



"You can get people on Tor in a variety of ways. You could do a time attack, which involves catching traffic between relays. You could also do entry and exit node monitoring, which involves dropping a zero-day on the actual machine accessing Tor or hosting an exit node and monitoring what's going in or out of it." he added

After the leaks of the Edward Snowden and many news headlines of the National Surveillance Program by US NSA , many of the internet users, business and government agencies have opted using the anonymity browser "TOR" to keep their sensitive information away from the intelligence agencies' hands and that of anyone else who'd like to steal it.Founder of the Cybercrime Security Forum and Microsoft MVP, Andy Malone, warns that using Tor does not guarantee the information you're trying to keep hidden won't be compromised.At Microsoft TechEd North America 2014, Malone says "There is no such thing as really being anonymous on the internet. If hackers and government agencies want you, they will get you,"Malone's have presented a slides that gives the all the details on this. He also added that there are further more attacks can be performed on TOR network like intersection, DDOS.Malone's says that TOR security haven't broken till yet, but attacker can get into it via third party apps or addons. Malone's warns the users by saying that the NSA and the GCHQ are installing hundreds of Onion Routers in order to capture and analyze traffic. If they visit the Deep Web, they should also know that among the different websites there are also honeypot ones created by law enforcement agencies to catch criminals.Lastly Malone's guided a users on how to use the TOR and how to be anonymous on the internet and a alternative solution to keep privacy online.