nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqvgzrqfnrgpdaq6g06gfamsfqpglnpkffyk5cn69g57rmgpr9c8fsznwk48 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqx0r5gflnk2mn6h3c70nvnywpy2j46gzqwg6k7uw6fxswyz0md9qq0kp50y nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq8c2ljqudu3dm9e0de9sea3gqy67f6kj4e6cwe243rseenf9gmmmqmsuxme yeah if you read up on firewall docs and shit you can hear about them telling IT guys "how to find tor traffic on your network", hence being visible in the sense that an IT guy who knows his shit can know you're using it.

https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_TOR_traffic

Reply to this note

Please Login to reply.

Discussion

Yep, Tor is an anonymity service, not a secrecy service. Website owners can still see that a Tor exit node connected to them, your ISP (or VPN provider) can still see of you connect to your guard node, and your exit node can see the websites you visit. (Though if you use HTTPS, they have no idea what you actually do on those sites.)

One retard got caught sending a bomb threat to his own school because he literally connected to Tor using the school's own wifi.

Personally, I think educating the wider public on recognizing and understanding Tor traffic has absolutely zero affect on the fundamental anonymity of the system. Security through obscurity is not security at all, and maintaining an open and helpful public appearance is incredibly inportant for a service like Tor.