Recent comments in /f/Tor

cumlord wrote

Pretty much. tor is comparatively centralized and a lot more high profile than i2p. Fingerprinting is the thing that scares me the most, there's lots of identifiable metrics. Also instructive to look at how people have gotten deanon in the past but it doesn't anticipate the future or current capabilities. I'd think they'd spend the most energy targeting or trying to compromise high value targets/individuals like marketplaces/admins for the intel they could attain over a long period and we would be none the wiser. even if they don't have a big picture view of everything right now there's lots of tools that can be used to focus in on something of interest. I guess a good defense is to not be of interest.

1

Saint_Cuthbert OP wrote

There are only some odd-thousand tor nodes out there. For a powerful adversary to run many of them doesn't seem too unbelievable (50 cent army). They may not be able to hire someone to watch each and every node al the time, but they could possibly automate the process with artificial intelligence.

The Whonix documentation discusses how Tor users can be fingerprinted by their typing speed, among other things. And remember that it wasn't public knowledge that emails and phone calls could be tracked on a large scale until somewhat recently. In The Art of War is says to make your enemy think that you're weak when you're strong and strong when you're weak.

2

cumlord wrote

I've always assumed that it's monitored to some degree. Not like all tor users can be monitored clearly at all times, but from the aspect that running tor doesn't make you nsa proof. nothing does, but it does a good job at making you blend in, so when i want to look like everyone else and not do something identifiable, tor doesn't seem so bad. i think that's probably it's best use case, when what you chose to do with it would be like a needle in a haystack identifying you, but it can't correct for user error.

good to see new people interested in this kind of stuff even if they show you they just logged into their bank account with tor. they got the right spirit i guess.

2

NotQball wrote

The Official router does block through TOR traffic. It is an OK decision since it is an entry level router. I rarely test that version. The truth is that you do not want a lot of traffic over 30% (varies depending on conditions) through slower networks: satellite, ygg, flokinet some cell, modems, some VPNs. It does help with security but at a cost. Don't be stupid... in theory some entry guard may be able to block you unless you use your own servers. Again: If your threat model dictates it don't hesitate!

1

NotQball wrote

I did NOT monitor TOR the same way as i2p. There are some obvious "concessions"/sell-outs. I do NOT want to open THAT can of worms. What is obvious:

  1. Bad crappers: some entry guards and some exit nodes. These guys sell your data even from browsing ebay and Amazon. That desperate.
  2. In MY OPINION Tor Browser is mediocre...
  3. If you run YOUR OWN Tor servers and i2p routers (plural), despite of what you heard, SOME i2p traffic through Tor will help you out with TOR. You NEED 2 KNOW what you are doing on both networks and have some monitoring tools. This is for people in dire situations with enough knowledge of both networks. It is more of a problem for i2p than TOR. Don't make me sorry that I brought it up!
1

9995Deluxe wrote

If you are using the Tor Browser Bundle and have set DuckDuckGoOnion as your default search engine, it still uses the v2 URL. It looks like they will switch this to the v3 onion once the v2 onion goes offline.

1

Rambler wrote (edited )

Reply to comment by sitefights in Raddle v3 onion by sitefights

Why are they hard on RAMBLE?

Something to do with me having insensitive humor and me possessing the radical belief in free speech, even speech promoting ideas that I disagree with.

We have a lot more in common than we have in our differences, the main difference is that I don't believe speech needs strict regulation and I don't jump to conclusions about someone's deeply rooted political and personal beliefs based on insignificant online interactions.

With that said, they've got a decent site. Like said over there: they do their thing and we do ours. Nothing to bicker over. A lot of the members here would get banned there, and a lot of the members there would scoff at some of the content here and not return after experiencing an unsavory exchange.

No big deal.

4

sitefights OP wrote

Reply to comment by Rambler in Raddle v3 onion by sitefights

If I find a user of what I made, I'll be glad and kind to the user. Why are they hard on RAMBLE? Btw I'm having fun with fights between them and RAMBLE a bit. Just a bit.

3

Rambler wrote (edited )

They'll delete that post and ban you as soon as Zig or Emma comes online since it mentions this site, by the way.

Good to see them upgrade to V3, though.

The software that powers this site was made for that site, by the way. In case you didn't know.

1

AWiggerInTime wrote (edited )

Finally. They had that v2 onion for years and couldn't be bothered to flip that one switch to make it v3.

Does it even work? I stopped using the v2 onion after it died for like a year or something.

3

BlackWinnerYoshi wrote

Well, reddit over VPN probably works better, unlike 4chan, which doesn't work over Tor, VPN, proxies, or whatever. But still, if you can, delete your reddit account. And uhh, don't be like me, who had to make a second reddit account just because I screwed up my phone, somehow, and I had to factory reset it, therefore losing my two-factor authentication codes. And if you're an EU citizen, make sure you don't use the normal deactivation process. Make sure to back up 2FA!

1

boobs wrote

this seems like the opposite of what is needed. instead of making an actually secure and decentralized human readable name system they are falling back to the x509 ca cabal money printer.

3