Tor IS NOT SAFE advice to make safe GOV monitoring exit nodes

I had my PC taken, for some reason they found tor dumb for not using tails anyways my lawyer said DO NOT USE tor it's compromised. They are monitoring exit nodes. I know about socks5 (dont know how to use) using coffee shops etc. But how do I better protect myself from exit nodes.


Comments


[5 Points] None:

Do you think it's at all possible that your lawyer is telling you to not use Tor to stop you from doing illegal things, and doesn't believe that you will stop unless given a good reason (like making up some bullshit about it being broken by the government?). It's their job to keep you out of jail.

The fact you got caught with drugs and based on your post are still under investigation, and you are still trying to buy drugs online leads me to believe that you are the type of person that would need to be told an elaborate lie to stop doing something.

And I do not say these things out of hate or trying to be mean, I am sure you are a normal person all things considered. I just think it's far more likely that your lawyer is wrong and is telling you these things because he is either ignorant or trying to keep you free.


[3 Points] Devoid_:

Bullshit, you would have to be involved in some high level shit or very unlucky to be discovered from exit nodes. Maybe you were discovered through some sort of exploit and not because of tor.


[2 Points] junkitactics:

next time use lube

edit: better to take it easy than take it HARD!!


[2 Points] None:

If you were running an exit node from a home computer you're an idiot and that is why you were arrested.

Tor hidden services do not use exit nodes. Your post doesn't really make sense.


[1 Points] fu_onion:

tl;dr They found the tor browser you installed? There's nothing illegal about that. Tor is only a small part of good opsec and there's no perfectly secure application - but Tor is pretty fucking good so claiming it's broken without specific proof is not yet justified no matter how much your butt hurts right now.

Yes, they monitor exit nodes but you must be a very big fish if they've got reliable evidence from an https DNM connection over the Tor network from a VPN from your machine - you were using a VPN to get to Tor right?

AFAIK there have been LE/Tor compromises from trojans installed on stupid windows/mac boxen (easy) and compromised kiddie pr0n servers (not tor's fault), but I'm not sure there's ever been a bust just from exit node scanning (really hard if https and originating from a VPN). More likely there are problems for purchasers from inexperienced and busted vendors with unencrypted PGP messages sitting on now compromised DNM accounts. Tor is pretty good and getting better but addtional steps like a VPN and a lot of attention to opsec detail are also needed.


[1 Points] None:

[deleted]


[1 Points] MDMangel:

my lawyer said DO NOT USE tor it's compromised. They are monitoring exit nodes.

How would HE know this?


[1 Points] f_leaver:

Exit nodes only affect you if you're exiting the tor network. So long as you remain on the darknet, you don't go through an exit node.