Malicious TOR Exit Nodes Spying on Users and Stealing Bitcoin From Them.

  Рет қаралды 45,720

Mental Outlaw

Mental Outlaw

Күн бұрын

In this video I go over the malicious exit node hacking that has been taking place on the TOR network over the past year. Someone has been attempting to do SSL downgrades and man in the middle attacks on users accessing bitcoin mixing services so that they can steal the crypto currency from mixer customers.
/ tracking-one-year-of-m...
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
Dash
Xh9PXPEy5RoLJgFDGYCDjrbXdjshMaYerz
Zcash
t1aWtU5SBpxuUWBSwDKy4gTkT2T1ZwtFvrr
Chainlink
0x0f7f21D267d2C9dbae17fd8c20012eFEA3678F14
Bitcoin Cash
qz2st00dtu9e79zrq5wshsgaxsjw299n7c69th8ryp
Etherum Classic
0xeA641e59913960f578ad39A6B4d02051A5556BfC
USD Coin
0x0B045f743A693b225630862a3464B52fefE79FdB
Subscribe to my KZbin channel goo.gl/9U10Wz
and be sure to click that notification bell so you know when new videos are released.

Пікірлер: 221
@pacifico4999
@pacifico4999 3 жыл бұрын
Can't trust TOR exit nodes. Learned that from Mr. Robot.
@mk1808
@mk1808 3 жыл бұрын
Don’t sweat it. Scenes inaccurate and just serves as entertainment
@theeyenzier8190
@theeyenzier8190 3 жыл бұрын
@@mk1808 no theres a lot of realism in mr.robot and its probably the closest to the real deal
@XxjeffersonDkidxX
@XxjeffersonDkidxX 3 жыл бұрын
Oh yeah... Damn, so this is a old problem.
@technophobian2962
@technophobian2962 3 жыл бұрын
@@XxjeffersonDkidxX this was a problem since Tor was created. That's why you don't log into personal accounts on Tor - you are identified immediately when you do it so Tor is useless. Tor with bad opsec is completely useless.
@alan_core
@alan_core 3 жыл бұрын
@@theeyenzier8190 big facts
@Wheagg
@Wheagg 3 жыл бұрын
I've always wondered who exactly has the balls to run an exit node. Well, it turns out, if you really need money....
@auklin7079
@auklin7079 2 жыл бұрын
or a reason that is friendly with the local governments, like, say, monitoring the traffic.
@Wheagg
@Wheagg 2 жыл бұрын
@@auklin7079 yes, yes, but it's designed too well for anyone to monitor all the traffic.
@milire2668
@milire2668 2 жыл бұрын
@@Wheagg yes, yes. very design. such traffic. so doge. wow
@Wheagg
@Wheagg 2 жыл бұрын
@@milire2668 many exaggerated. Not doge. Much wow.
@bryteklabs1855
@bryteklabs1855 3 жыл бұрын
Bruh what is your upload schedule??? Everyday??? This is amazing! Keep up the great work!
@Cookiekeks
@Cookiekeks 3 жыл бұрын
He uploads when ever he wants and what ever he wants I guess
@looweegee252
@looweegee252 3 жыл бұрын
What the fuck is an upload schedule lmao sounds strenuous and pointless
@sunburst8810
@sunburst8810 3 жыл бұрын
It's called queuing content. Where you make content in advance and release it over time. It's not hard bro. You can make a months worth of videos in a week
@Ultra289
@Ultra289 3 жыл бұрын
Since he barely needs to edit (he doesnt even use intros...) that can allow him to upload faster and more often
@BoanergesTWELF12
@BoanergesTWELF12 3 жыл бұрын
I'm surprised the YT overlords let me catch this video uploaded after 5 min
@toofle
@toofle 3 жыл бұрын
they need to keep u hooked at all cost
@BoanergesTWELF12
@BoanergesTWELF12 3 жыл бұрын
@@toofle guaranteed, they might also have a thing against Bitcoin lol
@gickygackers
@gickygackers 3 жыл бұрын
@@BoanergesTWELF12 i'm making money on bitcoin, but it's not a good thing. KZbin, if anything, should love bitcoin
@sanjay_swain
@sanjay_swain 3 жыл бұрын
@@gickygackers Well maybe Google just don't want to censor thing just like that? I mean I don't understand why would Google just shadow ban content creators for reason like "youtube love bitcoin".
