Skip to main content

Drawbacks of TOR

I Suppose that Everyone Knows about TOR.If Anyone, who Don't Know about TOR,or the Ones who Know about TOR Must Read our Post The Complete Guide for Understanding TOR and Becoming Anonymous ,which will Guide you About the TOR Projects,its Services,How it Works,Its Mobile Application and Much More.




After you have Read the Above Article about TOR,you Might have thought that TOR is the Safest Service for Becoming Anonymous.But TOR can’t solve all Anonymity and Privacy problems. It Main Focus is only on Protecting the Transport of Data from one Client to Another. It provides no Safeguards Against, for example, Sheer Stupidity.Let's take an Example : There is a Cyber Criminal selling Hacked Email Accounts in one Tab and a Chatting on Facebook in another Tab.So what you Guys think,that Criminal Deserves to be in Jail for his Idiocy. It is up to the User that they make Sure that they don’t Enter any Private Data, not a Single Drop of Information that could Lead back to them even while using TOR.

TOR also cannot provide Protection against End-to-End Timing attacks.If your Attacker is Enough Clever that he can Watch the Traffic coming out of your Computer(Means your Network), and also the Traffic Arriving at your chosen Destination,then he can use Statistical Analysis to Discover that they are part of the Same Circuit.It basically means that, if the Attacker knows that your Computer sent a Request to a Website and also knows that the Website just Received the same Request, it’s very likely that this particular Connection is Yours and even if he had no Interaction with the Passing Data, it can then also,still be Compromised. Mind you, this kind of attack is not something an Average Attacker can even attempt. Attacker would need to be the Man-in-the-Middle for your target’s ISP and at the same time be tapped into a Website Server which may be on the other end of the globe.

Ongoing trends in Laws, Policy, Technology ,in the Digital World or we can say the Cyber Laws,threaten Anonymity as Never before, undermining our Ability to Write and Read Online Freely. These trends also Undermine an Individual’s and a Nation’s security by making Communication among Individuals, Organizations, Corporations, and Governments more vulnerable to Unauthorized Analysis. Each New User and Relay provides additional Security, enhancing TOR’s ability to put control over your Security and Privacy back into the hands of people, which is of the People only.

Internet represents the Biggest Democracy there is, Ever was and Ever will be as it Connect the Whole World.Everyone with Anybody can Share their View, can Do Anything. It Offers us Among Infinite other Resources, a vast ocean of Knowledge. Such is the Power and Sheer Practicality of the Internet. It is truly one of the greatest Accomplishments of all Humanity. It is what Binds us, it is what Defines us. With Great power, comes not only Great Responsibility but also Greater Threats. Threats to our Security, threats to our Privacy and Threats to our very Virtual existence. If and when the time comes, it will be up to us to defend Ourselves.

Don't Forget to Subscribe our YouTube channel and Like our Facebook Page.

Comments

Popular posts from this blog

How to hack Andriod using Stagefright Vulnerability

Today i am going to demonstrate a exploit to take reverse shell in android,before i explain the demo i want to explain some things related to  this hack or exploit and also this for education and awareness about security of your devices.
What is Stagefright?
Android includes Stagefright, a media playback engine at the native level that has built-in software-based codecs for popular media formats.

Stagefright audio and video playback features include integration with OpenMAX codecs, session management, time-synchronized rendering, transport control, and DRM.

Stagefright also supports integration with custom hardware codecs provided by you. To set a hardware path to encode 
and decode media, you must implement a hardware-based codec as an OpenMax IL (Integration Layer) component.  

How hacker can exploit this Stagefright Library?
This critical vulnerability was discovered by a researcher at Cyber Security Firm called Zimperium. This  vulnerability is a type of buffer overflow attack and in thi…

The Best way to Track your Facebook Login Location and Receive the Login Alerts

I think about One-Fourth of the total world population is on Facebook and Whatsapp. Facebook hacking has become common so we all should look towards our safety so that no one else could use our account for something doing illegal purposes and we should know that when our account was last logged in and from which location.

By the Way Facebook provides both the Features for your Safety and has a lot of many Additional Features.When someone or you log in into your account, facebook notify you by sending you a message at your Registered Phone Number and your registered Email-ID.It also has a feature that you can see at which place you were last logged in.

Follow the Below Steps to Track your Facebook Login Location ::

1)First of all open up a browser and log in into your Facebook account.
2)At the Right most End below the Address Bar there will be a Down Arrow.Click on that arrow.
3)Now click on the Settings Option.Then Click on Security below the General option.
4)Now click on the Edit button …

How to Transfer Your Android SmartPhone to PC from Wifi Wirelessly The Best Way

Everybody in today's World is on Internet and they have become very Modern and Work Smartly in their life and make full use of the Internet to do their work more efficiently and Simply.
If you have a Android Smart Phone,What would you do if you want to see your mobile stuff on your Windows ?Buy a Card Reader or use a Data Cable or use Shareit or something like that to transfer your Data to your Windows and Then Access it.
I got a Better and Of course a Smart Way to do this with a help of a Simple app called Airdroid.And I bet you that It will the Best Android App you have ever seen.

Follow the Below Steps to Transfer your Android Phone to PC ::

1)Download the Airdroid App from PlayStore and install it.
2)Open the App and first Sign Up.You can Sign up using Google+,Facebook or Twitter also.
3)A small Window will appear asking for View all App and System Notifications on the Computer in real time.Click on the Enable Button.
4)Then your Mobile Accessibility Settings will be open.Under the S…