Silk Road forums
Discussion => Newbie discussion => Topic started by: freemaxb53 on August 22, 2013, 07:26 pm
-
So I carelessly decided to login to personal accounts while on the Tor network (and having SR open). Now say by chance I was investigated, can I be found out by matching the ip I logged into SR with other websites that may have my personal information in it?
Or does SR not keep any trace of IP addresses?
This is a legitimate concern and I would only like advice from people with knowledge on the subject.
Thanks.
-
SR does not know your IP address, so there is nothing for SR to keep.
The personal accounts you logged into whilst on Tor, if they cared to, could record the fact that you are an occasional Tor user. Which is also a fact that is recorded by your ISP anyway.
In short, stop worrying. But in future, don't use Tor to access any websites that require you to log in, if they are websites who know who you are and you regularly visit them when browsing the web normally.
-
well my question pertains to the anonymous ip given to you when connected to the tor network. does it not stay the same during your entire session? if you logged into a personal account and sr with this same ip wont both of them be logged, and with further investigation wouldn't the ip be able to be traced to both sites?
i am a lil paranoid about this. i also see the function of ip logging in these posts (not that i am that concerned because i did log out and log back into tor after realizing my mistakes)
-
well this would all assume that the personal account websites actually give the information out. it would be very rare case for someone to suspect that a certain person must have been using SR. But if the SR website was at all breached all the ips' could be matched with other websites logged in with the same address. this is why i am a little paranoid.
-
well my question pertains to the anonymous ip given to you when connected to the tor network. does it not stay the same during your entire session? if you logged into a personal account and sr with this same ip wont both of them be logged, and with further investigation wouldn't the ip be able to be traced to both sites?
SR is a hidden service. It exists inside the Tor network, not outside of it. So you enter into the Tor network at a certain place, you're bounced around a bit, then you hit SR. SR doesn't know where you entered the Tor network, nor where you've been bounced around before you got to SR.
By contrast, using Tor to access Facebook is like this. You enter the Tor network at a certain place, you're bounced around a bit, then you exit it somewhere else, then you connect to Facebook. Facebook knows that you've been using the Tor network because it can see that you connected from a Tor exit point.
i am a lil paranoid about this. i also see the function of ip logging in these posts (not that i am that concerned because i did log out and log back into tor after realizing my mistakes)
Look at the IP address that's logged by your own posts. It's 127.0.0.1, which is the localhost. In other words, you're not being logged and neither are the rest of us.
-
WHY SHOULD THIS MATTER IF YOUR USING TOR AND ACTUALLY KNOW HOW TO WORK IT
-
well my question pertains to the anonymous ip given to you when connected to the tor network. does it not stay the same during your entire session? if you logged into a personal account and sr with this same ip wont both of them be logged, and with further investigation wouldn't the ip be able to be traced to both sites?
SR is a hidden service. It exists inside the Tor network, not outside of it. So you enter into the Tor network at a certain place, you're bounced around a bit, then you hit SR. SR doesn't know where you entered the Tor network, nor where you've been bounced around before you got to SR.
By contrast, using Tor to access Facebook is like this. You enter the Tor network at a certain place, you're bounced around a bit, then you exit it somewhere else, then you connect to Facebook. Facebook knows that you've been using the Tor network because it can see that you connected from a Tor exit point.
i am a lil paranoid about this. i also see the function of ip logging in these posts (not that i am that concerned because i did log out and log back into tor after realizing my mistakes)
Look at the IP address that's logged by your own posts. It's 127.0.0.1, which is the localhost. In other words, you're not being logged and neither are the rest of us.
I appreciate the response, but I am still not understanding it completely. If SR is a hidden service then it cannot be matched by an IP matcher (if such a thing exists) and not even inside the TOR network services?
Also the localhost IP I would assume just shows 127.0.0.1 for the one who is logged into it. But for moderators wouldn't it show the actual anonymous IP?
(I don't mean to hassle you, I actually appreciate your help)
-
You only get an "anonymous IP" as you put it if you exit the Tor network. Your "anonymous IP" is the IP of the Tor exit point.
Forget SR and hidden services for a second, and consider my Facebook example again.
You start your Tor-enabled browser. It finds you a Tor entry point. You type www.facebook.com into the address bar. What happens now is that your request to visit facebook enters into the Tor network through the entry point, and then it passes through multiple points, each one encrypted. Each one of these points passes your request onto the next point, but they only know the previous point you came from, and the next one they send you on to. Eventually you leave the Tor network at an exit point. This exit point has an IP address, and it connects you to Facebook. Facebook then sends your data back to this exit point IP address, and it gets passed back through the Tor network, back to your original entry point, where it leaves the Tor network and finally makes its way back to you.
In this example, Facebook sees your exit point IP address (this is what I think you're referring to as your 'anonymous IP address'), but can't trace your path any further back than that. Your problem of course is that you logged in to Facebook. So it knows who you are, and it knows that you are an occasional Tor user.
Now with a hidden service, you never leave the Tor network. You enter it in the same way as in my Facebook example. You are passed through multiple points. Each of these points can only see the previous one, and the next one in the journey. But the last point is SR, and you're still inside. SR can only see the last point in your journey, and it passes your data back to it. Your data then makes its way back to you.
So SR does not see the same 'anonymous IP' that Facebook sees, because there isn't an exit point when you're visiting SR.
-
Watch this. Watch it in your normal browser.
And yes, you can keep your Tor browser open and on this site whilst you're watching it.
http://www.technologyreview.com/video/413186/how-tor-works/
-
Ah.
So when visiting a public website via the tor network your IP is saved, but is the data cleared when exiting the TOR browser?
And when visiting a private website via the tor network your IP is never saved, but is the data cleared when exiting the TOR browser?
-
Mate, stop worrying about what you did recently. You'll be fine.
-
Simple answer its a bad idea dont do it again
Many people use tor lots have the same exit nodes ip addy still a bad idea
-
ok i am not paranoid anymore, but my question is: does it even matter?
if anyone can use the tor network, what's the worse that could happen?
-
DOES NOT MATTER!
There are many people using the same exit node at a time. No chance they will find out if the ip was in both cases used by the same person or if different tor users were just browsing different sites(since all info is heavily encrypted with tor).
Tor is technically unbeatable at this Point (well windows in combination with old firefox portable version was not, see google: verizon fbi darknet ).
-
The Freedom Hosting debacle is a lovely joy. Nothing like knowing the police state in which I live is creating malware to infect my computer based on an exploit in order to entrap me into a crime. I would love to see how this stands up.
-
there will be possibly thousands of users all on the same exit point showing the same ip address as you are at the same time, so don't worry about it.
-
Silk Road is a hidden service. You do not exit the TOR network when connecting to a hidden service. The IP address that shows up is 127.0.0.1 (localhost).