@N.S.A.
@N.S.A. 3 жыл бұрын
We're not spooked. I mean, they're not spooked.
@tcroyce8128
@tcroyce8128 3 жыл бұрын
Found the glowie
@gotengsk9010
@gotengsk9010 3 жыл бұрын
​@@tcroyce8128 You can see them when you're driving
@anonimenkolbas1305
@anonimenkolbas1305 3 жыл бұрын
@@gotengsk9010 You just run them over.
@kishascape
@kishascape 7 ай бұрын
​@@gotengsk9010👾💥🚐
@lilythebluespheresfan2897
@lilythebluespheresfan2897 3 жыл бұрын
AAAHH I'M LEAKINGGGG
@BurgerKingHarkinian
@BurgerKingHarkinian 3 жыл бұрын
Turned on by Mental?
@korchevatel
@korchevatel 3 жыл бұрын
*gasp* All my porn preferences! Leaked to Chinese hackers!
@namelessguy933
@namelessguy933 2 жыл бұрын
Your OS information and ip address got leaked so gg.
@_VISION.
@_VISION. 2 жыл бұрын
@@namelessguy933 how is that possible?
@marconiandcheese7258
@marconiandcheese7258 3 жыл бұрын
I believe most nodes are run by governments.
@rjhornsby
@rjhornsby 3 жыл бұрын
I’m not sure blocking plain http in transit - anywhere other than at the client or server - is the best approach. Why would you use http traffic? No idea, but if I’m the network provider, that’s not my decision. It’s up to the two endpoints to negotiate. The client should take the responsibility for refusing to agree to protocol downgrades. What client these days starts https, and then replies to a server (mitm or other) “http is fine by me!”? If that’s happening, stop.
@camwha5904
@camwha5904 3 жыл бұрын
I’m kinda surprised people still use bitcoin mixers to be honest. I thought coinjoin replaced the need for a 3rd party to obfuscate coin history
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
Who even still accepts btc for illicit transactions anymore, id be willing to say only feds are still accepting it, monero is completley anonymous and the best medium of exchange for any illicit activity, service, or good. Xmr to the moon!
@camwha5904
@camwha5904 3 жыл бұрын
SquigglesMcJr Yeah I’m a Monero Man too. The crash the last couple days got me in the red tho. Guess it’s time to stack up some more.
@rajeshpandey2198
@rajeshpandey2198 3 жыл бұрын
@@squigglesmcjr199 well selling xmr en masse is VERY hard, dump large xmr on any exchange and it makes every alarm go off That's exactly why markets usually use bitcoin and it's pretty easy to sell
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
@@rajeshpandey2198 i have no intention of selling my monero.
@rajeshpandey2198
@rajeshpandey2198 3 жыл бұрын
@@squigglesmcjr199 market owners and big dealers do lol that's why bitcoin is still famous
@ejonesss
@ejonesss 3 жыл бұрын
1. if an isp does not allow exit nodes can you run the exit node over a vpn and would the isp know about the exit node activity. 2. can you be able to connect multiple tor circuits together by connecting an exit node to the next circuit's entry node and so on to furtherly anonymize you? 3. can they automate the detection of bad exit nodes by pinging them and see if the traffic stays encrypted and then checking the hash values of the packets?
@木原篤郎-b4m
@木原篤郎-b4m 3 жыл бұрын
About 2: I guess you can, but the whole reason why Tor uses 3 nodes is because 2 is too weak and going over 3 sacrifices too much usability for almost no gain.
@アカシア-w7b
@アカシア-w7b 3 жыл бұрын
Running an exit node over a VPN is kind of an asshole move to the VPN and its users, to be honest.
