Re: What? you mean
@Dazed
The article is quite easy to understand, Cynic_999 is perfectly correct (about the IP stuff, rather than door busting). I hope you weren't the one to downvote him, seems unfair.
I also find it odd that you don't think someone knowing your name, address and phone number would be a problem for someone using Tor... but that is only possible if you're using a fixed IP and you have a domain registered under your own details and they do a reverse lookup first.... but I'm going off track.
Let's see:
- Tor browser arrives at webpage which serves a WMV
- Browser attempts to launch WMV
- Windows Chooses your default player
- Player checks for DRM
- DRM is there, Player checks for validity
- Yep, valid and signed by Microsoft, player fetches license key from the content producer server without popping up a warning [HINT: this is how you get identified]
And, to state the obvious:
- Player then requests content producer uri
- Player is not using Tor
- URI request goes out through the router in the same way as normal internet traffic (if you've got a VPN configured on your router then at least you're partially hidden (not from TLAs though))
- Content provider server receives request, and as per normal in a TCP session, gets your public facing IP so it can talk to you
- Ta Dah - Your Public IP is now known - you may or may not be totally fucked - depending on who the content producer is.
Bit of a problem for most people using Tor:
If it's a TLA - prepare for APTs, social engineering or the old fashioned plod shakedowns;
If it's something illegal, prepare to be arrested (whether or not we're talking Iran vs N Korea vs 'legal highs')
Hope that's cleared it up for you
:)