Discussion in 'BlackHat Lounge' started by dr.doom, Dec 29, 2012.
I think that the TOR network, doesn't use people's IP addresses. It uses public IP's only available for browsing the Deep Web. So there is no way to get the IP of the user browsing the Deep Web. Even TOR websites don't have domains in order to check the WHOIS.
TOR = ANONYMITY? mhh i would say yes.
You are using tunnels to other pcs which are in the tor network, too.
Therefore you' ve got a different ip and nobody knows what the original ip was.
But you cannot be sure that someone is browsing with your own ip..
What I think, by using TOR you will get a random ip, but it even could be your own one..
something like that, i cannot really explain :/ to be honest: superficial knowledge
Companies do not find out the real IP behind TOR.
What companies can do is see you are consistently relaying on a basic VPN network where the IP has been used a million times.
Therefore the IP is blacklisted or else.
It is the TOR exit node IPs that are being identified and blocked, not the TOR user's IP.
TOR exit nodes lists are readily available.
The real TOR is not public, even what you see(tor directories) are a small part of the TOR internet. That's why. And TOR criminals that don't have good security are caught.
In layman's terms, TOR works like this.
I need to send a letter to person C. Instead of sending it directly to them and having them reply, I instead send a letter to person A. Person A takes the letter out of the envelope, encrypts what's inside, and then sends that letter in a new envelope to person B. Person B takes the letter out of the envelope, encrypts the data again, and puts it in a final new envelope and sends it to person C. Person C sees the data request, sends the webpage info back to person B, who then sends it to person A, and then back to me.
All of these transactions are encrypted and none of the "exit nodes" (read: websites) know who it is that will ultimately receive the packet of information they send out. This, coupled with the fact that people's IP addresses are changed and relayed every few minutes leads to damn near perfect anonymity on TOR.
Problems arise if poor security somewhere in the chain, i.e. someone doesn't take your letter out of the envelope to send it to the next person in the chain, allows the exit node to discover who the packets are ultimately supposed to be delivered to.
EDIT: This is in stark contrast to the way the traditional web works where every node in the chain (meaning your ISP and all of the datacenters your packets pass through to get to their final destination) pass on both WHO you are and WHAT you're requesting. This is why websites know your IP address.
TOR aka "onion" sucks anyways. Sorry for the trolling, just had to say that......
Having an IP whose DNS resolves as torexit.blahblah is easy to catch even with the most lousy php script for everybody. This doesn't imply you know who's the originating request IS, you can just tell that's coming from tor whoever that is. That's why you get banned by adsense, that's why you get "this ip is blocked on cl, but why silkrope can live there without any issue.
I agree. I don't know why people are so excited about the "deep web"?
Separate names with a comma.