Bitcoin Forum
May 25, 2024, 12:51:46 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: My passwords are stolen when using Tor non-HTTPs ?  (Read 374 times)
postcd (OP)
Full Member
***
Offline Offline

Activity: 182
Merit: 103



View Profile WWW
March 13, 2016, 01:52:29 PM
 #1

Hello,

on http://en.bitcoinwiki.org/Tor i read:

Quote
(the exit node) can see everything you do on HTTP sites, and can steal your passwords

is this statement still valid and when i submit login form on HTTP site, im actually sending my password to the Exit node owner?

if that is so, is there any way to prevent exit node see my password when login form support only HTTP ?

Or any plugin that notify me before submitting HTTP form password?

Thank You

Bitcoin Web hosting, Server? InstantcPanelHosting.com
Contact.
bleachedno
Member
**
Offline Offline

Activity: 112
Merit: 10

★YoBit.Net★ 350+ Coins Exchange & Dice


View Profile
March 13, 2016, 02:09:24 PM
 #2

I did read many times that there are even infected tor exit nodes that could harm your computer not sure if thats true but i would stay away from it.

██████████    YoBit.net - Cryptocurrency Exchange - Over 350 coins
█████████    <<  ● $$$ - $$$ - $$$ - $$$ - $$$ - $$$ - $$$   >>
██████████    <<  ● Play DICE! Win 1-5 btc just for 5 mins!  >>
achow101
Staff
Legendary
*
Offline Offline

Activity: 3402
Merit: 6653


Just writing some code


View Profile WWW
March 13, 2016, 02:15:01 PM
 #3

Hello,

on http://en.bitcoinwiki.org/Tor i read:

Quote
(the exit node) can see everything you do on HTTP sites, and can steal your passwords

is this statement still valid and when i submit login form on HTTP site, im actually sending my password to the Exit node owner?

if that is so, is there any way to prevent exit node see my password when login form support only HTTP ?

Or any plugin that notify me before submitting HTTP form password?

Thank You
Yes that is true. It is true even when not using tor. If you are sending data over HTTP, it is unencrypted so anyone between you and the site (e.g. tor exit nodes, routers, switches, proxies, etc.) can intercept and read the data in clear text. This includes passwords and sensitive information. The solution is to use HTTPS. IIRC the tor browser comes with an extension called HTTPS Everywhere that forces sites to use HTTPS if it us available. If it isn't, I think the extension will warn you.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!