How does Facebook extract location data off a PC?

nimitbhardwaj

Disciple
Sep 23, 2010
226
21
36
New Delhi
Forgive me for being naive. But I still do not understand how a user hopping on an exit node can be compromised. All his traffic is relayed through another machine which is part of a secluded / isolated system. Only the end-point sees the web. Internally everything is opaque.
If the end-point is compromised, there are ways to trace it back to you. Like the JavaScript exploit which was believed to be used by FBI. The point is, even if you find the best available anonymity methods, if you are doing something that would attract the attention of a national government, those methods will only delay your eventual deanonimization. Anyone with the capability of enlisting the help of large national or international telecommunication companies will find you in hours.

So you are 100% anonymous if you are doing your normal work because no one is bothering to trace you. But if you are engaged in something that might catch the attention of govt. institutions, they will find you.
Yes 100% anonymity is possible, how else are the terrorist and hacker groups functioning. But the question is how far would you go to keep yourself untraceable.
Check this out.
 
Last edited:
  • Like
Reactions: asingh

htnakirs

Disciple
Nov 26, 2007
76
13
72
Getting back on track....
Can anyone with access to a Dell N4110 check this phenomenon? We may have a superfish type situation on our hands.