I am impressed by the technical expertise of members in this forum, especially the Bitcoin Technical and Mining sections. There's an issue I've been grappling with: Tor use in news reports.
I have been using Tor and learning from Reddit how to be adept at its use, but I'm a bit skeptical about its safety. How do journalists who report corruption in government circles effectively evade detection through Tor? How can I be sure that the other reporter at the other end isn't a government agent? Any suggestions from here are welcomed.
What you're asking is basically the technical datasheet of the tor protocol... There are dozens of sites that guide you trough this... For example, wikipedia is already a good source to start from:
https://en.wikipedia.org/wiki/Tor_(network)#OperationBut, basically, they use "onion routing". A very simplified explanation would be that when you send a very simple package over tor, 3 nodes are randomly selected (an entry node, a middle node and an exit node). Your client adds 3 layers of encryption to your package. Each layer can only be decrypted by the correct node... So basically, let's say you send the package <test>. It gets encrypted in such a way:
encryption_entry_node(encryption_middle_node(encryption_exit_node(<test>))). Each node only knows the next node in the path. So the entry node knows your ip and the address of the middle node. The middle node knows the entry node and the exit node. The exit node knows the middle node and the ip of the receiver.
Is it 100% safe... Nothing is 100% safe... The more random nodes, the safer i guess... But if every node in your path is compromised by the same actor, they can connect you to your surfing habits....
Then there's hidden services, those websites with a .onion domain... In these cases, you don't use an exit node... But onion routing is also used to "meet" the hidden service somewhere in the onion network. You don't connect to the hidden service directly, the hidden service doesn't know you, you don't know the hidden service (well, you don't know where it's located... obviously you do know the uri).
Last but not least, most people that get compromised when using tor are compromised due to lacking opsec... Things like re-using monikers, bragging, spending ill-gotten gains,...