Tor: Deanonymization possible later?

Discussion in 'privacy technology' started by thebuddy881, May 7, 2014.

Thread Status:
Not open for further replies.
  1. thebuddy881

    thebuddy881 Registered Member

    Joined:
    May 7, 2014
    Posts:
    3
    Hey there,

    I want to use TOR Browser Bundle, not to make the information sent through the internet safe, I just want to send the information anonymous, i.e. nobody should be able to reveal my real IP.

    Is this somehow possible in TOR when I use the standard config (which I assume does verify that NO nodes are overtaken by a third-party as a man-in-the-middle-attack)?

    And: If its possible: Is it only possible while I run TOR or can this be done even when I already closed TOR afterwards? E.g.: I use TOR; signup at google and create a public G+ acc. Google knows my TOR IP, which is okay so far. Now I logoff TOR. Could my "tor"-IP Address saved at google be used to somehow now reveal my real ip used at that time when creating the G+ account?

    And third question: Is it possible to somehow configurate Tor so that it cannot be detected as TOR? There are websites which dont let me create an account while I use TOR (blocking the TOR exit node-ips :()... How to bypass thato_O

    Thanks a lot
     
  2. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    Every time you open TOR you get a new circuit. That IP you are worried about basically is "one time" for YOU. The critical thing for you to consider is what you are doing BEYOND the last TOR exit node. Once you exit you lose TOR protection so it would be really smart to connect to secure https sites just in case the final relay is "evil". Rule of thumb: NEVER use TOR for things that come back to you personally, such as personal emails, banking, etc.... Even if you create an "anonymous" email account its worthless if you start getting emails from your brother or bank. Get ito_O?

    Sometimes TOR bridges will get you past the blocks you are referring to. I find many times I have to combine TOR with various VPN's to get around those blocks.
     
  3. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Regarding your last question, sites that block Tor are using the exit node lists. All Tor exit nodes are publicly listed. Getting around such a blockage would probably require using a VPN, either by itself or connecting to it through Tor.
     
  4. thebuddy881

    thebuddy881 Registered Member

    Joined:
    May 7, 2014
    Posts:
    3
    yeah for sure.

    But as I said: There wont be ANY connection to myself personally I suppose.
    Im just concerned about the IP itself being revealed afterwards, but if that's not possible to happen, then there shouldnt be any problem.

    The mail acc will only be created for creating some other forum accounts where I want to post stuff, comments etc which should never be able to trace back to my real IP.
    But the comments etc in the forums will obviously be public (so I don't want to hide the information itself).
    Would TOR be sufficient for this?

    A scenario you could think of just as an example: turkish people wanting to state/post their opinions about political stuff on the internet. The posted opinion (=the information itself) would be publicly available. But would using TOR be enough to make it impossible to trace back the TOR-session IP (saved in the logs of the political homepage when posting) to the real person who posted?

    Edit: Or just think of this forum. I'm currently NOT using TOR, but if I would, could somebody trace back the ip stored in the database for my account/posts to my real one?
     
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
    If you use TOR for all activities regarding that email account and forum you should be safe. I would also suggest using some other email provider and not Gmail (Hushmail for example). Tor can be also run from inside Virtual Machine (VirtualBox) for additional security (separating it from your real system).
     
  6. thebuddy881

    thebuddy881 Registered Member

    Joined:
    May 7, 2014
    Posts:
    3
    Yes I thought of the following: Booting a Live Linux CD (Tails or Whonix) from my Laptop, then using the TOR Browser, creating the Mail Account and then, with it, the accounts on forums/news-pages etc to be able to post my opinions anonymously. Yeah I know hushmail, but I want to further create a G+ account for sharing stuff (without personal information / pictures / friends etc for sure).

    No way to trace back the IP?
     
  7. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,881
    Location:
    Slovenia, EU
  8. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    The suggestion above recommending the use of TOR from within a VM is an excellent one. I would personally want to make sure that any of my internet VM's were Linux and not Windows. The well designed VM removes the actual hardware ID from being seen by websites/malware. An IP is not the only concern for "tracks" left. We have tons of threads around here about the advantages of VM's for cloaking ones "trail".
     
  9. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Yes, and VMs also isolate workspaces from processes that specify, control and protect their network topology, such as Tor and/or VPN clients, and firewalls. In Whonix, for example, the workstation VM can be totally hosed, and there's no access to the Tor client in the gateway VM, unless the adversary and/or malware can break out to the host OS.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.