Question on networking - Who can see who..?

KingNeil1

Solid State Member
Messages
14
Location
uk
I have a question... I have shown it in an image:

q0OToJz.png


Main router => Tor computer will be a wireless connection.

Tor computer => laptop will be ethernet.. and the laptop has NO WiFi, ONLY ethernet.
 
Alright.
I came to the conclusion that this is all a waste of time.

A hacker (especially nation state) would hack your main home router.

Then hack your endpoint laptop.

Then they can see that both are connected to a dedicated Tor router in the middle, through its MAC address or other identifier, such as device name.

So they can see that both are connected to the same dedicated Tor router, and thus, they can see who you are that way.

So unless you are confident that you can secure your main home router, then this idea of a dedicated Tor router is hopeless.

You would be better off using a QUBES live disc and ONLY use Tor from the very start.

As the internal NSA Snowden documents say, "one page request" is all it takes to hack you.. but note, they can only do this page request if you are actually connecting via your real IP address.

Therefore, use a QUBES live disc, use TOR ONLY (never mix it up with clearnet), and make sure your BIOS is freshly installed, and then just cross your fingers and hope you don't get hacked while using Tor browser. By all means, use NoScript etc.
 
Alright.
I came to the conclusion that this is all a waste of time.

A hacker (especially nation state) would hack your main home router.
How? There's no magic vulnerabilities sitting in these things (unless you're running old firmware, have an insecure password, or both.)
Then hack your endpoint laptop.
Again, someone can't just magically hack into a laptop if they're a skilled hacker - that's a complete misconception. Unless you're running OS / software with known exploits, there's not much they can do here either.
Then they can see that both are connected to a dedicated Tor router in the middle, through its MAC address or other identifier, such as device name.

So they can see that both are connected to the same dedicated Tor router, and thus, they can see who you are that way.

So unless you are confident that you can secure your main home router, then this idea of a dedicated Tor router is hopeless.

You would be better off using a QUBES live disc and ONLY use Tor from the very start.
If they've managed to get this far, then of course whatever you do is hopeless - but this isn't a default situation, you'd have to have some major holes in more than one aspect of your networking setup for them to get this far.
As the internal NSA Snowden documents say, "one page request" is all it takes to hack you.. but note, they can only do this page request if you are actually connecting via your real IP address.
Sure, some attacks would only require one request, but you'd still need scanning / investigation to see exactly what attacks would be feasible.
Therefore, use a QUBES live disc, use TOR ONLY (never mix it up with clearnet), and make sure your BIOS is freshly installed, and then just cross your fingers and hope you don't get hacked while using Tor browser. By all means, use NoScript etc.
BIOS is freshly installed? Eh? And noscript? (Javascript exploits do exist, but they're few and far between these days and generally don't offer anywhere near the level of privilege escalation that you're alluding to.)
 
Back
Top Bottom