There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

engadget.com

masterairmagic , to technology in Tesla sued for false advertising after allegedly exaggerating EV ranges / The proposed class action accuses Tesla of fraud

Tesla is synonymous with false advertesing and hype.

ChocoboRocket ,

You misspelled Elon Mush

some_guy ,

You misspelled “lying asshole”.

const_void , to technology in Tesla sued for false advertising after allegedly exaggerating EV ranges / The proposed class action accuses Tesla of fraud

Good. Fuck Elmo.

JeremyT , to moviesandtv in ‘Star Trek: Strange New Worlds’ breaks into song | Engadget

I don’t generally like musicals but that episode is an instant classic for me. 11/10

Burstar ,
@Burstar@lemmy.dbzer0.com avatar

I hate musicals mostly. I think the original Annie was the only one I liked (because I was a kid and didn’t know better :P). I find musicals are a sign that the writers are running out of ideas and it’s the last season but this episode blew my expectations all away. It felt like an episode with singing, and not singing to skate by for an episode.

ElectricAirship , to moviesandtv in ‘Star Trek: Strange New Worlds’ breaks into song | Engadget
@ElectricAirship@lemmy.dbzer0.com avatar

Love both musicals and Trek so this episode is an instant winner

Batbro , to moviesandtv in ‘Star Trek: Strange New Worlds’ breaks into song | Engadget

It’s much better than I thought it would be

AttackBunny , to aboringdystopia in Amazon is bringing its palm-based payments to all Whole Foods Market stores

It’s already in the local Whole Foods. I totally don’t trust it, and probably never will. At some point I’m sure they’ll make it impossible to shop anywhere without it but I plan to hold out indefinitely. No thanks.

SpaceToast ,

Time to start growing a garden!

AttackBunny ,

Already trying lol.

Boozilla ,
@Boozilla@lemmy.world avatar

Good for you. When I say I won’t use stuff like this my friends and family mock me for being paranoid. It’s disturbing how quickly people will just do something because it seems cool and/or convenient.

You can change your password if it gets compromised. You can’t change your bio-metrics. Once a digital version of your retina, fingerprint, palm print, whatever gets leaked…you’re screwed.

I know they claim these things are locked away in HSM devices, but I don’t care. You’re trusting every single engineer, coder, tester, and mid-level manager with access to these things. It’s a long chain of trust in the typical “rush it out the door” corporate environment.

Real security and QA are the last things on their minds when they develop this stuff.

Blamemeta , to technology in China considers limiting kids' smartphone time to two hours per day | Younger children would face even stricter terms.

Letting the goverenment be parents instead of the actual parents. Wasn’t this literally in 1984?

shapesandstuff , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

So when I first learned about TOR almost 10 years ago in uni, it was said to be compromised to a significant extent by secret services holding entry and exit nodes.

Is that not true anymore?

worfamerryman ,

I’ve hear something similar. I think I read that the US Air Force has a bunch of nodes or something.

Additionally I don’t really understand what I would use it for if I already have a vpn and how it might put me a risk of legal trouble if I’m using it and someone routes something bad through me while I’m using it…

I’m not even sure how to talk about it.

I am decently technical, I just don’t know this tech.

NateSwift ,

Disclaimer that I haven’t used Tor in a while, do your own research, etc

The US navy designed and open sourced the Tor network. If all the traffic meant to be anonymous was coming from the US navy it doesn’t work well as an anonymizer. There’s been various claims that they have backdoors over the years, but to my knowledge none have held water.

Unless you’re running an exit node (which requires different software than the Tor browser) other people’s traffic isn’t getting routed through you so you’re fine legally.

VPNs are not very good at protecting you from the websites or services you connect to. They’re best used to hide where you’re connecting to from your ISP. Modern fingerprinting using things like browsing habits, installed software, web browser size, cookies, etc is barely effected by VPNs and the Tor browser takes care of an minimizes lots of those tools.

The biggest issue for day to day use for me is how slow it is. Because your traffic is being routed through 3-5 nodes before getting to its destination overall speed and latency suffer a lot

worfamerryman ,

Thanks for summarizing this for me. I think I could just use a vpn and librewolf to accomplish what you are talking about with the tor browser.

Librewolf wipes everything once it’s closer and it pretty basic if you use the default settings.

Are people using it to casually browse Lemmy and stuff?

