All the recent dark net arrests seem to be pretty vague on how the big bad was caught (except the IM admin's silly opsec errors) In the article they say he clicked on a honeypot link, but how was his ip or any other identifier identified, why didnt tor protect him.

Obviously this guy in question was a pedophile and an active danger, but recently in my country a state passed a law that can get you arrested if you post anything the government doesnt like, so these tools are important and need to be bulletproof.

    • tetris11@lemmy.ml
      ·
      3 months ago

      Mullvad is pretty good in this regard by forcing you to use their DNS. Though of course, you have to trust them.

    • Artemis_Mystique@lemmy.ml
      hexagon
      ·
      3 months ago

      Does Tor have no protection against such a simple attack? I always thought any clearnet address i type in the browser (along with the dns query) hops 3 times.

      • mox@lemmy.sdf.org
        ·
        edit-2
        3 months ago

        The Tor network cannot protect against that, because the attack circumvents it. Certain tools, like the Tor browser, do have protection against it (as much as they can) when you use them correctly, but they cannot keep users from inadvertently opening a link in some other tool. Nor can they protect against other software on a user's device, like a spyware keyboard or the OS provider working with law enforcement.

      • orcrist@lemm.ee
        ·
        3 months ago

        You can do DNS in multiple ways. The question is what you try to do, or what your software tries to do.