I think it depends on your usecase. Tor is normie tech. My whole family runs it in the background. It's good. But if you are not using onion addresses it is compromised. You need to exclude spy nodes from Germany and Netherlands that make up >50% of the network and unfortunately they provide the highest speed. Use it as much as you can. Ask people to provide you with onion addresses! Then people in opppresive regimes should look into v2ray. And in general I'd recommend a VPN on your router to separate ISP from your Tor usage patterns. Finally you could even use i2p on top of Tor. It has less shortcomings and it's only issue are low speeds because usage is still low, but it's preferable if you want higher degrees of anonymity.

Replies (2)

Scoundrel's avatar
Scoundrel 2 months ago
Your family sounds based. Even if 50% of Tor nodes were run by the same organization, and even if that organization attempted to deanonymize them, that would still result in only 13% of 3 hop Tor circuits allowing users to be deanonymized. If you are really worried then your push should be to increase the number of hops in Tor circuits. Trying to identify and exclude nodes you think might be malicious is completely misunderstanding how Tor provides anonymity to its users. What grows faster? 2^x or x^2? But I have yet to see convincing evidence that ANYONE is capable of tracing Tor circuits, especially with the most up to date version of the software. I would like to hear where you are getting your information from, if you don't kind sharing. I don't have time to say more.
You are right in general in regards to (not) exclude certain nodes, but because there is ? a speed component to the circuits, one often ends up with servers from Germany and Netherlands only. Onion links have 6 hops by default. Timing attacks are a thing. That's why it is good to have a router VPN between you and Tor.