>It's perfectly functional at what it does.
any proxy/vpn out of the billion proxies and vpn's out there are perfectly functional at what tor does, and even better
please list the plethora or advantages tor is offering over some cheap vpn from a 4th world shithole where the concept of servers getting v& doesnt even exist.
You are such a moron that it's not even worth explaining to you, but I'll humor it a bit.
Firstly, you said "any proxy/vpn". Proxies do not encrypt any traffic. To suggest a proxy is "perfectly functional at what tor does" demonstrates you do not understand what a proxy is, and you are a complete moron.
Secondly, a VPN is a centralized commercial service. Your privacy and security depends on how much said commercial company can be trusted. There is no definitive way to trust any VPN company, and every single one of them could very easily be logging your traffic if they choose. Tor meanwhile is a zero-trust network. Nodes are chosen at random and encrypted at every pass.
Thirdly, Tor's functionality goes well beyond simply obscuring your IP address, which seems to be the only factor your tiny brain can comprehend. For example, you cannot connect to .onion domains with your VPN.
2 weeks ago
Anonymous
>Nodes are chosen at random
this was true a decade ago but not now
obviously you didnt use it
you keep clicking on "choose new route" or whatever its called, and it chooses the same nodes again and again
also like that fag said, has horrible noscript defaults where on default mode it allows everything
it just glows more and more with each release
2 weeks ago
Anonymous
>this was true a decade ago but not now
No, it's still true idiot. You have zero clue how the software works.
>obviously you didnt use it
Use it?
What does using it have to do with the source code itself you moron?
You are too stupid to read even a single line of code. A stupid person like you has no way of evaluating how it works.
>you keep clicking on "choose new route" or whatever its called, and it chooses the same nodes again and again
Wrong again, retard.
The only node that tends to stay the same is the entry node, and that's by design. Refreshing the Tor circuit always returns a new relay and exit node, and the exit node doesn't even matter if you're connecting to an onion service.
>also like that fag said, has horrible noscript defaults where on default mode it allows everything
So on top of being stupid enough to suggest "a proxy does everything Tor does" you are also too stupid to learn how to disable javascript through clicking a simple drop down menu. Better yet, you are no doubt too stupid to disable javascript outright through about:config
You will always be a complete moron.
2 weeks ago
Anonymous
you are defending theoretical aspects of tor while i am questioning the practical user experience
we are not the same, especially because you're retarded, have fun defending your tor religion
2 weeks ago
Anonymous
>m-muh practical user experience
nta but he countered your every argument, including the complaint about "the nodes remain the same after refresh" which only further showed how clueless you really are.
I'd even question your capability to research information and read when that very point is explained directly in the browser and and in their FAQs. See "Why is the first IP address in my relay circuit always the same?" below >https://support.torproject.org/tbb/#tbb_tbb-2
You're indeed a retard.
2 weeks ago
Anonymous
>you are defending theoretical aspects of tor while i am questioning the practical user experience
You made false claims about things you have absolutely zero clue about. You're a moron, it's as simple as that.
2 weeks ago
Anonymous
what false claims?
see for yourself, click on 'new route' and see the neverchanging nodes
install tor then see how default noscript is basically "allow everything"
2 weeks ago
Anonymous
>see for yourself, click on 'new route' and see the neverchanging nodes
they do change.
use the button to get a new ID (it closes all windows, sadly)
you are a homosexual
2 weeks ago
Anonymous
>every single one of them could very easily be logging your traffic if they choose.
This is false. Good open source VPNs like ProtonVPN encrypt traffic before transit
https://protonvpn.com/secure-vpn/forward-secrecy
2 weeks ago
Anonymous
You have no way of verifying if they are indeed using this sort of stuff on their servers.
2 weeks ago
Anonymous
>another proton shilling moron
Such a stupid, embarrassing idiot.
Are you generating the encryption keys? No, the commercial provider does on their end you fucking idiot. You have no way of knowing what they are doing behind the scenes.
