What's new

Ban internet **** to prevent cases like Zainab’s murder: IHC judge

There's no effective way to block VPN. GoP must find out ways to do survilance based on cyber behavior and activities of people.
VPN can be blocked by constantly monitoring the internet traffic but it is a cat and mouse game. The most effective way for Gov is to have a bot net network to attack such sites and make them make Pakistan unaccessible.
 
. .
There's no effective way to block VPN. GoP must find out ways to do survilance based on cyber behavior and activities of people.
WHat makes you think they are capable of something that even US has trouble doing?
 
. .
Doing What?
Blocking access to sites that are located outside the country

VPN can be blocked by constantly monitoring the internet traffic but it is a cat and mouse game. The most effective way for Gov is to have a bot net network to attack such sites and make them make Pakistan unaccessible.
onion_peeler_cyber_forensicator.jpg
 
. .
Never trust tor to be totally secure if Govt is trying to track something they always can the Tor traffic is always identifiable at ISP.
Absolutely its not a better strategy is to to use tor only in a virtual machine which you will delete after use if you really wish to be extra safe oh and never stretch the browser to full screen and turn off jscript
 
. .
Absolutely its not a better strategy is to to use tor only in a virtual machine which you will delete after use if you really wish to be extra safe oh and never stretch the browser to full screen and turn off jscript
If you still use all those saftey measures there is one way they can track tor. Now suppose you uploaded an image using tor. The Tor node taking Data from your terminal will have same byte of data as the Image size now what govt cyber listener will do is record the size of Data being sent. Next he will check the ISP for that size packet transferred. Third he will check the internet with a crawler for that size of data at the end point so this way he will intercept your entire data and can also confirm your location on the ISP. That is how Tor is tracked.
 
.
If you still use all those saftey measures there is one way they can track tor. Now suppose you uploaded an image using tor. The Tor node taking Data from your terminal will have same byte of data as the Image size now what govt cyber listener will do is record the size of Data being sent. Next he will check the ISP for that size packet transferred. Third he will check the internet with a crawler for that size of data at the end point so this way he will intercept your entire data and can also confirm your location on the ISP. That is how Tor is tracked.
Not really how it works if your data is encrypted the isp will see gibberish move back and forth plus with tor think of your traffic bouncing of multiple locations before reaching target destination and the next node isnt exactly sending data only to one other node it too has multiple nodes on the call
Its the mess that makes it safe to crack it one has to exploit weaknesses of the browser itself
 
.
Not really how it works if your data is encrypted the isp will see gibberish move back and forth plus with tor think of your traffic bouncing of multiple locations before reaching target destination and the next node isnt exactly sending data only to one other node it too has multiple nodes on the call
Its the mess that makes it safe to crack it one has to exploit weaknesses of the browser itself
From your device your traffic directly goes to ISP and and from there is bounces. Your Tor node is recognizable always as the public key of tor is well known to every one in the industry of cyber security. So Your direct traffic can be picked up at ISP. They will know that this IP is using TOR in a sec.

Read the TOR own website the info is there.
 
.
Ofcourse its not full proof but with gibrish going through layers after layers that keep on changing its as close to anonymous as you can get
 
.
Ofcourse its not full proof but with gibrish going through layers after layers that keep on changing its as close to anonymous as you can get
The only way to by pass ISP is through sat connection and they will get you if you are using one. So there is no anonymity. You are only anonymous after ISP.
 
.
From your device your traffic directly goes to ISP
Yes it does but encrypted data of something like
Hello
will be
x$#%^
In encrypted form what you send out is gibberish with tor to completely random destinations
The data will be off-limit but the metadata will be but in the end of the day they exploit the weakest link (you) if you are dealing drugs or something try to take precautionary measures
 
.
Yes it does but encrypted data of something like
Hello
will be
x$#%^
In encrypted form what you send out is gibberish with tor to completely random destinations
The data will be off-limit but the metadata will be but in the end of the day they exploit the weakest link (you) if you are dealing drugs or something try to take precautionary measures

Yes it encrypts data I agree and I know what encryption is and tor uses 64 bit encryption.
Now look when I send a message to you. like this message "Hello how are you"
Tor will send some thing like "X5#%ertytinfb7*^(tttr%4#@@Rhy56#"

the data sent from tor will go straight to your ISP from there it will go to a Tor Nod to Iceland and then to TOR node to Germany then to XYZ and then it will reach destination. Now in this whole process your ISP knows you are using TOR and It also knows you have sent 313 kb of Data because ISP charges you on data you upload and download there is a DATA meter at ISP.

Now message "Hello How are you" was displayed on PDF suppose they will take this message and send it through tor and calculate the size if it matches your sent amount of data they will know immediately. Now next they will try to record the time at which you used TOR and IF those times matches your tor activity they will get to you.
 
.

Pakistan Defence Latest Posts

Pakistan Affairs Latest Posts

Back
Top Bottom