Comment: The problem is it works too well

(See in situ)

In reply to comment: Are (see in situ)

The problem is it works too well

This is why they don't want us using it.

They use more traditional means to go after people who used Silk Road or (ugh) the pedos, specifically because the anonymity factor works and they can't use modern tracing to determine the identity of users anywhere near as easily. So they use plants, they track real-world items when they're shipped, all traditional investigation techniques.I highly doubt there's any sort of back door or magic encryption key they can use to just figure out the personal information of anyone who uses TOR. The worst they can do is run their own exit node (I'd be surprised if they didn't have multiple exit nodes), which being the last stop on the encryption train, knows every page that's visited by specific connections. Tracing those connections through the peer nodes however is undoubtedly painstaking, and more than likely not worth the effort when you can much more easily just have some guy infiltrate a pedo ring as a user, or convince an existing member to rat out the others.

So long as you turn off things in the packaged browser that can be used to identify you on-the-spot like javascript or later like cookies, you should be fine. The last line of defense though is discretion. If you're looking to use TOR to sell illegal items, you're going out of your way to make yourself a target, so you should expect to be targeted. You have a reasonable assurance to your anonymity, but it is not absolutely bulletproof. There's no guarantee that the person trying to buy from you isn't law enforcement.

As for torrent files, they are small enough that they can be transferred through the drip-drop slow TOR network without issue for sure. If anyone ever decided to put together an onion site that housed torrent downloads, it could absolutely work. Torrent sites don't need fancy graphics, plain text descriptions and an apt directory of the torrents they house is all there needs to be. A torrent client could even be able to use that site as a tracker so long as it's got some TOR functionality built into the client, as very little information needs to come directly from the trackers.

After that though, you're right back to having to use the standard web for the actual peer-to-peer transfers, but there's steps that people already take (turning off peer exchange, disallowing incoming legacy connections, forcing outgoing encryption) to make it less likely that they'll leave an IP footprint that media companies can use to find them.

So the bottom line with torrenting, even if we can one day soon use TOR to help, is still discretion. You take a chance every time you download something, so you should be prepared for the possible consequences regardless of anything you do to protect yourself further from the average downloader. These days downloaders are really only in trouble with their ISPs, it's the uploaders that're the big fish worth chasing for the content owners.

Forgot to mention that with TOR there's a button that will change your path through the network on-the-fly. It's there for a reason, use it!