TOR AND THE DARKNET – Remain Anonymous and Evade NSA Spying by James Smith

TOR AND THE DARKNET - Remain Anonymous and Evade NSA Spying by James Smith

I want to thank you and congratulate you for downloading the book, “Tor and The Dark
Net – Remain Anonymous and Evade NSA Spying”.
Internet privacy is a thing of the past. In todays day and age if you are using a computer or
device that is connected to the internet you do not have any privacy. It is an unfortunate,
but definite fact. For some this may not matter at all as they don’t care who has access to
their files, data, browsing habits, or wherabouts. However, for others this can pose a
significant problem. The NSA, the FBI, and even simple sophisticated hackers have the
ability to track anything and everything you are doing. The good news is there are
methods and tactics you can use to prevent this from happening. Inside this book you will
find step by step instructions and techniques that can and will make you completely
anonymous on the internet. If used correctly not even the NSA will be able to track you
down. Everyones situation and needed security levels can be different so this book breaks
down all the different options that are available to you and defines exactly what each one
does and how secure it can be so that you can choose what will work for you.
It is my hope that this book is able to inform you of all your options to remain anonymous.
Thanks again for downloading your copy!


First and foremost, to protect yourself while browsing the internet you should be using Tor
which stands for The Onion Router. Tor will provide you with a degree of anonymity by
using an 128-bit AES (Advanced Encryption Standard). There has been some debate as to
whether or not the NSA can crack this code, and the answer is likely yes. This is why, you
should never send anything over Tor that you aren’t comfortable sharing with the entire
world unless you are using some sort of PGP encryption which we will talk about later.
Communication from your computer, to the internet relies on an entry node which
basically “enters your computer” into the Tor network. This entry node communicates
with your computer; this entry node knows your IP address. The entry node then passes
your encrypted request onto the relay node. The relay node communicates with the entry
node and the exit node but does not know your computer’s IP address. The exit node, is
where your request is decrypted and sent to the internet. The exit node does not know your
computer’s IP, only the IP of the relay node. Using this model of 3 nodes it makes it
harder, but not impossible to correlate your request to your original IP address.
The problem comes obviously when you are entering plain text into TOR because
anybody can set up an exit node. The FBI can set up an exit node, the NSA, or any other
foreign government, or any malicious person who may want to steal your information.
You should not be entering any sensitive data into any websites, especially when accessing
them over TOR. If any of the nodes in the chain are compromised, and some likely are,
and the people in charge of those compromised nodes have the computing power to
decrypt your request, then you better hope it wasn’t anything sensitive.
So what can we do to fix this? Well, luckily we are now having more and more servers
that are offering something called Hidden services. You can easily recognize these
services by the address .onion . These services offer what’s called end-to-end encryption.
What this does is take the power out of the compromised exit nodes and put them back in
your hands. The web server of the hidden service now becomes your exit node, which
means the website you are visiting is the one decrypting your message, not some random
exit node ran by a potential attacker. Remember, the exit node has the key to decrypt your
request. The exit node can see what you are sending in clear text once they decrypt it. So
if you are entering your name and address into a field, the exit node has your information.
If you are putting a credit card, a bank account, your real name, even your login
information, then you are compromising your identity.
Another step you can take, is to only visit websites that use something called HTTP
Secure. You can tell if the website you are visiting is using HTTP Secure by the prefix at
the beginning of the address. If you see https:// then your website is using HTTP Secure.
What this does is encrypts your requests so that only the server can decrypt them, and not
somebody eavesdropping on your communication such as a compromised Tor exit node.
This is another form of end-to-end encryption. If somebody were to intercept your request
over HTTP Secure, they would see encrypted data and would have to work to decrypt it.
Another reason you want to use HTTPS whenever possible, is that malicious Tor nodes
can damage or alter the contents passing through them in an insecure fashion and inject
malware into the connection. This is particularly easier when you are sending requests in
plain text, but HTTPS reduces this possibility. You must be made aware however, that
HTTPS can also be currently cracked depending on the level of the key used to encrypt it.
When you visit a website using HTTPS, you are encrypting your request using their public
key and they are decrypting it using their private key. This is how cryptography works. A
public key is provided to those who want to send an encrypted message and the only one
who can decrypt is the one with the private key.
Unfortunately, many websites today are still using private keys that are only 1,024 bits
long which in today’s world are no longer enough. So you need to make sure you find out
which level of encryption the website you are visiting uses, to make sure they are using at
a minimum 2,048, if not 4,096 bits. Even doing all of this unfortunately is not enough,
because we have another problem. What happens if the web server itself has become
compromised? Maybe your TOR nodes are clean, maybe you have used HTTPS for all
your requests, but the web server itself of the website you are visiting has been
compromised. Well then all your requests are again, as good as plain text.


Leave a Reply

Your email address will not be published. Required fields are marked *