What is the state of Tor in 2023?

  1. 2 weeks ago
    Anonymous

    feds having a laugh luring pedos as per usual

    • 2 weeks ago
      Anonymous

      It's perfectly functional at what it does. Retards like will continue being retards.

      • 2 weeks ago
        Anonymous

        >It's perfectly functional at what it does.
        any proxy/vpn out of the billion proxies and vpn's out there are perfectly functional at what tor does, and even better

        • 2 weeks ago
          Anonymous

          Thank you for once again doubling down on your stupidity, idiot.

          • 2 weeks ago
            Anonymous

            please list the plethora or advantages tor is offering over some cheap vpn from a 4th world shithole where the concept of servers getting v& doesnt even exist.

            • 2 weeks ago
              Anonymous

              You are such a moron that it's not even worth explaining to you, but I'll humor it a bit.

              Firstly, you said "any proxy/vpn". Proxies do not encrypt any traffic. To suggest a proxy is "perfectly functional at what tor does" demonstrates you do not understand what a proxy is, and you are a complete moron.

              Secondly, a VPN is a centralized commercial service. Your privacy and security depends on how much said commercial company can be trusted. There is no definitive way to trust any VPN company, and every single one of them could very easily be logging your traffic if they choose. Tor meanwhile is a zero-trust network. Nodes are chosen at random and encrypted at every pass.

              Thirdly, Tor's functionality goes well beyond simply obscuring your IP address, which seems to be the only factor your tiny brain can comprehend. For example, you cannot connect to .onion domains with your VPN.

              • 2 weeks ago
                Anonymous

                >Nodes are chosen at random
                this was true a decade ago but not now
                obviously you didnt use it
                you keep clicking on "choose new route" or whatever its called, and it chooses the same nodes again and again
                also like that fag said, has horrible noscript defaults where on default mode it allows everything
                it just glows more and more with each release

              • 2 weeks ago
                Anonymous

                >this was true a decade ago but not now
                No, it's still true idiot. You have zero clue how the software works.

                >obviously you didnt use it
                Use it?
                What does using it have to do with the source code itself you moron?
                You are too stupid to read even a single line of code. A stupid person like you has no way of evaluating how it works.

                >you keep clicking on "choose new route" or whatever its called, and it chooses the same nodes again and again
                Wrong again, retard.
                The only node that tends to stay the same is the entry node, and that's by design. Refreshing the Tor circuit always returns a new relay and exit node, and the exit node doesn't even matter if you're connecting to an onion service.

                >also like that fag said, has horrible noscript defaults where on default mode it allows everything
                So on top of being stupid enough to suggest "a proxy does everything Tor does" you are also too stupid to learn how to disable javascript through clicking a simple drop down menu. Better yet, you are no doubt too stupid to disable javascript outright through about:config

                You will always be a complete moron.

              • 2 weeks ago
                Anonymous

                you are defending theoretical aspects of tor while i am questioning the practical user experience
                we are not the same, especially because you're retarded, have fun defending your tor religion

              • 2 weeks ago
                Anonymous

                >m-muh practical user experience
                nta but he countered your every argument, including the complaint about "the nodes remain the same after refresh" which only further showed how clueless you really are.
                I'd even question your capability to research information and read when that very point is explained directly in the browser and and in their FAQs. See "Why is the first IP address in my relay circuit always the same?" below
                >https://support.torproject.org/tbb/#tbb_tbb-2

                You're indeed a retard.

              • 2 weeks ago
                Anonymous

                >you are defending theoretical aspects of tor while i am questioning the practical user experience
                You made false claims about things you have absolutely zero clue about. You're a moron, it's as simple as that.

              • 2 weeks ago
                Anonymous

                what false claims?
                see for yourself, click on 'new route' and see the neverchanging nodes
                install tor then see how default noscript is basically "allow everything"

              • 2 weeks ago
                Anonymous

                >see for yourself, click on 'new route' and see the neverchanging nodes
                they do change.
                use the button to get a new ID (it closes all windows, sadly)
                you are a homosexual

              • 2 weeks ago
                Anonymous

                >every single one of them could very easily be logging your traffic if they choose.
                This is false. Good open source VPNs like ProtonVPN encrypt traffic before transit
                https://protonvpn.com/secure-vpn/forward-secrecy

              • 2 weeks ago
                Anonymous

                You have no way of verifying if they are indeed using this sort of stuff on their servers.

