For example, I downloaded Tor network and using it for illegal activities. Can my govt track me? Can US govt track me? I know it encrypts something but if I remember correct, FBI was able to find some Tor users before.
Note: illegal activities was for example. I'm not going to do anything illegal. I'm just planning to serve my instance with a onion address.
Short answer: In theory, pretty much anything you're doing on the modern internet can be traced back to you. It's just a question of how much effort, sophistication, and time someone's willing to invest in the tracing. Tor is a pretty high bar for them to clear, so it'll protect you against a pretty high bar of attempting to track you down -- but that's only true as long as you're not doing anything careless to compromise your own security, and it's pretty easy to do something careless (especially in the long term).
This DEFCON talk goes into a lot of the nitty-gritty details and reality. The speaker sold drugs on the dark web for quite a while, but eventually got caught and went to federal prison, so he knows both sides of it.
Maybe, parallel construction confuses the quality of ToR a bit. If I was a APT and compromised ToR I wouldn't want anyone to know, so i would use parallel construction to always have a non-ToR reason for a take down.
You should read the Tor foundation documentation before trusting your freedom to it.
You can be tracked on Tor, but the question is by who, and when. If you login to gmail over tor then google knows your using tor. If you access tor from your home computer then your isp knows your using tor.
If your threat model includes Advanced Persistent Threats at the nation state level, then they can do Cybill attacks and control enough nodes that they could track you.
What I meant with Signal fiasco is, they didn’t published server code for a year and the fact that they’re a US establishment. It’s not looking that bad but I’m not going to trust them anymore.
ToR was started by the US Navy and still gets funding from the navy every year. ToR is a tool used by the US for spooks and spook assets globally. The only reason it was made public was to generate enough noise to hide the spook talk.
So applying your logic means you shouldn't use ToR either.
I said "fiasco" because they did not share the backend server repo for a while and did not make any statement about it. Maybe a little overreaction than it should be. But for an app that promises privacy, it's kinda annoying.
On a serious note, if I'm not mistaken, most cases of Tor users identity being uncovered is via information the user either unintentionally leaving information public, or privately told another user, which was made public due to a betrayal or a security breach.
In most other cases involve security flaws in Tor clients not the network, again if I'm not mistaken.