The Problems With Anonymity

CSAM: Child Sexual Abuse Material
TOR: The Onion Router 

I and almost everyone want to be “Anonymous,” but I don’t think we’ve stopped to think should we be anonymous. I fight for anonymity from the government and corporate conglomerates because surface-level keeping all of your shit private from those entities sounds like a win-win. But when you move from moral to immoral privacy, you start to change your tune.

Tor.

If you think that your browser is private wait until you use Tor. This browser poses a serious dilemma, Because not only is it Anonymous, but it is Untraceable, When you close the browser it wipes all of the data clean as if you never did anything. With untraceable anonymity comes crime, Mainly the “Dark Web.” In most cases, you won’t end up on the dark web unless you’re looking for it, but you will reach the “Deep Web.” Tor allows you to reach a TLD that you can’t reach on any other browser called .onion (because onions have layers and so does the internet). Just by me going onto the deep web I was already able to find Cocaine, Heroin, LSD, MDMA, and Meth. But hard drugs aren’t the worst thing you will find, I’m talking about CSAM, untraceable anonymity brings out the worst in our society, including sexual predators who don’t want to get caught.

In my opinion, Tor is a dangerous tool that is mainly used by criminals.

But all is not bad Numerous, Tor-related services have shut down recently, including but not limited to Anonfiles and Bayfiles. These sites were used heavily to distribute Child pornography. Some other sites require investigation by a government entity, like send.cm, uptobox.com, nippyspace.com, filescase.biz, firestorage.jp, and upload.ee. I have verified with my sources that these sites are currently allowing child pornography to not only be uploaded but also be downloaded, This is most likely unknown to them, but for some, it is very well known but not being dealt with swiftly like it should be.

One of the main hosting providers for Tor sites (<Lolek> Hosted) was raided and seized, It has been verified that they hosted many servers for sites that were distributing CSAM.

I am the creator of the worst. Gal on the brink of a mental breakdown trying to hold it together. Join me as I riot!

4 Remarks on “The Problems With Anonymity

    1. Great question, I Guess I could’ve explained it, it’s very simple to bypass CSAM detectors when it comes to temporary file-sharing sites, This can be done in a few ways. The main way is a password-protected archive, like a .zip, or .7z and when setting a password they pick something complex so it cant be easily decrypted.
      Real-world example d_BQACAgUAAxkBEEerJmTVz4k_yxzxKNL_XIwWrQwNQduZAAJuCgAClYupVmS9_SmqYmPOMAQ
      Another way is with GPG file encryption this is most uncommon but still has been seen in the wild.
      Hope this clears that up.

  1. 我之所以使用 Tor,是因为我国政府对这里的互联网进行审查,我同意有些坏人会使用 Tor,但它对那些身处禁区的人来说非常有用。
    不过,除了我对 Tor 的看法之外,这篇文章还很好地揭露了网络上的剥削行为,并批评了参与其中的网站。
    一切顺利。

    附注:我使用 Tor 阅读和评论本网站 XD

    English Translation

    I use Tor because my government censors the internet here, and I agree that there are some bad people who use Tor, but it’s very useful for those who are in restricted areas.

    However, in addition to my thoughts on Tor, this article does a good job of exposing exploitation on the web and criticizing the sites that participate in it.
    All the best.

    P.S. I use Tor to read and comment on this site XD

    1. 感谢您的赞誉,对于受到政府审查的人来说,Tor 是一个非常有用的工具。

      我希望今后能发表更多这样的文章,只是发表这些文章很危险。

      English Translation

      Thank you for the kind words, Tor is a very useful tool for people censored by the government.

      I would like to make more of these posts in the future, they are just dangerous to make.

Leave a Reply to Gray Cancel reply

All comments are manually reviewed and moderated.
Required fields are marked *


By commenting, you consent to our Privacy Policy
Back To Top
Skip to content