no no no not another silk road LOL. i know there are fbi agents all over the place now and Tor is not that anonymous as it was few years ago.
i want to see my own website/webpage running on a Tor network. thats all
Tor was never really that anonymous. It's a constant battle against vulnerabilities. As long as they have exit nodes there will always be a chance of it being seen. I never have considered as iron clad VPN.
Just out of curiosity has speed increased? I remember it was very slow when I used it what seems ages ago.
....Yeeeaaahhhh and noooopeeee.....
Vulnerabilities always occur, as in Browsers, remember openssl Heartbleed or bashexploit and so and so on and so on....
You can see, and even manipulate the traffic as a maliscious exit node operator, the traffic comming from an exit node and attack it, as you can see the clearnet connection also.
If you have the ressources, and the NSA with it´s five eyes alliance has these, and watch the whole TOR network, you can determine the connections pretty good to link it to a possible entry or you can force a network latency attack, which has already been performed.....
Today, if you use an exit node, for example cloudfare uses fingerprinting, which is obvious in the captcha resolving as a human, it from a users perspective doesn´t matter if you use TOR or not, because cloudfare can say that you used this webpage once with- another time without TOR if you browse without TOR with the same browser.
BUT!!! You do not have to give away substantial wrights of your´s, as privacy and the freedom to do and say what you want to when you want to, without the battle, i surely am not willing to do so
And as a footnote, not a single "terrorist" was caught since 911, becuase he used TOR or was funded with BTC ....
Kind regards,
elrippo