@ejonesss
@ejonesss 3 жыл бұрын
@@アカシア-w7b if you want to run an exit node and your isp sais no because of the inability to determine tor traffic from your own traffic then a vpn would help
@木原篤郎-b4m
@木原篤郎-b4m 3 жыл бұрын
@@ejonesssA tor relay requires that your IPv4 address is unchanged for at least 3 hours (static addresses are preferred). Assuming you can get that with your VPN, you would just be moving the issue. Now the VPN (and their users) won't like it because one of their IPs started getting blocked from some regular websites. And you also increase the path your packets travel, adding latency and minimizing bandwidth.
@ejonesss
@ejonesss 3 жыл бұрын
@User Name if your vpn is one with privacy in mind they should tell anyone including your isp.
@bigrabbit4253
@bigrabbit4253 3 жыл бұрын
If your traffic is flowing through someone's computer, like isp, proxy, vpn or a tor exist node, it's very possible to eavesdrop even https traffic by attacking initial tls handshake to intercept keys (I learnt this from quora) ISP is less likely to do this because once they caught up, they'll face a lots of legal troubles, but vpns, free proxies and tor exist nodes, they aren't trustworthy. If you really need the protection given by tls encryption and you are not directly connected to the internet via your trustworthy isp, use onion services. Green padlock may not safe as you think. Onion service technology allows us trust less safe communication.
@notuxnobux
@notuxnobux 3 жыл бұрын
>it's very possible to eavesdrop even https traffic by attacking initial tls handshake to intercept keys this is not possible because of certificate verification
@andreffrosa
@andreffrosa 3 жыл бұрын
@@notuxnobux yes, but there are valid fake certificates out there (corrupt CAs). I read about months ago
@electricitymachine6401
@electricitymachine6401 3 жыл бұрын
Interesting how bitcoin mixers on the clearnet are used so often. People clearly misplace their opsec. Great video as always!
@tfwmemedumpster
@tfwmemedumpster 3 жыл бұрын
Gee, if only someone created a coin with a built in mixer so people don't have to use third party solution. Oh wait they did. Gee maybe people should be using that if mixing is needed instead of relying on third party solutions. Also i'd like to see someone laudering bitcoins today with 40$ a pop transaction fees if you want it not to take months
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
I think there is such a thing, XMR anyone????
@mylife4631
@mylife4631 3 жыл бұрын
You the best thanks.
@disco.jellyfish
@disco.jellyfish 3 жыл бұрын
This is sad. Time to develop and introduce a mechanism, which makes it impossible for exit nodes to do so. And I actually dont know if I'd rather have a government or some criminal who doesnt know who exactly I am spy on me. Would be great if its neither of the two.
@piekay7285
@piekay7285 3 жыл бұрын
6:05 in the EU it shouldn’t, because you cannot be made responsible if you are only redirecting traffic for other people
@xCwieCHRISx
@xCwieCHRISx 2 жыл бұрын
you still part of an investigation. you shouldnt be guilty before a court but thats it....
@midimusicforever
@midimusicforever 2 жыл бұрын
Hey algorithm, this is good stuff.
@bleueknight
@bleueknight 3 жыл бұрын
I'd like to point out an issue with forcing HTTPS on tor, though, the main issue is that no CA is ever going to sign certificates for HTTPS tor sites, so what people end up having to do is self-sign, which leads to a similar warning about the site being insecure because literally anyone can make a self-signed certificate, on the other hand, getting a CA to sign an onion site defeats the entire point of a tor website, which is that the website's host is as anonymous as any other tor user. This is likely going to be the main issue, since all modern browsers warn against both http-only and self-signed https sites, and thus Tor Browser should be no different on that end. Which means idiots who use Tor Browser likely realized something like this and decided to default to ignoring the warnings rather than making sure the certificate fingerprints are always the same on whatever site you're visiting.
