Recent twts in reply to #fupapta

@stigatle@yarn.stigatle.no Tor is well-known to be thoroughly infiltrated by law enforcement and other state actors, who even run their own exit nodes. There are playbooks for taking it down. It could be fully compromised right now for all we know. i2p I know less about, but human engineering–meaning, coercing, tricking, or otherwise persuading people to do stuff that compromises security–is always the way to compromise these things, and it always will be.

⤋ Read More

@abucci@anthony.buc.ci anyone can run a exit node. Show me a case where a hidden service was taken over without regular investigation etc.
The biggest darknet markets where taken down due to misconfigurations or mistakes leading them to leak IP and such , not because tor is compromised or that some agency ran a exit node.
A hidden service’s traffic never goes through a exit node, only passes through middle nodes and everything stays encrypted.

⤋ Read More

@abucci@anthony.buc.ci exit nodes and tor traffic that is contained within tor network is two separate things. And I do know what I’m talking about. I ran a exit node for a long time, rented vps in sweden, police raided there, then came at my door the next morning because someone sent angela merkel a threatening email through my exit node. Blocking exit nodes does not shut down hidden services because hidden service traffic never leaves the tor network.

⤋ Read More


Login or Register to join in on this yarn.