here are the resources that were delivered via secret relay to the mission
deployment center:

> Example:
>
> metrics.torproject.org - checks if the IP address was used as a host to
send traffic to Tor.
>
> check.torproject.org (
https://check.torproject.org/cgi-bin/TorBulkExitList.py)
github.com/SpiderLabs > - will find a list of all Tor exit nodes in the
last 16 hours that could contact the IP;
>
> ipqualityscore.com/user/proxy-detection-api/lookup - Find out if a person
is using a proxy, VPN or TOR.

metrics.torporject.org really says this? hum

ok and then we have possible exit nodes. sounds like a large set.

proxy-detection-api doesn't sound quite like my thing.

OK, these aren't amazing resources. I think there are a couple papers out
there with more ideas.

We may end up reviewing the tor source code and protocols and running some
experiments.

A _really_ helpful behavior when deanonymising tor users is running a tor
node yourself. Generally if you run an exit node you can mitm them directly
to do this.
  • [spam][joke] implementing a... Undiscussed Horrific Abuse, One Victim of Many
    • Re: [spam][joke] imple... Undiscussed Horrific Abuse, One Victim of Many
      • Re: [spam][joke] i... Undiscussed Horrific Abuse, One Victim of Many
        • Re: [spam][jok... Undiscussed Horrific Abuse, One Victim of Many
          • Re: [spam]... Undiscussed Horrific Abuse, One Victim of Many
            • Re: [... Undiscussed Horrific Abuse, One Victim of Many
              • R... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many

Reply via email to