Suppose that a hacker belongs to Country A and he/she sells hacked data of the citizens of Country B on deep/darkweb. Will he/she be charged for anything in his/her native country?
I don’t think so. People who sell such things are usually pretty anonymous/untraceable. Ofc, there are exceptions. Some people got caught. (“How Tor Users Got Caught - Defcon 22” https://youtu.be/7G1LjQSYM5Q). Please correct me if I am wrong.
Didn’t got that line: hack out of the country they live in. Does it means that they hack other countries data and not their country?
Yes majority prefer hacking other countries. See if you can find the book “How To Hack Like A Porn Star” It is filled with good info.
don’t do illegal stuff and no worries about men in black suits at your door
many choices in life, just accept the consiquences
It is not as simple as that. First of all there is the question of what kind of relationship the two countries have. If they have extradition treaties, and do they have a program that cooperate on cyber crime? For example if someone from the 14 eyes (google it… countries that cooperate and share the data of their citizens) hack one another you will be extradited to that country. If there is a treaty again there is a possibility of extradition. For example all hacking actions (failed or successfull) towards the US are not punishable (hence a lot of shells and vps are from russia). As MrGFY said dont do anything illegal, but do be informed on how international law works to some extent.
Most of people dosent caught but some time
Bad exit nodes can cause trouble cuz the people
Who has a controls of these nodes can read and leak user intel
What are bad exit nodes? Can it be used to track a user behind Tor or something else? How do people control them?
@D4rkhunt3r Some government agencies are known to setup ToR nodes/servers and phish info on its users. Always use a VPN with ToR if you want to remain anonymous. Its great practice to use a VPN all the time.
Oe compromised exit nodes. In general hacking through Tor would be considered a bad idea. On a theoretical level always, I would recommend: 1) Use a conneciton that has nothing to do with you (a public wifi, an anonymous sim card a weird lan cable that somehow ended up at your laptop. 2) Have a separate system for any hacking activities (which I would not recommend of course) 3) Buy a VPN from a compnay that is not based in one of the countries that are members of the 14 eyes 4)Use a cryptocurrency to buy that VPN from a cryptocurrency ATM using CASH. 5) Never mix and match your hacking system with your regular network. Ever. Finally DO NOT log on to your regular accounts (gmail, facebook, instagram and so on) using this specific system OR network. You will leave a footprint and depending on your actions (which again I DO NOT recommend) could be traced back to you. Did I just hand out Anonymity 101?
Thank you for your answer. It is very informative.
But if You use a VPN be aware, that you always will have an Open entry/exit Node.
" What we don’t want
Some users have requested support for VPNs in Tails to “improve” Tor’s anonymity. You know, more hops must be better, right?. That’s just incorrect – if anything VPNs make the situation worse since they basically introduce either a permanent entry guard (if the VPN is set up before Tor) or a permanent exit node (if the VPN is accessed through Tor).
Similarly, we don’t want to support VPNs as a replacement for Tor since that provides terrible anonymity and hence isn’t compatible with Tails’ goal." (Source: https://tails.boum.org/blueprint/vpn_support/)
in this link u send video is not available in youtube
The video got taken down for some reason. Here is another link https://youtu.be/tlxmUfnpr8w