There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

engadget.com

blobjim , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

The reason why Tor is publicly available is to get lots of people using to better hide western intelligence agency traffic. So this article is basically stenography for the CIA. It may be secure or whatever, but you’re essentially helping US assets hide their internet traffic.

vd1n ,

Existence is chaos anyway. Not saying I don’t feel what you say. I’m indifferent. Respectable 1st governing is a thing of the past.

itchy_lizard ,

You’re looking at it from the wrong end.

In fact, the international intelligence community is helping me to launder my drug purchasing traffic.

sculd , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

I will use it if the speed is comparable to normal browsing…

FirstMajesticComet ,
@FirstMajesticComet@lemmy.blahaj.zone avatar

In my experience it’s a bit slower but not by much, I usually only access text based websites over Tor though with minimal images, streaming over YouTube can be horribly slow but it’s generally worked okay for me.

baltakatei , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

I imagine more people would use Tor if they could get paid to provide bandwidth (like Orchid as described on FLOSS Weekly 633).

StoicLime , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

I would use it if it wasn’t so slow. I get that it’s slow because of the security, but that’s precisely the reason it can never be my primary browser.

pkulak , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

You go first.

l0v9ZU5Z , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

Actual legal risks and consequences don’t go away by applying wishful thinking.

deFrisselle ,
@deFrisselle@lemmy.sdf.org avatar

Which are what

CanadaPlus ,

Yeah, is this guy living in China?

ErgodicTangle ,

I am not sure what he’s hinting at. Just using Tor doesn’t bear any legal risks. Hosting an exit node is different, as depending on the country you might get into serious trouble if certain traffic goes through it.

TWeaK ,

Yes exactly, and I think there have been stories recently where the exit node host has been held liable for content that’s gone through it.Which is complete bullshit, but the unfortunate reality is that the legal system doesn’t need to understand technology to regulate it.

jarfil ,

It’s not bullshit. If A has proof your system launched an attack, or sent CSAM, to another system, but your only defense is “I let anyone use my system in that way”, then at the very least you’re an accomplice.

TWeaK ,

It is bullshit, because it puts the onus of policing everything on any service provider. If a TOR exit node provider is responsible for all traffic through their node, then an ISP is responsible for all traffic through them to their users - yet it is not reasonable for ISP’s to do this. Nor should it be acceptable by law and even less so if the purpose is for law enforcement to bypass the warrant system by having private parties do the investigation for them.

jarfil ,

Well, the law enforcement ship has sailed a long time ago, it’s more of a flotilla by now. Data communication service providers (including ISPs) have some customer identification and data retention requirements in exchange for immunity from the data itself, but otherwise —reasonabke or not— there are more and more traffic policing laws that get introduced for ISPs to abide. By starting a Tor Exit node, you become a service provider, and the same laws start to apply.

It’s no joke that we live in a surveillance state, just that some go “full surveillance” like China, while others go “slightly less in-your-face surveillance” like the US/EU.

jlou ,

Would it be possible to allow exit nodes to blacklist specific kinds of traffic and somehow privately verify that the traffic is not one of the blacklisted kinds (zero knowledge proof perhaps sorry not a CS person)?

jarfil , (edited )

An exit node can put in place any filters, blacklists, mitm, exploit injection, logging, and anything else it wants… on unencrypted traffic. Using HTTPS through an exit node, limits all of that to the destination of the traffic, there is no way to get a ZK proof of all the kinds of possible traffic and contents that can exist.

jlou ,

What I meant was blacklisting certain destinations. It obviously wouldn't prevent all malicious traffic

Quexotic ,

To give you an idea, last time I used Tor, I suddenly started to get a bunch of connection attempts from the FBI. Was I doing anything illegal? Nope. Was TOR a legal liability? You betcha.

xvlc ,

Connection attempts from the FBI? Could you specify that a bit further?

Quexotic ,

I was using peerblock and one of the blocklists contained known governmental IP addresses. Those blocked connections began quickly filling the logs.

Spooked the crap outta me. It’s been a few years since I did that, so I could have that detail wrong. I know it was for sure one of the three letter acronyms, DOD, FBI, CIA, but they were definitely incoming.

xvlc ,

That does not sound plausible to me. Typically, your own computer would be behind a router that is either doing NAT or has a firewall (probably the former). Any incoming traffic would be directed to the router without any chance of reaching your computer. Whatever you saw was either outgoing traffic or incoming traffic in response to connections initiated by your own computer.

Quexotic ,

Consider this, the Tor software was accepting connections from government IPs.

Regardless of whether it was active intrusion or a significant portion of the Tor network, (at that time) had a number of governmental IP ranges in it, It’s enough to dissuade my use, at least without more significant OpSec.

I do understand your point though.

Eggyhead ,
@Eggyhead@kbin.social avatar

I suddenly started to get a bunch of connection attempts from the FBI.

How can I observe connection attempts like this?

Quexotic ,

I use peerblock and had some good blocklists set up. The hardest part should be finding peerblock or a more modern fork, the blocklists are mostly public. Helps keep from connecting to known bad actors.

ComradeR , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

Sorry if my question is stupid, but can I use it as a “regular” browser (like Chrome, Mozilla, Opera, etc) on my Android smartphone?

intothesky ,

Yes, but you lose all data after exit

ComradeR ,

Thank you for the answer! :)

itchy_lizard ,

Yes, that’s the point.

Nr97JcmjjiXZud ,
@Nr97JcmjjiXZud@infosec.pub avatar

You can, but you really shouldn’t.

ComradeR ,

Why?

Xylight ,
@Xylight@lemmy.xylight.dev avatar

It’s meant for you to be completely anonymous. Logging in to stuff would defeat the whole purpose of TOR, as it would associate your activity with the account you logged into. When browsing sites without really needing to interact, it’s good, as the sites cannot track you easily.

itchy_lizard ,

There are many use-cases for Tor. One is anonymity. One is to bypass censorship. The most popular website on the darknet is Facebook.

It doesn’t “defeat the purpose” of using Tor in Tibet to access a Facebook page.

lloram239 , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

It would help if Tor would be more useful for regular use. The few times I used it, it was for VPN-style geolocation circumvention. Tor supports it by changing ExitNodes, but the setting is hidden deep down in a config file and required a restart. Not exactly a great user experience for a setting that you might wanna flip pretty frequently.

refurbishedrefurbisher ,

It’s a hidden setting because it’s not recommended to change that setting for people who need anonymity.

jarfil ,
sznio , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

I heard of a guy who went to prison because he bought something from Allegro (Polish Amazon) over TOR. Someone used the same exit node for hacking, so they pinned it on him.

astral_avocado ,
@astral_avocado@programming.dev avatar

What country? Sounds like a kangaroo court or a court staffed entirely by old people.

Thalestr ,
@Thalestr@beehaw.org avatar

court staffed entirely by old people

Isn’t that most courts?

amanneedsamaid ,

Yeah, that ruling is ridiculous.

sznio ,

Poland.

He could’ve easily got it solved but he didn’t have money and the public defender just told him confessing was the best option.

It might be a legend, it’s just a thing that supposedly happened to someone in a community I participate in.

Mkengine ,

I thought the point of Tor was the anonymity?

Confetti_Camouflage ,
@Confetti_Camouflage@pawb.social avatar

Your anonymity goes out the window when you log in to any service. Your privacy goes when you give them your shipping information.

lloram239 ,

It provides anonymity in much the same sense as going into the bank while wearing a skimask does. Every form of anonymity service always puts you in close range to be grabbed by the authorities, as while your traffic might be anonymized, the fact that you are running the service is not.

ErgodicTangle , (edited )

“Czesc, I am Mister Anonymous. I would like to buy this Book. Please send it to Jan Pawel at this address, dziekuje.”

l0v9ZU5Z ,

Actual legal risks and consequences don’t go away by applying wishful thinking.

Lexam , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

But that’s part of its appeal. How else do I know I’m one of the cool kids?

Chadus_Maximus ,

People treat this as a suggestion. It’s actually a warning. A warning of what will happen if we overuse TOR.

JoMiran , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget
@JoMiran@lemmy.ml avatar

Is there an index of Tor network only sites?

itchy_lizard ,

Yes. Alec Muffett was the guy who setup the most popular Tor darkent site: Facebook. I think he did Twitter’s too. He maintains an excellent list.

github.com/alecmuffett/real-world-onion-sites

fearout , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget
@fearout@kbin.social avatar

Are there any good iOS Tor browsers? All that I’ve seen are either shit or require some insane subscription.

milo ,

Onion Browser is decent.

fearout ,
@fearout@kbin.social avatar

Both are broken as far as I know. First one hasn’t updated for years, and recent reviews for the second one claim it crashes on startup.

milo ,

I use this one on my iPhone and iPad and I’ve had no issues.

haakon ,

Due to Apple’s policies, there are no good ones. The least bad one is called Onion Browser and is recommended by the Tor Project.

jcg ,

Interesting, is this due to all browsers being required to use Safari or something? I always figured since there are VPNs on iPhone that TOR would be no problem.

jarfil ,

You can use any browser you want with Tor, the issue is that browsers are the main source of tracking and de-anonymization, so by being forced to use Safari there is only so much that Tor can do to keep you anonymous.

Spendrill , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

We’ll see if Google’s new efforts manage to kill the thing.

itchy_lizard ,

The US government would never allow Tor to die. They need it to conduct terrorism cyberwarfare

Skimmer , (edited ) to technology in Tor’s shadowy reputation will only end if we all use it | Engadget

I just don’t think Tor Browser is currently suited as a primary browser for most people. You lose things like staying logged into websites, you can’t (or at least shouldn’t) really add extensions like a good content blocker, you generally can’t tweak or customize the browser to your liking, etc. Plus factor in things like the slow speeds, being blocked by websites, bombarded with captchas everywhere, etc, and it just becomes a harder and harder sell for a lot of average people.

Tor Browser’s great and it absolutely has its need and purpose, I’m not trying to knock it for that at all because it works damn well for what it is and what it tries to do, but I just think its hard to be using as a primary browser and daily driver in its current form, at least for a lot of people.

amanneedsamaid ,

I dont think this article is suggesting everyone use Tor Browser as their main browser (and if they are, thats obtuse), but that people use Tor / Tor Browser at all, even for just sensitive searches or websites that dont require a login.

CookieJarObserver , to technology in Tor’s shadowy reputation will only end if we all use it | Engadget
@CookieJarObserver@sh.itjust.works avatar

Its good that not everyone uses it because otherwise the notes would run hot.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines