Your fact-checks

Your fact-checks will appear here

factually
Support us
  • Home
  • Politics
  • Business
  • Society
  • Technology
  • Health
  • Science
  • Entertainment
Index/Topics/Operation Onymous

Operation Onymous

A historical operation that prompted debate about how servers and operators were located, involving technical attacks, informants, hosting errors, or cross-jurisdiction policing.

Fact-Checks

3 results
Feb 2, 2026

How do law enforcement agencies de-anonymize TOR users and how often is it successful?

Law enforcement de-anonymizes Tor users through a mix of traffic-analysis/timing correlation, compromising relays or endpoints (including malware or misconfigured hidden services), and traditional inv...

Jan 10, 2026

What legal authorities and court orders have law enforcement used 2020–2025 to justify deanonymization of Tor hidden services?

Public reporting and academic research reviewed here show that between 2020–2025 investigators still relied on traditional law‑enforcement tools—subpoenas, search warrants and court‑authorized forensi...

Jan 6, 2026

Which documented deanonymization techniques have led to arrests of Tor users?

Law enforcement prosecutions of people who used Tor have relied on a mix of technical traffic-analysis methods and traditional police tradecraft rather than a single magic bullet: published reports an...

About
Blog
Contact
FAQ
Terms & ConditionsTerms
Privacy PolicyPrivacy
Manage data