Comment Re:Charles Darwin Wrote (Score 1) 745
Feeding trolls may be immoral, but it sure can be fun at times.
Feeding trolls may be immoral, but it sure can be fun at times.
You only need to do that here (Sweden) if you want to deposit large enough sums, I don't know exactly how much should be a couple of thousands of your so-called quids.
I expect this to gradually change within the next 10 years or so, though. I mean, handling cash in this day is suspicious enough when you might as well use a debit or credit card of some sorts, or pay with your phone bill.
Actually, a better "analogy" is that they work hard on making sure that cash can't be used anonymously. Each transaction must be monitored (serial numbers on every bill, cameras in every ATM and store), and controlled (demanding proof of ownership for depositing cash at a bank, removing the possibility to actually use cash for buying travel documents).
Much like they are working hard on trying to make sure Tor can't be used anonymously.
I'm just judging the book by its cover. It looks like it's design to lure people with flashy but cheap looking animations.
Anyway, changing your browser string won't make you less trackable. They don't use those for tracking individual users.
Uhm, heh...
No. Sorry.
From the look of that website, you probably have some nice tracking installed now though.
He did claim early on that he did this because he didn't want any personal information about any NSA agents getting out, and I bet the papers are full of them.
It is, however, a pretty lame excuse IMHO. But I'm not the one with a government agency after me.
Interesting. If I worked for NSA, I would try to. It would give some more information. Though on the other hand, they may just as well run their own nodes to get that information (oh yes, they do this already), and hacking 'normal' people just for the lulz always increases the chance of information about your operations getting out.
In short: It would be stupid to hack you just because you're running a node, unless you're their target in some other way.
Of course they are watching exit nodes. Everybody should assume they do (also the person running the node will watch, and that person's ISP).
However, I have never heard anyone claiming they can tie the traffic back by watching the traffic, other by the well know timing attacks that they *do* talk about in the article. Basically, they see some traffic exit the node at the same time as they see similar traffic at some completely unrelated place in the network, building up statistics which can identify a suspect over time. This is why they say they have limited success.
Maybe they already sound very similar to the sounds whales make, and maybe that's why the whales get disoriented and stranded.
With your bare hands?!?