You idiots say the exact same shit about Protonmail's email """encryption""", when pgp is better in every conceivable way, especially in the sense that you're not forced to use a javascript webmail client.
done on the client, idiot.
are you retarded or something? the traffic is encrypted on the OPEN SOURCE CLIENT BEFORE TRANSIT. You are correct about Tor doing a whole lot more than hiding your IP but you know jack shit about how vpns work.
2 weeks ago
Anonymous
>t you're not forced to use a javascript webmail client.
you are not forced to do that idiot. God, I hate idiots like you running your mouth thinking you know what you're talking about; when in reality you have shit for brains. You can anonymously purchase bitcoin to use protons paid service (kycnot.me) to then use proton bridge to pair it with thunderbird, because yes, protons encryption is signficantly better than pgp. especially so when you pair them together.
Hey naggerhomosexual, educate yourself on how cryptographic assymetric Diffie-Hellman key exchanges work.
2 weeks ago
Anonymous
>moron reads marketing gimmick he doesn't understand >uses it in an argument online
What a sad, embarrassing little retard you are.
2 weeks ago
Anonymous
>the usual contrarian VPN BAD gist
2 weeks ago
Anonymous
The client does not generate keys you literal idiot. That's not how paid services work. Being an "open source client" does not change that you embarrassingly stupid retard.
2 weeks ago
Anonymous
Found the moron.
>moron reads marketing gimmick he doesn't understand >uses it in an argument online
What a sad, embarrassing little retard you are.
Watch one youtube video on how they work. >he doesn't understand
You seem to be lost. Diffie-Hellman uses modula arithmetic; it's not hard to understand. Fuck off me weirdo and quit projecting.
2 weeks ago
Anonymous
>he watches youtube videos for education on opsec
My god you're actually getting stupider with every post you make.
2 weeks ago
Anonymous
You're still projecting. I major in cybersecurity. I'm trying to speak in your idiot language; Youtube videos are great for little morons like you.
2 weeks ago
Anonymous
>I major in cybersecurity
Oh, now I get it. I've seen you embarrass yourself in Tor threads before. This isn't the first time you've larped as a "major in cyber security" all the while getting even the most basic shit wrong.
You will always be the village idiot of LULZ.
2 weeks ago
Anonymous
>Diffie-Hellman uses modula arithmetic; it's not hard to understand
Clearly it is hard for you to understand, because you're unable to explain anything. All your pea brain can do is screech for people to watch a youtube video.
Proton are known for cooperating with American authorities, and no, their commercial VPN service isn't a zero-trust model you literal idiot. No commercial VPNs are.
2 weeks ago
Anonymous
Protonmail was not initially collecting IP logs; they were compelled to start doing so or else they would shut down; in starting to do so; they merely did it for one singular individual -- as per the court order -- giving authorities the IP address in question with a protonmail; where authorities argued in court against the defendant that >using protonmail = he did a crime
When in reality; the message contents were still encrypted. Protonmail is not the same as ProtonVPN; where most people fail to use Proton Bridge (the activist wouldnt have been caught if he was using a VPN behind protonmail); encryption is completely audited personally; by you, the reader (well, someone more competent than you, like me.) ; to ensure the session keys are randomized every time you connect; with the keys sent privately to the receiving end; where only you can decrypt it; to ensure maximum fail-safe in TLS.
2 weeks ago
Anonymous
AES*
>I major in cybersecurity
Oh, now I get it. I've seen you embarrass yourself in Tor threads before. This isn't the first time you've larped as a "major in cyber security" all the while getting even the most basic shit wrong.
You will always be the village idiot of LULZ.
I've never posted in Tor threads for the specific reason to avoid schizophrenic troglodytes like yourself.
2 weeks ago
Anonymous
>AES*
Pffffahahahahaha, yeah correct yourself after getting it badly wrong and initially doubling down. Yeah you're a real "cybersecurity major" - fucking idiot.
>I've never posted in Tor threads for the specific reason to avoid schizophrenic troglodytes like yourself.
You mean avoid people rightly labeling you a moron?
