The Art of Deception: Why the Tor mainland is banned, why Russia and the United States are on the list of vulnerabilities

                                                  our country crack down the tor

Tor (The Onion Router) is an abbreviation for onion, which is to better protect user information. However, it also provides convenience for criminals, terrorist attacks, etc., but recently, various college students have been accused of leaking information. Cause telecommunication "fraud"
? ? ? ? The success of the deception is undoubtedly a wake-up call for us. How exactly is our information leaked?
===================================================== ========================
[Graphic]:
A====O====O========O=== ===="B
is sent from A to B. On the way, it has to pass through many nodes, that is, routers. Each router can intercept your information. to make a payment or something. So if we do not log in to Alipay or WeChat account after connecting to this kind of WiFi, does it mean that it is safe? Not really. Once some such WiFi with traps is connected, it will simulate an APP account to log in to the corresponding APP program in your mobile phone, that is to say, even if you do not log in Alipay or WeChat, the power behind the WiFi you are linking has The ability to log in to your accounts on your phone without you even knowing it.
So how does TOR process user information? Each node is encrypted, layer by layer until it is sent to the receiver, and the receiver peels it layer by layer like an onion. Therefore, many foreign software now use tor to encrypt.
[Everything has two sides]: Although the use of tor guarantees the security of user information to a large extent, it also brings some security risks, which cannot be traced, disseminate terrorist information, and encryption of each node is very troublesome. As a country , unable to control the movements of citizens, is undoubtedly very dangerous to the country, so China cracked down on tor in the past few decades.
=========================== ================================================
[Exploitation] Exploit There are many cases of computer loopholes breaking the law, so all the bigwigs are rewarding a considerable amount of dollars to reward loophole discoverers. Windows rewards $100,000 for a bug. In recent years, the vulnerability reports of various countries and the heat map of attacks are as follows:
The darkest and reddest color indicates the most attacked.





Undoubtedly, the United States and Russia have been attacked the most. In fact, it is because these two countries are at odds. Today, the United States found in the local software that there were loopholes in the Russian app to steal secrets or something. Tomorrow, the Russian software in the United States will be used. What bugs were found in it.
In South America, where the economy is not yet developed, such as Mexico, our teachers basically did not have the Internet. The mobile phone cards bought cannot be connected to the Internet, so it is understandable that there are fewer loopholes.

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=327017622&siteId=291194637