@interspect_
@interspect_ 3 жыл бұрын
gg
@Yetoob8lWuxUQnpAahSqEpYkyZ
@Yetoob8lWuxUQnpAahSqEpYkyZ 3 жыл бұрын
He isn't talking about onion sites, but tor exits to clearnet. You don't need certificates for onion sites. For regular sites anyone can get a certificate with Let's Encrypt, though there isn't an issue with stealing data (except for social engineering) unless there is an underlying flaw with the protocol. The issue here is that clearnet operators aren't doing enough to stop http downgrade attacks and people aren't doing enough to ensure their browser doesn't capitulate to such attacks. I agree with your end conclusion, but your reasoning for it is wrong.
@notuxnobux
@notuxnobux 3 жыл бұрын
Tor doesn't need certificates because the website names are the websites public key themselves. Certificates are only needed when you connect by ip or by (domain) name.
@eds7406
@eds7406 3 жыл бұрын
As two others have already said, there is no reason to use self-signed certificates for onion sites (or tor sites), it is already encrypted and authenticated, you know you are talking to the correct computer. There are also actually CAs that do onion sites, see facebook or duckduckgo's onion sites (signed by DigiCert as EV certificates), for normal people I think it costs $30 at Harica.
@xCwieCHRISx
@xCwieCHRISx 2 жыл бұрын
@@notuxnobux the risk is having the wrong onion adress...
@TheKeule33
@TheKeule33 3 жыл бұрын
Could you show a How-To on SSH over TOR and if there any risks are involved?
@komekko373
@komekko373 3 жыл бұрын
How secure is visiting Onions site with HTTPS How does my exit node see my internet as and how ISP see my internet as?
@subliminalcastillo2126
@subliminalcastillo2126 3 жыл бұрын
quick summary: 1. Depends 2. They decrypt it so they can read it 3. They can see you are using tor, but nothing other than that, as far as I know. I'm not exactly a tor expert by any means. I just know a tiny bit.
@w1z4rd9
@w1z4rd9 3 жыл бұрын
@@subliminalcastillo2126 You can't decrypt HTTPS lol. You can exploit via related-factors but not the logic of the HTTP"S"
@w1z4rd9
@w1z4rd9 3 жыл бұрын
You can use things like bridge on TOR so your ISP wouldn't know. It's famous for countries that block TOR and users get around with it especially if your ISP has Nation-level DPI.
@w1z4rd9
@w1z4rd9 3 жыл бұрын
@LazicStefan That's why I said related-factors. But the guy said "decrypt" which in cryptography is realistically impossible to crack the encryption.
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
SIMPLE, DONT USE BTC ON TOR, USE XMR.
@Cookiekeks
@Cookiekeks 3 жыл бұрын
Who even runs the exit nodes if most Internet provides dont allow it?
@stephenw2045
@stephenw2045 2 жыл бұрын
Glowies.
@beansbeans96
@beansbeans96 3 жыл бұрын
Well then i suppose it's a good thing i use, MONERO!
@billgatest7563
@billgatest7563 3 жыл бұрын
i do understand that some parts of the world absolutely need tor for secure news, activism, emergencies... Some parts of the world probably would be safer avoiding it. I have never had so many unintended side effects only trying to follow the practice of using it. I in my ignorance of networking systems & security and followed hype of sending all my traffic through... So much monitoring, taking over mobile devices, and general annoyance came from it. If i was in a country in dire straits, i get it. If all im trying to do is read the arch wiki, i have found that a vpn & security gateway firewall set up well is much better at not attracting unwanted attention from tor users.
@Graut-c9m
@Graut-c9m 3 жыл бұрын
2:35 If you aren't downloading executables or enabling JavaScript, how does that occur?
@williamsrobert996
@williamsrobert996 3 жыл бұрын
WhatsApp him on
@Graut-c9m
@Graut-c9m 3 жыл бұрын
@@williamsrobert996 You sounding hella sus, g. Cut the scammy spammy spam.
@salt6873
@salt6873 3 жыл бұрын
If they can control the data going in and out then they can inject malicious code or programs
@paulvorderegger1522
@paulvorderegger1522 2 жыл бұрын
@@salt6873 They cant really control the data because they dont see the contents that either party sends, but of course they could send back a redirect to a bad site (on purpose)
@KnowhowtoCI
@KnowhowtoCI Жыл бұрын
Hi can you tell me what happens if I connected to an exit note in clear web with chrome browser, which was flagged by virus total as malicious malware and brute force? I reinstalled my phone my browser data was cleared is that enough already ?