Screeching about TLS sounds familiar to me though. Are you the same dumbshit who was trying to claim Telegram was encrypted on the basis of using TLS a couple of months ago? I cannot imagine there would be too many people on LULZ who fail to understand TLS encryption this badly.
2 weeks ago
Anonymous
The only person here screeching and malding is you; and pointing out a typo is about as far as you'll go in making a valid argument.
Stay tarded.
2 weeks ago
Anonymous
>i-i-it was a typo!
[...] >Use SSL/TLS and HTTPS (for centralized services)
With TLS, your ISP can see which domain you connect to, with VPN it can not
>the VPN provider can see and mess with all your traffic.
It can't when you use TLS
>Your IP address is a largely irrelevant metric in modern tracking systems
If only
>No shit retard, but now the VPN can see where you're connecting to.
No shit.
>Go and learn what TLS is you stupid fuck
The dumbass you linked to contradicts himself. TLS is all you need, but also it doesn't protect you from the VPN?
Yeah sure, it was just a "typo" you typed 3-4 times. Happens all the time with "cybersecurity majors".
Retard 🙂
2 weeks ago
Anonymous
3-4 times? TLS was literally the first time I typed it in this thread. People like you would be in a mental hospital right now without access to the internet if it weren't for Reagan shutting them off; for as good a job as he did elsewhere.
2 weeks ago
Anonymous
Let it go, idiot. You've lost badly and embarrassed yourself. Stop digging yourself deeper.
2 weeks ago
Anonymous
You're literally talking to different people you dumb homosexual.
2 weeks ago
Anonymous
Sure sure, whatever you say champ. Just swallow your pride, accept you're retarded and move on.
2 weeks ago
Anonymous
Are you the same neocities.spyware blogger? God, that dude is retarded. You seem similar. Anyways, I obviously didnt mean TLS because Proton uses AES-256. Joepie91 doesnt know what he's talking about. I guess I should make a Github post with the username xXxPussySlayerxXx and retards like you would eat it up and champion me as your saviour..
2 weeks ago
Anonymous
What is done on the client, huh? The VPN service by its character knows which domains you browse.
2 weeks ago
Anonymous
>another proton shilling moron
Such a stupid, embarrassing idiot.
Are you generating the encryption keys? No, the commercial provider does on their end you fucking idiot. You have no way of knowing what they are doing behind the scenes.
You idiots say the exact same shit about Protonmail's email """encryption""", when pgp is better in every conceivable way, especially in the sense that you're not forced to use a javascript webmail client.
2 weeks ago
Anonymous
>t you're not forced to use a javascript webmail client.
you are not forced to do that idiot. God, I hate idiots like you running your mouth thinking you know what you're talking about; when in reality you have shit for brains. You can anonymously purchase bitcoin to use protons paid service (kycnot.me) to then use proton bridge to pair it with thunderbird, because yes, protons encryption is signficantly better than pgp. especially so when you pair them together.
the browser bundle needs to enable noscript by default
glownaggers and pajeet admins need to get it through their thick skulls javascript belongs nowhere in onion sites
>i2p
Seems pretty legit, end-to-end encryption is what really stood out to me vs Tor. That, in my opinion, is Tor's major weakness - if you control the exit node, you can see info in the clear.
i2p does't have exit nodes, so its incomparable. By definition, an exit node has to use whatever protocol the server you're connecting to uses. If that server uses unencrypted protocols, then it will be unencrypted. The vast majority of
servers nowadays use https/ssh/etc, so this is a non issue. For internal servers, both i2p and tor only support encrypted connections.
>If that server uses unencrypted protocols, then it will be unencrypted
that's what I'm saying though - if exit node is compromised (hello nsa), they could have the connection negotiated down to HTTP.
In a general sense you are right - I am looking at it from a paranoid schizo perspective
2 weeks ago
Anonymous
They can see what you browse but not your IP address. If they already owned the server they would see this anyway.
Exit nodes only see unencrypted HTTP traffic going outside of the Tor network. For HTTPS they only see the domain you're connecting to and not any of the data, and for traffic within the Tor network they're not even used. Also, at no point does the exit node ever know the destination of the data it sees, so even if you're accessing unencrypted data, it can't be traced back to you.