DestroyMegacorps ,

Theres also the mullvad browser which is just tor browser without the tor part

ReversalHatchery ,

I use librewolf, but for me the first thing to change was to do not delete things on exit. I’m looking for a better firefox, not a lighter tor browser

kent_eh ,

The biggest issue for day to day use for me is how slow it is. Because your traffic is being routed through 3-5 nodes before getting to its destination overall speed and latency suffer a lot

That’s why I never continued to use it after the times I experimented with Tor.

sudo ,

Modern fingerprinting using things like browsing habits, installed software, web browser size, cookies, etc is barely effected by VPNs and the Tor browser takes care of an minimizes lots of those tools.

But can’t you just spoof most of that if you really want to? If you’re putting in the effort to be concerned with anonymity.

dwindling7373 ,

Aren’t bridges meant to prevent that?

shapesandstuff ,

Iirc holding both the entry and exit of a routed connection, you can in theory match traffic going through, which would let you connect a user to the server/site they are connecting to. It might still be encrypted at that point, idk the details anymore.

itchy_lizard ,

No, bridges are meant to bypass censorship

seasonone OP ,

Most of the nodes are hosted by Tor Foundation itself

magmaus3 ,
@magmaus3@szmer.info avatar

[citation needed]

shapesandstuff ,

Is there any way to check that?

seasonone OP ,

Yup. You can check a lot of stat about a node on tor website. metrics.torproject.org

sugar_in_your_tea ,

If true, I’m not happy about that. I want lots of different owners so it’s harder to compromise the network by compromising a single entity.

cambionn ,
@cambionn@feddit.nl avatar

I also heared that bit about the secret service owning nodes a few years ago. It was trough a teacher that’s also really in the stuff outside of teaching, and has a network of non-teaching proffesionals in the field.

It’s something to keep in mind, at the very least. Tor already has some weaknesses anyways. You shouldn’t trust it blindly just because it’s Tor. If anything, I think it more has a false rep for how strong it is over struggling with a stigma.

shapesandstuff ,

It was pretty much the same context for me, yeah.

Opsec always applies

Gargari ,

Try i2p

shapesandstuff ,

Interesting, ty

krash ,

Compare and use the right service for your needs: geti2p.net/en/comparison/tor

itchy_lizard ,

I don’t think a single credible source has shown this to be a vulnerability. You’re talking about an attack that would cost, what, millions of dollars to run per day?

shapesandstuff ,

Dunno if it’s all that expensive when there are hundreds of nodes on several individual malicious networks confirmed …medium.com/how-malicious-tor-relays-are-exploiti…

itchy_lizard ,

You’d need much more than hundreds of nodes.

shapesandstuff ,

The graph tracks exit probability and the article speaks about the matter, especially what you’re referencing. Check it out.

brihuang95 , to games in Looks like the Xenomorph from Alien will be Dead by Daylight's next killer
@brihuang95@sopuli.xyz avatar

Can anyone speak on the state of this game? I’ve never been that curious about it but with all the additions of cult classic characters, I’m starting to get intrigued

l0v9ZU5Z , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

Actual legal risks and consequences don’t go away by applying wishful thinking.

deFrisselle ,
@deFrisselle@lemmy.sdf.org avatar

Which are what

CanadaPlus ,

Yeah, is this guy living in China?

ErgodicTangle ,

I am not sure what he’s hinting at. Just using Tor doesn’t bear any legal risks. Hosting an exit node is different, as depending on the country you might get into serious trouble if certain traffic goes through it.

TWeaK ,

Yes exactly, and I think there have been stories recently where the exit node host has been held liable for content that’s gone through it.Which is complete bullshit, but the unfortunate reality is that the legal system doesn’t need to understand technology to regulate it.

jarfil ,

It’s not bullshit. If A has proof your system launched an attack, or sent CSAM, to another system, but your only defense is “I let anyone use my system in that way”, then at the very least you’re an accomplice.

TWeaK ,

It is bullshit, because it puts the onus of policing everything on any service provider. If a TOR exit node provider is responsible for all traffic through their node, then an ISP is responsible for all traffic through them to their users - yet it is not reasonable for ISP’s to do this. Nor should it be acceptable by law and even less so if the purpose is for law enforcement to bypass the warrant system by having private parties do the investigation for them.

jarfil ,

Well, the law enforcement ship has sailed a long time ago, it’s more of a flotilla by now. Data communication service providers (including ISPs) have some customer identification and data retention requirements in exchange for immunity from the data itself, but otherwise —reasonabke or not— there are more and more traffic policing laws that get introduced for ISPs to abide. By starting a Tor Exit node, you become a service provider, and the same laws start to apply.