@stacklysm
@stacklysm 3 жыл бұрын
Never heard of BTC laundering...
@d21852
@d21852 3 жыл бұрын
If the exit nodes are capable of doing a man in the middle attack then that must mean they can do a dns spoofing homograph attack, in other words tor isn't actually safe unless you add a VPN on top of tor or custom dns servers
@BurgerKingHarkinian
@BurgerKingHarkinian 3 жыл бұрын
Wouldn't it be blatantly obvious if they were dns spoofing on a TLS encrypted connection?
@_VISION.
@_VISION. 2 жыл бұрын
@@BurgerKingHarkinian I'm not familiar with this technical knowledge so excuse my ignorance. But how is a dns spoof obvious or evident?
@BurgerKingHarkinian
@BurgerKingHarkinian 2 жыл бұрын
@@_VISION. because the dns record would point at some server that is not controlled by the actual owner of the site, that server would be unable to provide a valid TLS certificate for that site and would either have to provide an untrusted, self-signed certificate or a certificate for a different domain. The browser would immediately detect that the certificate is coming from an untrusted certificate authority or that the certificate doesn't match the domain that the user was trying to access and show the user a fat red warning message which they would have to ignore and press "advanced options" and "accept exception" or something like that. Which you should never ever have to do except in very rare cases like when you are trying to access your router on port 443 or something like that. So just NEVER click through these warnings and you will be a-ok. If you ever do see such a warning (which I never have), create a new circuit instead and reload.
@_VISION.
@_VISION. 2 жыл бұрын
@@BurgerKingHarkinian Oh okay I have seen this before on the main net with some websites. Does this also happen with .onion sites on tor?
@BurgerKingHarkinian
@BurgerKingHarkinian 2 жыл бұрын
@@_VISION. oh great, my detailed answer just vanished! Fml... In short: yes, I've seen that on a few small sites too but that is an admin fuckup and should not happen. And no, hijacking onion sites like that is not that trivial and I'd even go as far as to say it's not actually possible at all. Search for "tor hidden services" for more details.
@lolvivo8783
@lolvivo8783 3 жыл бұрын
How do they kno if node is compromised
@TasmanianTigerGrrr
@TasmanianTigerGrrr 9 ай бұрын
If the exit nodes are known IPs would not the hack controlled nodes been traceable?
@LuBaLu
@LuBaLu 3 жыл бұрын
Thank you
@josephreagan9545
@josephreagan9545 3 жыл бұрын
As a total noob to Tor and internet security, I always wondered if you could use a VPN and Tor at the same time for more security.
@josephreagan9545
@josephreagan9545 3 жыл бұрын
@@plaane things like ProtonVPN or those other commercial ones I think it is a "virtual private network" Like I said I am a total noob so I know nothing.
@Penderdrill
@Penderdrill 3 жыл бұрын
@plaane LOOOL hypixel blitz player
@_VISION.
@_VISION. 2 жыл бұрын
@@plaane what are non-commercial VPNs?
@Veneficus1996
@Veneficus1996 2 жыл бұрын
@@plaane Hey, could you explain what is non-commercial VPN?
@kev1n079
@kev1n079 3 жыл бұрын
Exit relay is unavoidable right? But, the question that remains in the air, how to keep hidden and safe in the exit relay? (using the device at home)
@voltovsky3856
@voltovsky3856 3 жыл бұрын
Reminds me kinda mr. robot scene(exit nodes and tor )
@AdolphusOfBlood
@AdolphusOfBlood 3 жыл бұрын
"bitcoin mixers" I suppose bitcoin tumblers got renamed at some point
@xCwieCHRISx
@xCwieCHRISx 2 жыл бұрын
i wonder when the first "bitcoin mixer" does a big exit scam.
@CyberAnalyzer
@CyberAnalyzer 3 жыл бұрын
Great video, thanks!
@williamsrobert996
@williamsrobert996 3 жыл бұрын
I'd also advise you look up to investing and making huge profit in Bitcoin with Paul Tudor Jones he's currently managing my crypto profitlio and making great return's
@williamsrobert996
@williamsrobert996 3 жыл бұрын
WhatsApp him on
@williamsrobert996
@williamsrobert996 3 жыл бұрын
+1/4/6/9/5/3/2/4/2/5/6
@du42bz
@du42bz 3 жыл бұрын
It's always fun to hear americans and others complain about their ISPs prohibiting access to specific Website or services or whatever, here in germany our ISPs dont care, they will let you do anything you want
@BurgerKingHarkinian
@BurgerKingHarkinian 3 жыл бұрын
Germany's internet is not as free as you claim it to be either. There have been cases of dns blocking as well. Ever heard of the new CUII for example?
@iskamag
@iskamag 2 жыл бұрын
Didn't germany make the network enforcement act?
@richmail
@richmail 3 жыл бұрын
EVERY. ONE. IS. GETTING. HACKED. WHY?
@RemotHuman
@RemotHuman 3 жыл бұрын
Is monero an alternative to bitcoin mixing?
@stackspace
@stackspace 3 жыл бұрын
No. It’s an alternative to Bitcoin. The reason why you might be making this mixup is because Monero is often cited as being more private than BTC because the technology encrypts your transaction and Monero amounts by default. To accomplish this with BTC, people used to try using tumblers, which I think is what you’re referring to
@lanpartylandlord6123
@lanpartylandlord6123 3 жыл бұрын
@@stackspace no what he means is u send btc to an exchange w no kyc info, swap to xmr, send xmr to another non kyc exchange, swap to btc and send to a new wallet
@lanpartylandlord6123
@lanpartylandlord6123 3 жыл бұрын
it’s untraceable because when u go to xmr and a new exchange it breaks the kyc chain
@egg5474
@egg5474 3 жыл бұрын
Zcash
@moretzsohn7701
@moretzsohn7701 3 жыл бұрын
yes.
@papiezguwniak
@papiezguwniak 3 жыл бұрын
I can't help but think you sound like vegan gains lol. Great videos though. Thanks.
@catherinegilbert7057
@catherinegilbert7057 2 жыл бұрын
I've never been on Tor but there is 100s of nodes on my network
@jhny0
@jhny0 3 жыл бұрын
Juicy content 🥵🥵🥵
@AntiWanted
@AntiWanted 3 жыл бұрын
Nice
@ladyViviaen
@ladyViviaen 3 жыл бұрын
even my phone can run tor using termux
@u_watch9497
@u_watch9497 Жыл бұрын
woah ! you could totally get an arduino !!
@tombouie
@tombouie 3 жыл бұрын
Thks I'm getting to get a laptop & when I'm traveling, I want to run Tails/TOR. ?Will any namebrand 11th Gen Intel Core i5-1135G7 laptop work-well with Tails/TOR?
@takipsizad
@takipsizad 3 жыл бұрын
İt should
@Vsimpro
@Vsimpro 3 жыл бұрын
Why would they not?
@tombouie
@tombouie 3 жыл бұрын
@@Vsimpro I thought I would simply ask someone with good empirical experience on the subject whether than rationalizing why or why not they work (I don't have the-time for that sort-of-thing).
@Vsimpro
@Vsimpro 3 жыл бұрын
@@tombouie nothing wrong in asking! I dont have first hand experience, but I'd imagine that since most distros work on most intel cpu's, Tails and tor will work just fine on that specific laptop. The reason why I asked "Why not" is to see if you had some knowledge of tails not working on some specific config, therefor wondering if it worked on that one. Ofc you can always try to google it aswell.
@ub3r
@ub3r 3 жыл бұрын
LETS GOOOOOO
@MelroyvandenBerg
@MelroyvandenBerg 3 жыл бұрын
Monero...?
@papagunit
@papagunit 3 жыл бұрын
Hard to purchase anonymously.
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
@@papagunit mine it??
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
@@papagunit you can still get it on Exodus wallet.
@papagunit
@papagunit 3 жыл бұрын
@@squigglesmcjr199 mining it is too difficult at this point
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
@@papagunit na i doubt it, your thinking in terms of profitability at current price, i dont care about current price when its going 500x over 5 years or less. Its a cpu mined algo anyway, i got lots of idle cpu's
@hellomate6079
@hellomate6079 3 жыл бұрын
Who else watch KZbin video on Tor?
@arzoo_singh
@arzoo_singh 2 жыл бұрын
The whole point is not making money but why are you using Tails or Tor ? This is where intelligence agency steps in
@censoredterminalautism4073
@censoredterminalautism4073 3 жыл бұрын
I don't trust Tor. Mostly because I don't trust anything at all.
@Kirt44
@Kirt44 Жыл бұрын
I had 2 bitcoin or something like that stolen this way😢
@giacomoflisi
@giacomoflisi 3 жыл бұрын
monkaW
@thatoneduck9279
@thatoneduck9279 3 жыл бұрын
Yos
@ashleypursell9702
@ashleypursell9702 2 жыл бұрын
whe mixing bitcoins for "totally legit purposes" fuck that was funny
@khakestari0138
@khakestari0138 3 жыл бұрын
Is it unsecure to use orbot over adguard on android??
@Wheagg
@Wheagg 3 жыл бұрын
I'd advise that, before you do that, you make sure things like the keyboard aren't keylogging you, and even then there's probably a million services in the background that don't respect privacy either. Since Orbot is official, the only other red flag is adguard. Check the privacy policy's data collected section for that.
@trik9464
@trik9464 3 жыл бұрын
Doesn't brave have httpseverywhere built in?
@eds7406
@eds7406 3 жыл бұрын
I don't think so. But Tor Browser does.
@realsushrey
@realsushrey 3 жыл бұрын
Yes.
@kevindudson2344
@kevindudson2344 3 жыл бұрын
Omg Sell Bitconfetti. Before it is actually turned into Bitconfetti.
@squigglesmcjr199
@squigglesmcjr199 3 жыл бұрын
What??
@orkhepaj
@orkhepaj 3 жыл бұрын
yup , all these vpn tor craps only good if you trust their network , you shouldnt :P
@Cookiekeks
@Cookiekeks 3 жыл бұрын
Could the government do the same but to track you?
@samuelhulme8347
@samuelhulme8347 3 жыл бұрын
Probably if there exit nodes are allowed on tor
@freedomisdead9638
@freedomisdead9638 3 жыл бұрын
Government is funding 80% of TOR foundation, think about that, 😂 TOR is a honeypot to catch criminals!
@Cookiekeks
@Cookiekeks 3 жыл бұрын
@@freedomisdead9638 Only because you fund something, doesn't mean you control it.
@freedomisdead9638
@freedomisdead9638 3 жыл бұрын
@@Cookiekeks It s like saying fire doesn t mean hot! The whole purpose of financing and funding is controlling! Man your answer is senseless!
@Cookiekeks
@Cookiekeks 3 жыл бұрын
@@freedomisdead9638 There are tons of security researches constantly trying to find ways to break the system, and you come along and say "they fund it so they must control itt!!!1". That's silly.
@killerbeast8023
@killerbeast8023 2 жыл бұрын
Tutorial
@vkn
@vkn 3 жыл бұрын
epic gamer
@kirya312
@kirya312 3 жыл бұрын
A russian hacker lol
@SrGuindaste
@SrGuindaste 3 жыл бұрын
So much white damn
@MrSilvo34
@MrSilvo34 3 жыл бұрын
Algo algo algorithm!
@tnick00001
@tnick00001 3 жыл бұрын
Who woulda guessed, lmao.
@cristianmihoc5043
@cristianmihoc5043 3 жыл бұрын
Brave is superior to tor browser, just because it is based on chromium and is more secure in that aspect. You can install addons yourself.
@eds7406
@eds7406 3 жыл бұрын
Tor Browser is superior to brave when it comes to anonymity.
@cristianmihoc5043
@cristianmihoc5043 3 жыл бұрын
@@eds7406 why?
@Penderdrill
@Penderdrill 3 жыл бұрын
1. you shouldn't install addons because they can be used to fingerprint you 2. brave lacks a lot of the privacy features (disabling javascript is one of the main ones) 3. chromium is awful tor is based off of mozilla's firefox which has a much much better reputation when it comes to privacy
@xCwieCHRISx
@xCwieCHRISx 2 жыл бұрын
@@Penderdrill 1. that would e a point for brave 2. you can disable javascript without addon 3. sheeps follow reputations. wolfs follow facts
@tato1271
@tato1271 2 жыл бұрын
-For anonymity = Tor browser. -For privacy (yes, it's not the same) = hardened firefox. -For security = brave.
@uiiu1436
@uiiu1436 3 жыл бұрын
This is 444th like
@poseidoncoder310
@poseidoncoder310 3 жыл бұрын
first
@qu765
@qu765 3 жыл бұрын
nope, third
@Extravi
@Extravi 3 жыл бұрын
First
@qu765
@qu765 3 жыл бұрын
nope 5th
@uiiu1436
@uiiu1436 3 жыл бұрын
Wow only 61 cooments
@WACdeG
@WACdeG 3 жыл бұрын
Just connect to a VPN via TOR, problem fixed
@iTzStick
@iTzStick 3 жыл бұрын
That's not a fix tho. The data is still unencrypted when it leaves the vpn. So you only move the problem somewhere else.
@xCwieCHRISx
@xCwieCHRISx 2 жыл бұрын
@@iTzStick still better than some random exit node ;/ . Of course thats not the solution.
@josephsagotti8786
@josephsagotti8786 3 жыл бұрын
second. im built different.
@qu765
@qu765 3 жыл бұрын
nope, 7th
@szymoniak75
@szymoniak75 3 жыл бұрын
FIRST IM SO PROUD
@qu765
@qu765 3 жыл бұрын
nope, second
@User55881
@User55881 Жыл бұрын
When tor and vpn is not save ,how can blackhat hackers stay invisible when they run exit node servers how can not the police catch them or other white head hackers i cant understand how is this possible everytime i hear stuff lile this my mind is blowing every good it specialist’s say vpn or tor is not save and how can they guys run servers there make criminal things and no one knows where they are !!! Please can you explain that
@xCwieCHRISx
@xCwieCHRISx Жыл бұрын
tor as a deanonymization tool is safe generally speaking, BUT ONLY when you don't make OpSec mistakes. All people that got deanonymized did opsec mistakes. 100% safe is nothing. People use these tools and people make mistakes.
Hundreds of Tor Relays are Being Used to De-anonymize Users
8:57
Mental Outlaw
Рет қаралды 951 М.
OYUNCAK MİKROFON İLE TRAFİK LAMBASINI DEĞİŞTİRDİ 😱
00:17
Melih Taşçı
Рет қаралды 10 МЛН
Win This Dodgeball Game or DIE…
00:36
Alan Chikin Chow
Рет қаралды 17 МЛН
TOR Hidden Services - Computerphile
11:42
Computerphile
Рет қаралды 1,2 МЛН
Worlds Dumbest Darknet Admin Gets Busted
14:54
Mental Outlaw
Рет қаралды 424 М.
The Real Deal with VPNs (Don't Trust VPN Ads)
11:20
Mental Outlaw
Рет қаралды 1,3 МЛН
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,4 МЛН
How to Actually Escape the Botnet
32:17
Mental Outlaw
Рет қаралды 520 М.
Stop Using Tor With VPNs
11:41
Mental Outlaw
Рет қаралды 876 М.
The Secrets of The Tor Browser
19:10
John Hammond
Рет қаралды 91 М.
The Darknet Market OPSEC Bible 2023 Edition
29:58
Mental Outlaw
Рет қаралды 349 М.
How Tor Users Get Caught By Saying Too Much
13:41
Mental Outlaw
Рет қаралды 516 М.
How To Run Your Own Tor Node
15:12
Mental Outlaw
Рет қаралды 99 М.