Enjoy the honeypot
You do realize what I said is a fact right?
It's the same reason the fbi let proven pedophiles walk instead of exposing how they caught them on tor
>FBI would rather les loose more than 200 pedos than to make TOR more secure
FBI drops charges for over 200 pedophiles to protect Tor exploit used to bust Child Porn site
> The FBI refused to explain "how" they acquired over 200 IP addresses registered for downloading child pornography from an organized deep web pedophile website.
> Over 200 pedophiles were set free because the FBI did not want to give the method in which they cracked the Tor Network.
US prosecutors have dropped a case against a man accused of using a child porn site because the government refused to divulge how it revealed his identity.
The Playpen site was located on the Tor network which is used to anonymise web-browsing activity.
The FBI found a way around this to reveal the users' real IP addresses and led to 200 prosecutions.
>200 pedophiles
Only 200? You know Tor has millions of users per day? Including probably tens of thousands of pedos?
Could've easily gotten 200 or so from a javascript exploit that affects people using an outdated version of the Tor browser... and this was back in 2017. There have been countless security patches since then.
Why are you even calling Tor compromised? Compromised relative to what? Clearnet? With your javascript enabled browser. Do you not know how stupid you sound calling the Tor network compromised while you're posting from LULZ with js enabled along with a unique fingerprint browser? How would Tor being "compromised" even be a problem for you? Are you a pedo who was planning on looking for child porn?
Just listen to the other anon. You are clearly retarded and shouldn't get into debates about subjects you have no idea about.
>FBI would rather les loose more than 200 pedos than to make TOR more secure
FBI drops charges for over 200 pedophiles to protect Tor exploit used to bust Child Porn site
> The FBI refused to explain "how" they acquired over 200 IP addresses registered for downloading child pornography from an organized deep web pedophile website.
> Over 200 pedophiles were set free because the FBI did not want to give the method in which they cracked the Tor Network.
US prosecutors have dropped a case against a man accused of using a child porn site because the government refused to divulge how it revealed his identity.
The Playpen site was located on the Tor network which is used to anonymise web-browsing activity.
The FBI found a way around this to reveal the users' real IP addresses and led to 200 prosecutions.
You lost the argument already, moron. Stop digging your heels, swallow your pride, accept you're an idiot and move on with your life. Stop getting into arguments about things beyond your understanding.
>idiot thinks repeatedly posting links he found on google prove him right
You already exposed yourself as a complete idiot who thought a proxy does the same thing as Tor does. There is no recovering from that. You are stupid beyond belief.
2 weeks ago
Anonymous
>You already exposed yourself as a complete idiot who thought a proxy does the same thing as Tor does. There is no recovering from that. You are stupid beyond belief.
thanks for exposing that glower, fren
>You do realize what I said is a fact right?
yeah, and do YOU realise, retarded nagger, that it doesn't mother fucking matter who created it?
code is open source you IMBECLINE.
also it is run by many people, such as me and other anons. you can even pick who's nodes you will use. go educate yourself.
>You have not read the entire codebase >therefore, use the tools that are 100% certain to be 100% monitored
retard
2 weeks ago
Anonymous
>I haven't read this code but I trust it even though the NSA is behind it
2 weeks ago
Anonymous
The NSA isn't behind it you moron. The EFF is.
The American Government actually uses Tor for their own encrypted communications. It is in their interest for it to be secure and private for that reason. Alas, you're a complete moron.
>No shit retard, but now the VPN can see where you're connecting to.
No shit.
>Go and learn what TLS is you stupid fuck
The dumbass you linked to contradicts himself. TLS is all you need, but also it doesn't protect you from the VPN?
TLS does not encrypt domains you connect to you unbelievably stupid fuck. It encrypts text sent to and from a destination. It's useful for not letting your passwords get stolen. It doesn't prevent a commercial VPN provider from seeing what websites you're connecting to. Stop larping as a "cybersecurity major" when you're clearly a fucking moron.
feds having a laugh luring pedos as per usual
It's perfectly functional at what it does. Retards like will continue being retards.
>It's perfectly functional at what it does.
any proxy/vpn out of the billion proxies and vpn's out there are perfectly functional at what tor does, and even better
Thank you for once again doubling down on your stupidity, idiot.
please list the plethora or advantages tor is offering over some cheap vpn from a 4th world shithole where the concept of servers getting v& doesnt even exist.
You are such a moron that it's not even worth explaining to you, but I'll humor it a bit.
Firstly, you said "any proxy/vpn". Proxies do not encrypt any traffic. To suggest a proxy is "perfectly functional at what tor does" demonstrates you do not understand what a proxy is, and you are a complete moron.
Secondly, a VPN is a centralized commercial service. Your privacy and security depends on how much said commercial company can be trusted. There is no definitive way to trust any VPN company, and every single one of them could very easily be logging your traffic if they choose. Tor meanwhile is a zero-trust network. Nodes are chosen at random and encrypted at every pass.
Thirdly, Tor's functionality goes well beyond simply obscuring your IP address, which seems to be the only factor your tiny brain can comprehend. For example, you cannot connect to .onion domains with your VPN.
>Nodes are chosen at random
this was true a decade ago but not now
obviously you didnt use it
you keep clicking on "choose new route" or whatever its called, and it chooses the same nodes again and again
also like that fag said, has horrible noscript defaults where on default mode it allows everything
it just glows more and more with each release
>this was true a decade ago but not now
No, it's still true idiot. You have zero clue how the software works.
>obviously you didnt use it
Use it?
What does using it have to do with the source code itself you moron?
You are too stupid to read even a single line of code. A stupid person like you has no way of evaluating how it works.
>you keep clicking on "choose new route" or whatever its called, and it chooses the same nodes again and again
Wrong again, retard.
The only node that tends to stay the same is the entry node, and that's by design. Refreshing the Tor circuit always returns a new relay and exit node, and the exit node doesn't even matter if you're connecting to an onion service.
>also like that fag said, has horrible noscript defaults where on default mode it allows everything
So on top of being stupid enough to suggest "a proxy does everything Tor does" you are also too stupid to learn how to disable javascript through clicking a simple drop down menu. Better yet, you are no doubt too stupid to disable javascript outright through about:config
You will always be a complete moron.
you are defending theoretical aspects of tor while i am questioning the practical user experience
we are not the same, especially because you're retarded, have fun defending your tor religion
>m-muh practical user experience
nta but he countered your every argument, including the complaint about "the nodes remain the same after refresh" which only further showed how clueless you really are.
I'd even question your capability to research information and read when that very point is explained directly in the browser and and in their FAQs. See "Why is the first IP address in my relay circuit always the same?" below
>https://support.torproject.org/tbb/#tbb_tbb-2
You're indeed a retard.
>you are defending theoretical aspects of tor while i am questioning the practical user experience
You made false claims about things you have absolutely zero clue about. You're a moron, it's as simple as that.
what false claims?
see for yourself, click on 'new route' and see the neverchanging nodes
install tor then see how default noscript is basically "allow everything"
>see for yourself, click on 'new route' and see the neverchanging nodes
they do change.
use the button to get a new ID (it closes all windows, sadly)
you are a homosexual
>every single one of them could very easily be logging your traffic if they choose.
This is false. Good open source VPNs like ProtonVPN encrypt traffic before transit
https://protonvpn.com/secure-vpn/forward-secrecy
You have no way of verifying if they are indeed using this sort of stuff on their servers.
done on the client, idiot.
are you retarded or something? the traffic is encrypted on the OPEN SOURCE CLIENT BEFORE TRANSIT. You are correct about Tor doing a whole lot more than hiding your IP but you know jack shit about how vpns work.
Hey Protonidiot, educate yourself: https://gist.github.com/joepie91/5a9909939e6ce7d09e29
Hey naggerhomosexual, educate yourself on how cryptographic assymetric Diffie-Hellman key exchanges work.
>moron reads marketing gimmick he doesn't understand
>uses it in an argument online
What a sad, embarrassing little retard you are.
>the usual contrarian VPN BAD gist
The client does not generate keys you literal idiot. That's not how paid services work. Being an "open source client" does not change that you embarrassingly stupid retard.
Found the moron.
Watch one youtube video on how they work.
>he doesn't understand
You seem to be lost. Diffie-Hellman uses modula arithmetic; it's not hard to understand. Fuck off me weirdo and quit projecting.
>he watches youtube videos for education on opsec
My god you're actually getting stupider with every post you make.
You're still projecting. I major in cybersecurity. I'm trying to speak in your idiot language; Youtube videos are great for little morons like you.
>I major in cybersecurity
Oh, now I get it. I've seen you embarrass yourself in Tor threads before. This isn't the first time you've larped as a "major in cyber security" all the while getting even the most basic shit wrong.
You will always be the village idiot of LULZ.
>Diffie-Hellman uses modula arithmetic; it's not hard to understand
Clearly it is hard for you to understand, because you're unable to explain anything. All your pea brain can do is screech for people to watch a youtube video.
Proton are known for cooperating with American authorities, and no, their commercial VPN service isn't a zero-trust model you literal idiot. No commercial VPNs are.
Protonmail was not initially collecting IP logs; they were compelled to start doing so or else they would shut down; in starting to do so; they merely did it for one singular individual -- as per the court order -- giving authorities the IP address in question with a protonmail; where authorities argued in court against the defendant that
>using protonmail = he did a crime
When in reality; the message contents were still encrypted. Protonmail is not the same as ProtonVPN; where most people fail to use Proton Bridge (the activist wouldnt have been caught if he was using a VPN behind protonmail); encryption is completely audited personally; by you, the reader (well, someone more competent than you, like me.) ; to ensure the session keys are randomized every time you connect; with the keys sent privately to the receiving end; where only you can decrypt it; to ensure maximum fail-safe in TLS.
AES*
I've never posted in Tor threads for the specific reason to avoid schizophrenic troglodytes like yourself.
>AES*
Pffffahahahahaha, yeah correct yourself after getting it badly wrong and initially doubling down. Yeah you're a real "cybersecurity major" - fucking idiot.
>I've never posted in Tor threads for the specific reason to avoid schizophrenic troglodytes like yourself.
You mean avoid people rightly labeling you a moron?
Screeching about TLS sounds familiar to me though. Are you the same dumbshit who was trying to claim Telegram was encrypted on the basis of using TLS a couple of months ago? I cannot imagine there would be too many people on LULZ who fail to understand TLS encryption this badly.
The only person here screeching and malding is you; and pointing out a typo is about as far as you'll go in making a valid argument.
Stay tarded.
>i-i-it was a typo!
Yeah sure, it was just a "typo" you typed 3-4 times. Happens all the time with "cybersecurity majors".
Retard 🙂
3-4 times? TLS was literally the first time I typed it in this thread. People like you would be in a mental hospital right now without access to the internet if it weren't for Reagan shutting them off; for as good a job as he did elsewhere.
Let it go, idiot. You've lost badly and embarrassed yourself. Stop digging yourself deeper.
You're literally talking to different people you dumb homosexual.
Sure sure, whatever you say champ. Just swallow your pride, accept you're retarded and move on.
Are you the same neocities.spyware blogger? God, that dude is retarded. You seem similar. Anyways, I obviously didnt mean TLS because Proton uses AES-256. Joepie91 doesnt know what he's talking about. I guess I should make a Github post with the username xXxPussySlayerxXx and retards like you would eat it up and champion me as your saviour..
What is done on the client, huh? The VPN service by its character knows which domains you browse.
>another proton shilling moron
Such a stupid, embarrassing idiot.
Are you generating the encryption keys? No, the commercial provider does on their end you fucking idiot. You have no way of knowing what they are doing behind the scenes.
You idiots say the exact same shit about Protonmail's email """encryption""", when pgp is better in every conceivable way, especially in the sense that you're not forced to use a javascript webmail client.
