Most people who got caught on Tor were caught by undercover operatives or one of their friends on there got busted. Just general recklessness on there. I have heard that CIA tries to run a bunch of tor nodes to deanonymize tor but I’ve also heard that tor checks if those nodes are legit before allowing them on. I don’t see strong evidence for tor being compromised.
And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.
Privacy based solutions is kind of vague, I the main privacy and security services I use are Signal, Protonmail, Protonvpn, and Bitwarden. All of these are open source, you can view the source code yourself and see if there’s spyware, strangers look at the code all the time so online strangers can see if there’s spyware in there, they also are all checked and audited by third parties. So the code you see is what you get and there are no backdoors or spyware running in there. You can build it all from source if you’re extra cautious but it’s probably done right.
So I have no idea what this guy is saying but it is not true at all.
Can anyone confirm this for me?
Most people who got caught on Tor were caught by undercover operatives or one of their friends on there got busted. Just general recklessness on there. I have heard that CIA tries to run a bunch of tor nodes to deanonymize tor but I’ve also heard that tor checks if those nodes are legit before allowing them on. I don’t see strong evidence for tor being compromised.
Privacy based solutions is kind of vague, I the main privacy and security services I use are Signal, Protonmail, Protonvpn, and Bitwarden. All of these are open source, you can view the source code yourself and see if there’s spyware, strangers look at the code all the time so online strangers can see if there’s spyware in there, they also are all checked and audited by third parties. So the code you see is what you get and there are no backdoors or spyware running in there. You can build it all from source if you’re extra cautious but it’s probably done right.
So I have no idea what this guy is saying but it is not true at all.
Thanks!