              • 2 weeks ago
                Anonymous

                >another proton shilling moron
                Such a stupid, embarrassing idiot.

                Are you generating the encryption keys? No, the commercial provider does on their end you fucking idiot. You have no way of knowing what they are doing behind the scenes.
                You idiots say the exact same shit about Protonmail's email """encryption""", when pgp is better in every conceivable way, especially in the sense that you're not forced to use a javascript webmail client.

                done on the client, idiot.
                are you retarded or something? the traffic is encrypted on the OPEN SOURCE CLIENT BEFORE TRANSIT. You are correct about Tor doing a whole lot more than hiding your IP but you know jack shit about how vpns work.

              • 2 weeks ago
                Anonymous

                >t you're not forced to use a javascript webmail client.
                you are not forced to do that idiot. God, I hate idiots like you running your mouth thinking you know what you're talking about; when in reality you have shit for brains. You can anonymously purchase bitcoin to use protons paid service (kycnot.me) to then use proton bridge to pair it with thunderbird, because yes, protons encryption is signficantly better than pgp. especially so when you pair them together.

                Hey Protonidiot, educate yourself: https://gist.github.com/joepie91/5a9909939e6ce7d09e29

              • 2 weeks ago
                Anonymous

                Hey naggerhomosexual, educate yourself on how cryptographic assymetric Diffie-Hellman key exchanges work.

              • 2 weeks ago
                Anonymous

                >moron reads marketing gimmick he doesn't understand
                >uses it in an argument online
                What a sad, embarrassing little retard you are.

              • 2 weeks ago
                Anonymous

                >the usual contrarian VPN BAD gist

              • 2 weeks ago
                Anonymous

                The client does not generate keys you literal idiot. That's not how paid services work. Being an "open source client" does not change that you embarrassingly stupid retard.

              • 2 weeks ago
                Anonymous

                Found the moron.

                >moron reads marketing gimmick he doesn't understand
                >uses it in an argument online
                What a sad, embarrassing little retard you are.

                Watch one youtube video on how they work.
                >he doesn't understand
                You seem to be lost. Diffie-Hellman uses modula arithmetic; it's not hard to understand. Fuck off me weirdo and quit projecting.

              • 2 weeks ago
                Anonymous

                >he watches youtube videos for education on opsec
                My god you're actually getting stupider with every post you make.

              • 2 weeks ago
                Anonymous

                You're still projecting. I major in cybersecurity. I'm trying to speak in your idiot language; Youtube videos are great for little morons like you.

              • 2 weeks ago
                Anonymous

                >I major in cybersecurity
                Oh, now I get it. I've seen you embarrass yourself in Tor threads before. This isn't the first time you've larped as a "major in cyber security" all the while getting even the most basic shit wrong.
                You will always be the village idiot of LULZ.

              • 2 weeks ago
                Anonymous

                >Diffie-Hellman uses modula arithmetic; it's not hard to understand
                Clearly it is hard for you to understand, because you're unable to explain anything. All your pea brain can do is screech for people to watch a youtube video.

                Proton are known for cooperating with American authorities, and no, their commercial VPN service isn't a zero-trust model you literal idiot. No commercial VPNs are.

              • 2 weeks ago
                Anonymous

                Protonmail was not initially collecting IP logs; they were compelled to start doing so or else they would shut down; in starting to do so; they merely did it for one singular individual -- as per the court order -- giving authorities the IP address in question with a protonmail; where authorities argued in court against the defendant that
                >using protonmail = he did a crime
                When in reality; the message contents were still encrypted. Protonmail is not the same as ProtonVPN; where most people fail to use Proton Bridge (the activist wouldnt have been caught if he was using a VPN behind protonmail); encryption is completely audited personally; by you, the reader (well, someone more competent than you, like me.) ; to ensure the session keys are randomized every time you connect; with the keys sent privately to the receiving end; where only you can decrypt it; to ensure maximum fail-safe in TLS.

              • 2 weeks ago
                Anonymous

                AES*

                >I major in cybersecurity
                Oh, now I get it. I've seen you embarrass yourself in Tor threads before. This isn't the first time you've larped as a "major in cyber security" all the while getting even the most basic shit wrong.
                You will always be the village idiot of LULZ.

                I've never posted in Tor threads for the specific reason to avoid schizophrenic troglodytes like yourself.

              • 2 weeks ago
                Anonymous

                >AES*
                Pffffahahahahaha, yeah correct yourself after getting it badly wrong and initially doubling down. Yeah you're a real "cybersecurity major" - fucking idiot.

                >I've never posted in Tor threads for the specific reason to avoid schizophrenic troglodytes like yourself.
                You mean avoid people rightly labeling you a moron?

                Screeching about TLS sounds familiar to me though. Are you the same dumbshit who was trying to claim Telegram was encrypted on the basis of using TLS a couple of months ago? I cannot imagine there would be too many people on LULZ who fail to understand TLS encryption this badly.

              • 2 weeks ago
                Anonymous

                The only person here screeching and malding is you; and pointing out a typo is about as far as you'll go in making a valid argument.

                Stay tarded.

              • 2 weeks ago
                Anonymous

                >i-i-it was a typo!

                [...]
                >Use SSL/TLS and HTTPS (for centralized services)
                With TLS, your ISP can see which domain you connect to, with VPN it can not

                >the VPN provider can see and mess with all your traffic.
                It can't when you use TLS

                >Your IP address is a largely irrelevant metric in modern tracking systems
                If only

                >No shit retard, but now the VPN can see where you're connecting to.
                No shit.

                >Go and learn what TLS is you stupid fuck
                The dumbass you linked to contradicts himself. TLS is all you need, but also it doesn't protect you from the VPN?

                Yeah sure, it was just a "typo" you typed 3-4 times. Happens all the time with "cybersecurity majors".

                Retard 🙂

              • 2 weeks ago
                Anonymous

                3-4 times? TLS was literally the first time I typed it in this thread. People like you would be in a mental hospital right now without access to the internet if it weren't for Reagan shutting them off; for as good a job as he did elsewhere.

              • 2 weeks ago
                Anonymous

                Let it go, idiot. You've lost badly and embarrassed yourself. Stop digging yourself deeper.

              • 2 weeks ago
                Anonymous

                You're literally talking to different people you dumb homosexual.

              • 2 weeks ago
                Anonymous

                Sure sure, whatever you say champ. Just swallow your pride, accept you're retarded and move on.

              • 2 weeks ago
                Anonymous

                Are you the same neocities.spyware blogger? God, that dude is retarded. You seem similar. Anyways, I obviously didnt mean TLS because Proton uses AES-256. Joepie91 doesnt know what he's talking about. I guess I should make a Github post with the username xXxPussySlayerxXx and retards like you would eat it up and champion me as your saviour..

              • 2 weeks ago
                Anonymous

                What is done on the client, huh? The VPN service by its character knows which domains you browse.

              • 2 weeks ago
                Anonymous

                >another proton shilling moron
                Such a stupid, embarrassing idiot.

                Are you generating the encryption keys? No, the commercial provider does on their end you fucking idiot. You have no way of knowing what they are doing behind the scenes.
                You idiots say the exact same shit about Protonmail's email """encryption""", when pgp is better in every conceivable way, especially in the sense that you're not forced to use a javascript webmail client.

              • 2 weeks ago
                Anonymous

                >t you're not forced to use a javascript webmail client.
                you are not forced to do that idiot. God, I hate idiots like you running your mouth thinking you know what you're talking about; when in reality you have shit for brains. You can anonymously purchase bitcoin to use protons paid service (kycnot.me) to then use proton bridge to pair it with thunderbird, because yes, protons encryption is signficantly better than pgp. especially so when you pair them together.