It’s no joke that we live in a surveillance state, just that some go “full surveillance” like China, while others go “slightly less in-your-face surveillance” like the US/EU.

jlou ,

Would it be possible to allow exit nodes to blacklist specific kinds of traffic and somehow privately verify that the traffic is not one of the blacklisted kinds (zero knowledge proof perhaps sorry not a CS person)?

jarfil , (edited )

An exit node can put in place any filters, blacklists, mitm, exploit injection, logging, and anything else it wants… on unencrypted traffic. Using HTTPS through an exit node, limits all of that to the destination of the traffic, there is no way to get a ZK proof of all the kinds of possible traffic and contents that can exist.

jlou ,

What I meant was blacklisting certain destinations. It obviously wouldn't prevent all malicious traffic

Quexotic ,

To give you an idea, last time I used Tor, I suddenly started to get a bunch of connection attempts from the FBI. Was I doing anything illegal? Nope. Was TOR a legal liability? You betcha.

xvlc ,

Connection attempts from the FBI? Could you specify that a bit further?

Quexotic ,

I was using peerblock and one of the blocklists contained known governmental IP addresses. Those blocked connections began quickly filling the logs.

Spooked the crap outta me. It’s been a few years since I did that, so I could have that detail wrong. I know it was for sure one of the three letter acronyms, DOD, FBI, CIA, but they were definitely incoming.

xvlc ,

That does not sound plausible to me. Typically, your own computer would be behind a router that is either doing NAT or has a firewall (probably the former). Any incoming traffic would be directed to the router without any chance of reaching your computer. Whatever you saw was either outgoing traffic or incoming traffic in response to connections initiated by your own computer.

Quexotic ,

Consider this, the Tor software was accepting connections from government IPs.

Regardless of whether it was active intrusion or a significant portion of the Tor network, (at that time) had a number of governmental IP ranges in it, It’s enough to dissuade my use, at least without more significant OpSec.

I do understand your point though.

Eggyhead ,
@Eggyhead@kbin.social avatar

I suddenly started to get a bunch of connection attempts from the FBI.

How can I observe connection attempts like this?

Quexotic ,

I use peerblock and had some good blocklists set up. The hardest part should be finding peerblock or a more modern fork, the blocklists are mostly public. Helps keep from connecting to known bad actors.

JoMiran , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget
@JoMiran@lemmy.ml avatar

Is there an index of Tor network only sites?

itchy_lizard ,

Yes. Alec Muffett was the guy who setup the most popular Tor darkent site: Facebook. I think he did Twitter’s too. He maintains an excellent list.

github.com/alecmuffett/real-world-onion-sites

Spendrill , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

We’ll see if Google’s new efforts manage to kill the thing.

itchy_lizard ,

The US government would never allow Tor to die. They need it to conduct terrorism cyberwarfare

Zeth0s , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

Problem is that many sites don’t work because of anti-ddos and anti bot measures.

It is a pity

LoafyLemon ,

Cloudflare is pretty TOR-friendly, they even offer onion routing for your website.

https://developers.cloudflare.com/support/firewall/learn-more/understanding-cloudflare-tor-support-and-onion-routing/

itchy_lizard ,

Yeah, we need to make it illegal to block someone from doing a simple GET request just because they’re using a privacy tool.

It should only be legal to block access based on how you act, not based on how you look.

ComradeR , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

Sorry if my question is stupid, but can I use it as a “regular” browser (like Chrome, Mozilla, Opera, etc) on my Android smartphone?

intothesky ,

Yes, but you lose all data after exit

ComradeR ,

Thank you for the answer! :)

itchy_lizard ,

Yes, that’s the point.

Nr97JcmjjiXZud ,
@Nr97JcmjjiXZud@infosec.pub avatar

You can, but you really shouldn’t.

ComradeR ,

Why?

Xylight ,
@Xylight@lemmy.xylight.dev avatar

It’s meant for you to be completely anonymous. Logging in to stuff would defeat the whole purpose of TOR, as it would associate your activity with the account you logged into. When browsing sites without really needing to interact, it’s good, as the sites cannot track you easily.

itchy_lizard ,

There are many use-cases for Tor. One is anonymity. One is to bypass censorship. The most popular website on the darknet is Facebook.

It doesn’t “defeat the purpose” of using Tor in Tibet to access a Facebook page.

blobjim , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

The reason why Tor is publicly available is to get lots of people using to better hide western intelligence agency traffic. So this article is basically stenography for the CIA. It may be secure or whatever, but you’re essentially helping US assets hide their internet traffic.

vd1n ,

Existence is chaos anyway. Not saying I don’t feel what you say. I’m indifferent. Respectable 1st governing is a thing of the past.

itchy_lizard ,

You’re looking at it from the wrong end.

In fact, the international intelligence community is helping me to launder my drug purchasing traffic.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines