this post was submitted on 29 Jul 2023
88 points (91.5% liked)

Technology

61410 readers
6315 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 25 points 2 years ago* (last edited 2 years ago) (13 children)

There is a strong suspicion that the TOR network has been turned into a NSA honeypot by virtue of the NSA running more than half of the TOR exit nodes. Do you really want to take that chance?

Not to mention, pretty much the only thing most honest people use TOR for is to defeat geoblocking, and most geoblocked sites of any importance blacklist TOR exit nodes. So it's not even that useful.

[–] eleitl 18 points 2 years ago (10 children)

Evidence for your claims, please.

[–] foggy 15 points 2 years ago (2 children)

Here's a video referring to OPs opinion that the tor network is compromised.

Not proof, but reasonable explanation for why people believe this to be the case.

https://youtu.be/pvBAaUPzvBQ

[–] eleitl -4 points 2 years ago* (last edited 2 years ago)

I typically don't have the time to watch videos but I did in this case. It's not wrong. The question is: what is your threat model?

First, Tor is not designed to protect you from a global passive adversary nevermind an active one. Global network probes can be used to identify individual sessions by traffic timing correlations. Locating hidden services is quite easy that way, since they're sitting ducks. It is fairly easy to remotely compromise hidden service marketplaces for TLA players and/or use physical access to hardware and/or operators to make them cooperate with LEOs.

If you are trying to avoid ISP level snooping and blocking, advertisers, Google and national scale actors then Tor is the right tool to use. And by all means, do run your own relays to help the network. The more relays we have, the harder the attack.

load more comments (1 replies)
load more comments (8 replies)
load more comments (10 replies)