        • 2 weeks ago
          Anonymous

          >any proxy/vpn out of the billion proxies and vpn's out there are perfectly functional at what tor does, and even better

        • 2 weeks ago
          Anonymous

          You sound like you don't actually understand onion routing.

          • 2 weeks ago
            Anonymous

            >You sound like you don't actually understand onion routing.
            true, but probably more of a glower. or a shizo

            • 2 weeks ago
              Anonymous

              >true
              Here you are then friendo

        • 2 weeks ago
          Ch

          Hi! My name is Tripfag and I disconnected from Mullvad expressly for the singular purpose of calling you an idiot.

        • 2 weeks ago
          Anonymous

          HAHAHAHAHAHAHHAHAHAHA

      • 2 weeks ago
        Anonymous

        as a technology I think Onion Routing is a very interesting protocol(?).

        I should really use it more. Anyone have experience hosting a node?
        >inb4 glownagger

    • 2 weeks ago
      Anonymous

      >my first thought when I see any privacy, is to be a pedo
      kill yourself israelite

    • 2 weeks ago
      Anonymous

      pedos are never persecuted

      • 2 weeks ago
        Anonymous

        so like da jooz

  2. 2 weeks ago
    Anonymous

    it's stateless

    • 2 weeks ago
      Anonymous

      Underrated

  3. 2 weeks ago
    Anonymous

    As shit as always

  4. 2 weeks ago
    Anonymous

    the browser bundle needs to enable noscript by default
    glownaggers and pajeet admins need to get it through their thick skulls javascript belongs nowhere in onion sites

    • 2 weeks ago
      Anonymous

      drug markets are faster on it

      This

  5. 2 weeks ago
    Anonymous

    all i know is drug markets are always down because they're being ddosed or some shit so you have to use i2p with tor instead

    • 2 weeks ago
      Anonymous

      redpill me on i2p

      • 2 weeks ago
        Anonymous

        drug markets are faster on it

        • 2 weeks ago
          Anonymous

          >i2p
          Seems pretty legit, end-to-end encryption is what really stood out to me vs Tor. That, in my opinion, is Tor's major weakness - if you control the exit node, you can see info in the clear.

          Tor + PGP is very safe though IMO.

          • 2 weeks ago
            Anonymous

            i2p does't have exit nodes, so its incomparable. By definition, an exit node has to use whatever protocol the server you're connecting to uses. If that server uses unencrypted protocols, then it will be unencrypted. The vast majority of
            servers nowadays use https/ssh/etc, so this is a non issue. For internal servers, both i2p and tor only support encrypted connections.

            • 2 weeks ago
              Anonymous

              >If that server uses unencrypted protocols, then it will be unencrypted
              that's what I'm saying though - if exit node is compromised (hello nsa), they could have the connection negotiated down to HTTP.

              In a general sense you are right - I am looking at it from a paranoid schizo perspective

              • 2 weeks ago
                Anonymous

                They can see what you browse but not your IP address. If they already owned the server they would see this anyway.

          • 2 weeks ago
            Anonymous

            >if you control the exit node, you can see info in the clear.
            only if you browse clearnet, if you browse .onion this is not true

          • 2 weeks ago
            Anonymous

            Exit nodes only see unencrypted HTTP traffic going outside of the Tor network. For HTTPS they only see the domain you're connecting to and not any of the data, and for traffic within the Tor network they're not even used. Also, at no point does the exit node ever know the destination of the data it sees, so even if you're accessing unencrypted data, it can't be traced back to you.

  6. 2 weeks ago
    Anonymous

    pretty good

    start own .onion - just a blog and link to other anons
    post your onion address here:

    http://y3vqwcedlakbqmffsn3yxtuj
    yv2yxydqmxufzwru5oupe
    aupsfim7pid.onion/

    visit text chat here (wait hours for reply that's ok)

    http://uvywmesid34m2i
    7imp5dppyqnnpm43fchs4h
    bfw6gfi4pkzvp3eizhyd.onion/

    and follow other links from above sites

  7. 2 weeks ago
    Anonymous

    Wasn't there a huge botnet DDoS'ing the network and fucking the bandwidth or something a while ago? What happened to that?

    • 2 weeks ago
      Anonymous

      They negotiated with the devs and agreed to stop if they took kiwifarms offline.

      • 2 weeks ago
        Anonymous

        This is not true, but if it was, it would have been goddamn based.

    • 2 weeks ago
      Anonymous

      >Wasn't there a huge botnet DDoS'ing the network and fucking the bandwidth or something a while ago?
      Funny you mention that...

      https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document

      From the snowden leaks

  8. 2 weeks ago
    Anonymous

    You can still buy drugs on it, which is really it's only use unless you're a degenerate pedo

  9. 2 weeks ago
    Anonymous

    Still made and run by the NSA
    Same as it always was.

    • 2 weeks ago
      Anonymous

      >Still made and run by the NSA
      based!
      thank you, NSA

      you should kill yourself you fucking retard.

      • 2 weeks ago
        Anonymous

        Enjoy the honeypot
        You do realize what I said is a fact right?
        It's the same reason the fbi let proven pedophiles walk instead of exposing how they caught them on tor

        • 2 weeks ago
          Anonymous

          meds

          • 2 weeks ago
            Anonymous

            >FBI would rather les loose more than 200 pedos than to make TOR more secure

            FBI drops charges for over 200 pedophiles to protect Tor exploit used to bust Child Porn site

            > The FBI refused to explain "how" they acquired over 200 IP addresses registered for downloading child pornography from an organized deep web pedophile website.

            > Over 200 pedophiles were set free because the FBI did not want to give the method in which they cracked the Tor Network.

            http://www.northcrane.com/2017/03/06/fbi-drops-charges-for-over-200-pedophiles-to-protect-tor-exploit-used-to-bust-child-porn-site/

            US prosecutors have dropped a case against a man accused of using a child porn site because the government refused to divulge how it revealed his identity.

            The Playpen site was located on the Tor network which is used to anonymise web-browsing activity.

            The FBI found a way around this to reveal the users' real IP addresses and led to 200 prosecutions.

            • 2 weeks ago
              Anonymous

              >200 pedophiles
              Only 200? You know Tor has millions of users per day? Including probably tens of thousands of pedos?
              Could've easily gotten 200 or so from a javascript exploit that affects people using an outdated version of the Tor browser... and this was back in 2017. There have been countless security patches since then.

              Why are you even calling Tor compromised? Compromised relative to what? Clearnet? With your javascript enabled browser. Do you not know how stupid you sound calling the Tor network compromised while you're posting from LULZ with js enabled along with a unique fingerprint browser? How would Tor being "compromised" even be a problem for you? Are you a pedo who was planning on looking for child porn?

              Just listen to the other anon. You are clearly retarded and shouldn't get into debates about subjects you have no idea about.

        • 2 weeks ago
          Anonymous

          >FBI would rather les loose more than 200 pedos than to make TOR more secure

          FBI drops charges for over 200 pedophiles to protect Tor exploit used to bust Child Porn site

          > The FBI refused to explain "how" they acquired over 200 IP addresses registered for downloading child pornography from an organized deep web pedophile website.

          > Over 200 pedophiles were set free because the FBI did not want to give the method in which they cracked the Tor Network.

          http://www.northcrane.com/2017/03/06/fbi-drops-charges-for-over-200-pedophiles-to-protect-tor-exploit-used-to-bust-child-porn-site/

          US prosecutors have dropped a case against a man accused of using a child porn site because the government refused to divulge how it revealed his identity.

          The Playpen site was located on the Tor network which is used to anonymise web-browsing activity.

          The FBI found a way around this to reveal the users' real IP addresses and led to 200 prosecutions.

          You lost the argument already, moron. Stop digging your heels, swallow your pride, accept you're an idiot and move on with your life. Stop getting into arguments about things beyond your understanding.

          • 2 weeks ago
            Anonymous

            https://www.techtimes.com/articles/262645/20210709/tor-encryption-can-allegedly-be-accessed-by-the-nsa-says-security-expert.htm

            Glow harder

            Akshually made by the Naval Research Labs iirc

            With NSA involvement

            • 2 weeks ago
              Anonymous

              >idiot thinks repeatedly posting links he found on google prove him right
              You already exposed yourself as a complete idiot who thought a proxy does the same thing as Tor does. There is no recovering from that. You are stupid beyond belief.

              • 2 weeks ago
                Anonymous

                >You already exposed yourself as a complete idiot who thought a proxy does the same thing as Tor does. There is no recovering from that. You are stupid beyond belief.
                thanks for exposing that glower, fren

        • 2 weeks ago
          Anonymous

          >You do realize what I said is a fact right?
          yeah, and do YOU realise, retarded nagger, that it doesn't mother fucking matter who created it?
          code is open source you IMBECLINE.

          also it is run by many people, such as me and other anons. you can even pick who's nodes you will use. go educate yourself.

          • 2 weeks ago
            Anonymous

            sir can i use your nodes

            • 2 weeks ago
              Anonymous

              >sir can i use your nodes
              everyone can

              You have not read the entire codebase

              >You have not read the entire codebase
              >therefore, use the tools that are 100% certain to be 100% monitored
              retard

              • 2 weeks ago
                Anonymous

                >I haven't read this code but I trust it even though the NSA is behind it

              • 2 weeks ago
                Anonymous

                The NSA isn't behind it you moron. The EFF is.

                The American Government actually uses Tor for their own encrypted communications. It is in their interest for it to be secure and private for that reason. Alas, you're a complete moron.

          • 2 weeks ago
            Anonymous

            You have not read the entire codebase

    • 2 weeks ago
      Anonymous

      Akshually made by the Naval Research Labs iirc

  10. 2 weeks ago
    Anonymous

    Itt: NSA glowtards talking to themselves

  11. 2 weeks ago
    Anonymous

    [...]

    [...]
    Hey Protonidiot, educate yourself: https://gist.github.com/joepie91/5a9909939e6ce7d09e29

    Good job.

  12. 2 weeks ago
    Anonymous

    [...]

    >Use SSL/TLS and HTTPS (for centralized services)
    With TLS, your ISP can see which domain you connect to, with VPN it can not

    >the VPN provider can see and mess with all your traffic.
    It can't when you use TLS

    >Your IP address is a largely irrelevant metric in modern tracking systems
    If only

    • 2 weeks ago
      Anonymous

      >With TLS, your ISP can see which domain you connect to, with VPN it can not
      No shit retard, but now the VPN can see where you're connecting to.

      >It can't when you use TLS
      HOLY FUCK YOU'RE DUMB LMAO
      Go and learn what TLS is you stupid fuck

      • 2 weeks ago
        Anonymous

        >No shit retard, but now the VPN can see where you're connecting to.
        No shit.

        >Go and learn what TLS is you stupid fuck
        The dumbass you linked to contradicts himself. TLS is all you need, but also it doesn't protect you from the VPN?

        • 2 weeks ago
          Anonymous

          TLS does not encrypt domains you connect to you unbelievably stupid fuck. It encrypts text sent to and from a destination. It's useful for not letting your passwords get stolen. It doesn't prevent a commercial VPN provider from seeing what websites you're connecting to. Stop larping as a "cybersecurity major" when you're clearly a fucking moron.

  13. 2 weeks ago
    Anonymous

    imagine defending this shithole honeypot

    • 2 weeks ago
      Anonymous

      Honeypot? Explain how Tor is a honeypot you moron.
      Using Tor isn't even remotely illegal. How does the honeypot metaphor apply?

  14. 2 weeks ago
    Anonymous

    Glowing as bright as ever.

  15. 2 weeks ago
    Anonymous

    hello schizo bros

    • 2 weeks ago
      Anonymous

      hello

Your email address will not be published. Required fields are marked *