F5F Stay Refreshed Power Users Networks No records are generated by VPN providers.

No records are generated by VPN providers.

No records are generated by VPN providers.

Pages (2): Previous 1 2
J
jorgen9
Member
65
06-28-2023, 11:56 AM
#11
I'm trying to reduce my paranoia. I knew about the correlation, but I was deliberately avoiding it. If someone is really focusing on TOR correlation, they must be looking into me for something and gathering proof.

To clarify further: when an attacker checks specific network spots to validate a theory, they're likely suspecting you'll go to certain sites like XYZ and then monitor those endpoints. If they think you use a particular site, it suggests they already know what you're doing. Or they might be mistaken and won't find anything.
J
jorgen9
06-28-2023, 11:56 AM #11

I'm trying to reduce my paranoia. I knew about the correlation, but I was deliberately avoiding it. If someone is really focusing on TOR correlation, they must be looking into me for something and gathering proof.

To clarify further: when an attacker checks specific network spots to validate a theory, they're likely suspecting you'll go to certain sites like XYZ and then monitor those endpoints. If they think you use a particular site, it suggests they already know what you're doing. Or they might be mistaken and won't find anything.

Pages (2): Previous 1 2