>t you're not forced to use a javascript webmail client.
you are not forced to do that idiot. God, I hate idiots like you running your mouth thinking you know what you're talking about; when in reality you have shit for brains. You can anonymously purchase bitcoin to use protons paid service (kycnot.me) to then use proton bridge to pair it with thunderbird, because yes, protons encryption is signficantly better than pgp. especially so when you pair them together.
>any proxy/vpn out of the billion proxies and vpn's out there are perfectly functional at what tor does, and even better
You sound like you don't actually understand onion routing.
>You sound like you don't actually understand onion routing.
true, but probably more of a glower. or a shizo
>true
Here you are then friendo
Hi! My name is Tripfag and I disconnected from Mullvad expressly for the singular purpose of calling you an idiot.
HAHAHAHAHAHAHHAHAHAHA
as a technology I think Onion Routing is a very interesting protocol(?).
I should really use it more. Anyone have experience hosting a node?
>inb4 glownagger
>my first thought when I see any privacy, is to be a pedo
kill yourself israelite
pedos are never persecuted
so like da jooz
it's stateless
Underrated
As shit as always
the browser bundle needs to enable noscript by default
glownaggers and pajeet admins need to get it through their thick skulls javascript belongs nowhere in onion sites
This
all i know is drug markets are always down because they're being ddosed or some shit so you have to use i2p with tor instead
redpill me on i2p
drug markets are faster on it
>i2p
Seems pretty legit, end-to-end encryption is what really stood out to me vs Tor. That, in my opinion, is Tor's major weakness - if you control the exit node, you can see info in the clear.
Tor + PGP is very safe though IMO.
i2p does't have exit nodes, so its incomparable. By definition, an exit node has to use whatever protocol the server you're connecting to uses. If that server uses unencrypted protocols, then it will be unencrypted. The vast majority of
servers nowadays use https/ssh/etc, so this is a non issue. For internal servers, both i2p and tor only support encrypted connections.
>If that server uses unencrypted protocols, then it will be unencrypted
that's what I'm saying though - if exit node is compromised (hello nsa), they could have the connection negotiated down to HTTP.
In a general sense you are right - I am looking at it from a paranoid schizo perspective
They can see what you browse but not your IP address. If they already owned the server they would see this anyway.
>if you control the exit node, you can see info in the clear.
only if you browse clearnet, if you browse .onion this is not true
Exit nodes only see unencrypted HTTP traffic going outside of the Tor network. For HTTPS they only see the domain you're connecting to and not any of the data, and for traffic within the Tor network they're not even used. Also, at no point does the exit node ever know the destination of the data it sees, so even if you're accessing unencrypted data, it can't be traced back to you.
pretty good
start own .onion - just a blog and link to other anons
post your onion address here:
http://y3vqwcedlakbqmffsn3yxtuj
yv2yxydqmxufzwru5oupe
aupsfim7pid.onion/
visit text chat here (wait hours for reply that's ok)
http://uvywmesid34m2i
7imp5dppyqnnpm43fchs4h
bfw6gfi4pkzvp3eizhyd.onion/
and follow other links from above sites
Wasn't there a huge botnet DDoS'ing the network and fucking the bandwidth or something a while ago? What happened to that?
They negotiated with the devs and agreed to stop if they took kiwifarms offline.
This is not true, but if it was, it would have been goddamn based.
>Wasn't there a huge botnet DDoS'ing the network and fucking the bandwidth or something a while ago?
Funny you mention that...
https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
From the snowden leaks
You can still buy drugs on it, which is really it's only use unless you're a degenerate pedo
Still made and run by the NSA
Same as it always was.
>Still made and run by the NSA
based!
thank you, NSA
you should kill yourself you fucking retard.
Enjoy the honeypot
You do realize what I said is a fact right?
It's the same reason the fbi let proven pedophiles walk instead of exposing how they caught them on tor
meds
>FBI would rather les loose more than 200 pedos than to make TOR more secure
FBI drops charges for over 200 pedophiles to protect Tor exploit used to bust Child Porn site
> The FBI refused to explain "how" they acquired over 200 IP addresses registered for downloading child pornography from an organized deep web pedophile website.
> Over 200 pedophiles were set free because the FBI did not want to give the method in which they cracked the Tor Network.
http://www.northcrane.com/2017/03/06/fbi-drops-charges-for-over-200-pedophiles-to-protect-tor-exploit-used-to-bust-child-porn-site/
US prosecutors have dropped a case against a man accused of using a child porn site because the government refused to divulge how it revealed his identity.
The Playpen site was located on the Tor network which is used to anonymise web-browsing activity.
The FBI found a way around this to reveal the users' real IP addresses and led to 200 prosecutions.
>200 pedophiles
Only 200? You know Tor has millions of users per day? Including probably tens of thousands of pedos?
Could've easily gotten 200 or so from a javascript exploit that affects people using an outdated version of the Tor browser... and this was back in 2017. There have been countless security patches since then.
Why are you even calling Tor compromised? Compromised relative to what? Clearnet? With your javascript enabled browser. Do you not know how stupid you sound calling the Tor network compromised while you're posting from LULZ with js enabled along with a unique fingerprint browser? How would Tor being "compromised" even be a problem for you? Are you a pedo who was planning on looking for child porn?
Just listen to the other anon. You are clearly retarded and shouldn't get into debates about subjects you have no idea about.
You lost the argument already, moron. Stop digging your heels, swallow your pride, accept you're an idiot and move on with your life. Stop getting into arguments about things beyond your understanding.
https://www.techtimes.com/articles/262645/20210709/tor-encryption-can-allegedly-be-accessed-by-the-nsa-says-security-expert.htm
Glow harder
With NSA involvement
>idiot thinks repeatedly posting links he found on google prove him right
You already exposed yourself as a complete idiot who thought a proxy does the same thing as Tor does. There is no recovering from that. You are stupid beyond belief.
>You already exposed yourself as a complete idiot who thought a proxy does the same thing as Tor does. There is no recovering from that. You are stupid beyond belief.
thanks for exposing that glower, fren
>You do realize what I said is a fact right?
yeah, and do YOU realise, retarded nagger, that it doesn't mother fucking matter who created it?
code is open source you IMBECLINE.
also it is run by many people, such as me and other anons. you can even pick who's nodes you will use. go educate yourself.
sir can i use your nodes
>sir can i use your nodes
everyone can
>You have not read the entire codebase
>therefore, use the tools that are 100% certain to be 100% monitored
retard
>I haven't read this code but I trust it even though the NSA is behind it
The NSA isn't behind it you moron. The EFF is.
The American Government actually uses Tor for their own encrypted communications. It is in their interest for it to be secure and private for that reason. Alas, you're a complete moron.
You have not read the entire codebase
Akshually made by the Naval Research Labs iirc
Itt: NSA glowtards talking to themselves
Good job.
>Use SSL/TLS and HTTPS (for centralized services)
With TLS, your ISP can see which domain you connect to, with VPN it can not
>the VPN provider can see and mess with all your traffic.
It can't when you use TLS
>Your IP address is a largely irrelevant metric in modern tracking systems
If only
>With TLS, your ISP can see which domain you connect to, with VPN it can not
No shit retard, but now the VPN can see where you're connecting to.
>It can't when you use TLS
HOLY FUCK YOU'RE DUMB LMAO
Go and learn what TLS is you stupid fuck
>No shit retard, but now the VPN can see where you're connecting to.
No shit.
>Go and learn what TLS is you stupid fuck
The dumbass you linked to contradicts himself. TLS is all you need, but also it doesn't protect you from the VPN?
TLS does not encrypt domains you connect to you unbelievably stupid fuck. It encrypts text sent to and from a destination. It's useful for not letting your passwords get stolen. It doesn't prevent a commercial VPN provider from seeing what websites you're connecting to. Stop larping as a "cybersecurity major" when you're clearly a fucking moron.
imagine defending this shithole honeypot
Honeypot? Explain how Tor is a honeypot you moron.
Using Tor isn't even remotely illegal. How does the honeypot metaphor apply?
Glowing as bright as ever.
hello schizo bros
hello