Analysis of information sources in references of the Wikipedia article "ทอร์ (เครือข่ายนิรนาม)" in Thai language version.
anonymization solutions protect only partially against target selection that may lead to efficient surveillance... do not hide the volume information necessary to do target selection
so secure that even the world's most sophisticated electronic spies haven't figured out how to crack it
anonymization solutions protect only partially against target selection that may lead to efficient surveillance... do not hide the volume information necessary to do target selection
We will never be able to de-anonymize all Tor users all the time", but "with manual analysis we can de-anonymize a very small fraction of Tor users
If you are trying to use some external application with Tor, step zero should be to reread the set of warnings for ways you can screw up. Step one should be to try to use a SOCKS proxy rather than an HTTP proxy. Typically Tor listens for SOCKS connections on port 9050. Tor Browser listens on port 9150.
Most people use Tor Browser, which includes everything you need to browse the web safely using Tor. Using other browsers is dangerous and not recommended. There are plenty of other programs you can use with Tor, but we haven't researched the application-level anonymity issues on all of them well enough to be able to recommend a safe configuration.
In short, using any browser besides Tor Browser with Tor is a really bad idea. Our efforts to work with the Chrome team to add missing APIs were unsuccessful, unfortunately. Currently, it is impossible to use other browsers and get the same level of protections as when using Tor Browser.
Tor (like all current practical low-latency anonymity designs) fails when the attacker can see both ends of the communications channel
anonymization solutions protect only partially against target selection that may lead to efficient surveillance... do not hide the volume information necessary to do target selection
This is something we want to keep for ourselves. The way we do this, we can’t share with the whole world, because we want to do it again and again and again.
a sophisticated privacy tool