Tor browser is known to many Internet users as a popular means of ensuring anonymity when surfing the web. But Russian computer security experts have a different opinion on this - they argue that the possibilities of "onion routing" are greatly exaggerated.
As reported by "Izvestia" with reference to the leading domestic experts on cybersecurity, with the existing architecture of the Internet it is impossible to create a completely anonymous system. Inside it there are "tags" that can be intercepted. Typically, an encrypted connection is sent through three randomly selected nodes (nodes) as proxy computers.
According to experts, the final node, "issuing" a request to the Internet, sees traffic in an unencrypted form — so scammers in theory can collect personal data and other confidential information of users. In addition, check the source code of the "onion browser" capable units: most users download already compiled versions, which theoretically may contain any "bookmarks".
"If hackers hacked page of the deep web, where the user will go through a "leaky" version of Tor (and a lot of them), they will be able to successfully attack the PC and de-anonymize user", — told reporters a senior antivirus expert at Kaspersky Lab, Sergey Lozhkin.
According to experts, it is theoretically possible for the disclosure data of users of the Tor browser available to holders of computational and bandwidth resources at the state level. However, experts argue that to date, de-anonymize a Tor user is very difficult, if not impossible, in General, this system remains an effective tool to ensure anonymity in the network.