt encryption?
-
Can you please explain an unexperienced like me, what is happening if LE visits you and check your computer..
Exact details depends from your location, but your computer will be taken away and examined by data recovery expert. Also all CD's, mobile phones, USB flash drives, memory cards will be taken.What could they find?
All activities with those programs. Bitcoin client keeps debug log by default. Software store portions of all sorts of data in swap file. You can't be sure for that. And if the cops don't find they are looking for, they can plant the evidence themselves if the drive is not encrypted with TrueCrypt. This strongly depends from location and circumstances.tor bridge also helps conceal tor traffic a bit but China already found a way to follow bridge users. they don't know what they're doing as tor is encrypted but they can tell they're using it. break into wireless lol
Tor nodes accepts incoming SSL requests, so if your computer responds to SSL request, you are blocked by great firewall.format our HDD completely with DBan or something or to have some really good Truecrypt encryption?
Better encrypt hard drive with TrueCrypt because you can't use computer that is wiped clean of any data and OS with DBAN. Ot use DBAN to clean the drive and then do clean OS install and encrypt it with TrueCrypt as soon as possible.