Hacking is probably the most effective method of exposing the true identities by way of IP addresses.

Hacking must be done with the proper court order.
Do not attempt it otherwise!

Download the transcript:

Do NOT rent a hacker from the DarkNet!

  • Tagging Attacks: This is a method of attacking the TOR which is done by modifying data. Data within TOR relays can be modified when someone controls the first (entry) relay and the last (exit) relay in the TOR network. When an attacker modifies data being sent back and forth they are able to modify the data with a specific tag which can work like a cyber fingerprint and can be observed passing through the relays. Again this method does not de-crypt data; rather, it identifies participants involved in the communication.
  • Man In The Middle (MITM): A Man In The Middle attack is a form of cyber attack where an eavesdropping individual will impersonate each side of a conversation between two parties within the conversation. The eavesdropper will impersonate both parties in order to intercept, send, and receive data meant for the other parties. Often times, the legitimate parties have no knowledge of the attack or find out after sensitive material has already been sent.

PLEASE CHECK WITH YOUR LOCAL PROSECUTOR’S OFFICE OR LEGAL COUNSEL PRIOR TO CONDUCTING MITM OPERATIONS; IN MOST STATES THIS IS CONSIDERED WIRETAPPING.

  • End to End Correlation Attack: An End to End Correlation Attack is when an attacker is able to monitor each end of a communication data channel or a TOR relay. When the attacker knows the times of incoming and outgoing data as well as its size, the attacker is able to see to whom you are communicating. The more TOR relays the attacker has access to, the higher they degree of accuracy he or she will have. When the attacker successfully conducts a correlation attack, the content of the message is not compromised. The anonymity of where the message is coming from and to whom it is going is, however, compromised.