>>ZY3BBVFF (OP) tor is still secure despite the fact that it's made by le pozz
tech is heck
why do people still use tor?
>>D0QR8CFM it's not even run by just the military any more. all the nodes are public, why should I be scared when I can see where my network can be routed through. obviously yes lokinet, i2p, etc are all going to be better, but tor is still a good network
>>fg-MCR1JB00 i admit that the js is what set me off, the rest was just nitpicking but i still stand by my heuristic, if they think an unusable website without js enabled is acceptable, who knows what sort of other bullshit they are also okay with doing
>>TE76FKAB restructuring the modern web standards with a better front end scripting language would be ideal ((((or just yknow, not using a scripting language because in 99% of cases it's literally fucking pointless because devs are lazy and useless)
>>fg-FOPQ581F i choose apathy, i'd rather go all in on the technological abyss presented by the web than to pretend one can avoid it forever. the web is dead, google owns it, there is no future in which the web can be anonymous. you can't remain ignorant forever. >inb4 "but we can still fix the web" lolno
>>YMP2YNWF lose the defeatist attitude anon resist your overlord, just for the sake of resistance show them you are just some cattle ripe for the taking show them that if you want to enslave you they will have to fight for it even if you lose your freedom, you don't also have to forfeit your dignity they have nothing but contempt for you, why not retribute in kind? do not stay complacent, be defiant, become indomitable
>>MVIO4CJG ah sorry, i misunderstood you, i thought you were saying to just give up and cope with the current state of the web yeah, we can create alternatives, we already have alternatives protocols and even http itself can still be used if javashit is ditched. serving static html with a sprinkle of css to pretty it up is how the web was meant to be personally i am in favor of abandoning the clearnet entirely. leave it to the normies, we can use overlay networks for our shitposting businesses
>Is Tor anonymous? >[idiot] was caught using Tor, it is unsafe! >Tor is funded by the feds. Funding must mean it's backdoored. >Tor is not a perfect solution, so don't bother protecting yourself. Tor works by using onion routing to proxy your traffic through three (or more) volunteer nodes, with one layer of encryption for each node used in a connection. Every connection uses a set of nodes (circuit) randomly chosen by the user. Tor does not: - mandate or incentivize users to act as relays - employ dummy traffic - introduce intentional latency - mix packets together to be sent out in unpredictable orders - pad the size of packets, except for aspects of hidden services - use unidrectional tunnels, or change tunnels ("circuits") unless the user wishes it Also note that Tor: - has a centralized list of routers - does not have a very diverse set of relays (many are hosted in Europe, especially Germany) Clearly, the intention of Tor, in implementing LLARP (Low Latency Anonymous Routing Protocol), is to be blazing fast while preserving user privacy, and anonymity against most adversaries. It excels at this. How can you be deanonymized when using Tor as a normal user (non-relay)? There are various methods to do so, but the most prominent are the following: - Timing attacks / traffic shape correlation attacks - Attacks on traffic exiting the network (MITM techniques) - Protocol data leakage (browser metadata, p2p such as bittorrent, etc) - OPSEC failure (humans interacting with other humans, DON'T) Operations security is easy if you have a basic level of intelligence, and you should avoid usage of anything but the Tor Browser Bundle unless you actually know what you are doing, so as to not leak metadata.
>>7YQHL921 The most powerful method at the disposal of the feds is the Timing Attack. Global adversaries such as the NSA and its allied spying agencies log every single byte that goes through the internet backbone, through almost every ISP, in the West, and stores it for years. This means that they can observe when traffic entered the network, when similarly-sized traffic exited the network, and thus infer what entities are communicating with each other, and can deanonymize you. It may take several time intervals to deanonymize you with this technique, depending on the circumstances. Minutes, or perhaps fractions of a minute, at best. A few factors can work in your favor: - High traffic to a website. If there are many connections going to, say, DuckDuckGo.com, and you do your browsing as quickly as possible, it is likely impossible to determine that you did this, because there are so many other users using it as well. - High latency. Specifically, if more nodes are used in your circuit, it must take longer to deanonymize you, mathematically speaking. - Use of hidden services. Tor employs a number of additional protections to hidden services, and needs to know the address of a service to even attempt to deanonymize it through DoS attacks. When using one, your traffic will go through at least six relays, and your traffic does not exit the Tor network, either. This makes deanonymization of the users of hidden services extremely difficult and unlikely, especially if they switch circuits often and have good practices. The server hosts are more at risk here, their true IPs are usually found within months if they are high profile enough.
>>H1HQUAZB Conclusion: While Tor can provide Anonymity some of the time, it is not sufficient to protect user metadata from the multi-billion dollar might of world intelligence agencies. All the same, why not use it? You protect your privacy, drastically reducing the power of governments and corporations to influence human behavior, and can be anonymous if you put in some effort, especially if sticking to communication within the network. There is no reason not to use Tor- perfection is the enemy of the good. If you want something better that solves almost all of the problems listed above, try I2P instead. Or better yet, in the future consider the Nym network, which includes global adversaries in its thread model, while still experimental, has received millions in funding recently, and will be a great alternative to Tor.
>>58XUMELU >Nym A "privacy platform" that uses Telegram is a little off putting. If its just for the testnet then I can understand, but if the telegram bot is still needed to link your node to a wallet address come mainnet launch then that would be kind of retarded.
>>fg-HUD33QNZ I got..... very tired of seeing the same thread every day. >>fg-H21Z20ED I did find it odd that they opted to use Telegram for some comms. However, they are probably opting for wider reach here. Unlike the developers of, say, I2P, they are not anonymous, so using their identities to interface with the public in some fashion is probably fine. I highly doubt they are NOT aware of the faults of telegram, considering the nature of his project, and how adamant he is about privacy by design.