How can computer forensics experts catch hackers who use VPN and Tor to mask their identity/location? For example, when North Korea hacked Sony how did they know it was NK?

VPN and Tor are based on client - server model.

They form a network where there are large number of nodes capable of communication in one direction (clients) and a small number of nodes capable of communicating in 2 directions (servers).

The vulnerable points in this model are the small number of 2 directional nodes. Some VPN and all Tor services rely on volunteer 2 dir. node providers.

Some of these nodes may be government run which allows tracing of activity…

Project home               Q&A home

    Send us an email        Instagram - Decentralized Web        Twitter - Decentralized Web        Telegram - Decentralized Web        Tik-tok - Decentralized Web

Go To Top               Become a User - start getting rewards