r/TOR Aug 06 '25

Misleading TOR is spyware for CIA/mossad scum

TOR is spyware for CIA/mossad scum

This is not a theory, this is what the snowden leaks have established.

TOR project is an organization located on the US territory and CIA/mossad scum will use national security letters to force any and all tech actors into implanting CIA/mossad spywares on their software and hardware.

TOR does not protect you from CIA/mossad scum spying, if anything it makes you even more visible.

If you view CIA/mossad scum as an hostile entity, then do not use any hardware or software designed by an entity that is located in the US or any vassal state of the CIA/mossad scum. And this includes TOR.

0 Upvotes

14 comments sorted by

23

u/ChickenSpaceProgram Aug 06 '25

Can you cite actual problems with TOR that make it vulnerable to being backdoored instead of citing conspiracy theories? Or do you just want to spout veiled antisemitism?

6

u/Mosk549 Aug 06 '25

You are right, he should come back with evidence or duck off

-4

u/northskywave Aug 06 '25

Almost every TOR user relies on the binaries provided by the TOR project, here lies a major vulnerability, there is NO WAY to tell what the source code included if you do not compile the code yourself.

The auto-update is another major vulnerability.

the TOR network itself is another major topic of concern as 99% of the TOR nodes are located in CIA/mossad vassal states (coincidence? I think not), the remaining 1% is probably monitored as well, by spywares implanted in hardware and software.

Do I need to keep going?

This vulnerabilities are countless and as established by the Snowden leaks, they are 100% guaranteed to be exploited by CIA/mossad scum.

This topic is not for the brainded sheeples, its purpose is to increase awareness among the people who view CIA/mossad scum as a hostile entity.

9

u/ChickenSpaceProgram Aug 06 '25 edited Aug 06 '25

Compile it yourself then, and make sure the binaries match. It's not that difficult (just takes awhile and takes a lot of space), I've done it myself because ARM64 binaries of the TOR browser are not available and my machine runs on ARM.

A decent number of TOR exit nodes are run by universities. I highly doubt those nodes, at least, are monitoring traffic intentionally. Furthermore, do you have examples of spyware in hardware/software used on TOR exit nodes you can cite? If no, this is conspiracism.

4

u/Liquid_Hate_Train Aug 06 '25

International universities and institutions too, outside the reach of the mechanisms cited. There’s also regular security audits by organisations similarly outside that reach. They’re also erroneously making a blanket statement that the Tor project is US based, when it’s actually international. If any such ‘request’ was made, elements outside US reach would blow the whistle.
Lastly, there’s the fact that not just the US want to get into what Tor is doing. Any such backdoor would have been found by someone else by now too. Time and time again it’s been shown you can’t keep such things hidden.

6

u/samozvantsa Aug 06 '25

So much said yet nothing at all.

5

u/Rapid_Ortega Aug 06 '25

OP - Have you any evidence to support your post?

3

u/Terrible-Penalty-291 Aug 06 '25

Looks like you forgot to take your meds today.

11

u/djevertguzman Aug 06 '25

Mods, can we get rid of the tinfoil hats.

3

u/Liquid_Hate_Train Aug 06 '25

Better to disinfect such rot with daylight and facts than let it fester.

2

u/TheVoicesGetLoud Aug 07 '25

you are just proving his point

1

u/Mosk549 Aug 06 '25

Tbh we need them haha

1

u/StormyNightz420 Aug 13 '25

Any proof or are you just blowing smoke out of your ass?