You are under continuous risk of compromising your privacy while using Tor based email service

Tor is an anonymization network which provides residence to the e-mail service called SIGAINT.  According to recent reports SIGAINT has fallen prey to unidentified attackers who tried to breach its security and get access to the messages of the users. The attackers used 70 exit nodes of malignant nature to pose threat to the users of the SIGAINT  e-mail service.

Basically, Tor provides email service for people who want to hide their daily internet activities from various advertisers and websites. It is mainly useful who are more prone to spying like journalists, military officials etc. Tor has the second big data base of people from countries where internet censorship is imposed upon. Tor is known to be frequently used for the purposes like credit card frauds, money laundering etc.

Tor assists in having anonymity while using internet. It is well known that Tor is prone to a risk which absorbs the traffic entering and leaving the network. These traffic patterns are combined with data to recognize the user and its current destination.

tor

This Tor project tries to frighten operators of exit node by posing the threat of prosecution. According to reports, there is no technical involvement that can save both incoming and outgoing messages from the exit node operators; due to this Tor is extremely unsafe for normal users. Tor makes the process of encrypting messages and chaining proxies a very easy job for the network.

The problem in Tor network occurs when sign up to new relays in attempt to become the large part of the network. Despite this fake relays by exit nodes only make up 1% of the actual relays in Tor network. Tor is trying hard to remove all such relays and secure the network.

It is claimed that exit node operators and hackers belong to Lizard squad. This hacking of Tor network was done by obtaining IP addresses of various users, which signifies the direct clue of your presence on the network. It is also observed that encrypted connection is used by the Tor users to connect to the main network. After the requests are made, they get out at a random point which makes it easy to find the user’s destination. The attacker can keep a close look on your internet activities and can track when your traffic enters the computer and also when it leaves.

Normal websites are not encrypted by SIGAINT, which allows the hackers to escape. The email service informs the motherboard that the site is not locked because which makes it ineffective to counter hackers with fake security certificates.

It is still an unknown fact that who was behind the spying process. it can be government, drug dealers, and also terrorists. Whatsoever the final advice for the users is that they should use this email service carefully or they will end up handing their personal information to hackers, who can misuse it.

Category:

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *