fe.settings:getUserBoardSettings - non array given[kc] - Endchan Magrathea
thumbnail of e412eee52ed37a9952f01bb6cd25bd2d.jpg
thumbnail of e412eee52ed37a9952f01bb6cd25bd2d.jpg
e412eee52ed37a9952f01... jpg
(150.4 KB, 1200x800)
 >>/19627/
> Redbull me on Tor.

USA MIIIC-originated software supposedly to anonymize network data.There are a few theories about the true purpose of TOR after release outside us miiiiic circles. an interesting one is that usa wanted a method for segregating potentially "interesting" traffic from just regular internet kot and pr0n traffic, so they pushed this tor thing propagandizing it as the best countermeasure *against* prying eyes in order to get those interested in privacy to use it, the catch being that TOR is ineffective against a global adversarial observer, which of course the usa is, as snowden told us

> So it seems to me that it makes my traffic anonymous

depends on your anonymity requirements, iow on who your adversary is. More precisely it makes your traffic harder to follow and trace back to you

> by redirecting it through nodes (proxies)

correct, 3 nodes in standard configuration

> and applying https encryption.

not quite
tls (the encryption system used in https) is a standard with several versions and a large number of {en,de}cryption mechanisms (ciphersuites) the internode encryption in tor is related to that in tls but is singular, old, and significantly worse than the best tls can offer today

> But physically my traffic goes through whatever infrastructure Hungary has

naturally

> and there will be one device before it leaves the country

correct (assuming it leaves the country at all)

> and where they can just sniff my shit out of the tube and capture my traffic easy peasy. Isn't this make it somewhat pointless?

Your traffic will leave your computer (technically your configured tor node client software, normally running locally in your computer) already encrypted three times over (once for each node in your chosen tor circuit) additionally, the connection to your final target destination may be encrypted as well, so that will add a fourth layer of encryption (for example, when visiting an https site over TOR)
Whether Hungary can [pay for enough farms/quantumcomputerslol to] crack that is another question.