[ / / / / / / / / / / / / / ] [ dir / caco / chemo / dempart / general / idchan / vg / vichan / wmafsex ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
Verification *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.1022889>>1022950 >>1022955 >>1023059 >>1023074 >>1023862 >>1025003 >>1026566 >>1036987 >>1046896 >>1047098 >>1047107 [Watch Thread][Show All Posts]

another proofs of Tor Project being owned by CIA

https://trac.torproject.org/projects/tor/ticket/28838

>This function is currently around 9% of our startup time, and it does a bunch of curve25519 operations. We could make it a bunch faster, since our curve25519_basepoint function has not been observed to fail in the wild.

>Resolution: → implemented

https://trac.torproject.org/projects/tor/ticket/28851

> After the #28837, #28838, and #28839, I note that we're now spending about 24% of our of our startup time in crypto_validate_dh_params().

>Since our diffie hellman parameters are hardcoded, maybe we don't actually need to validate them on every startup, especially on clients?

>Resolution: → fixed

they trade performance over security. they implement tiny performance gains at expense of security, privacy of users

maybe someone orders them to do that

TOR PROJECT IS COMPROMISED, DO NOT TRUST THEM

 No.1022891

brb, uninstalling Tor Browser, installing Google Chrome instead, to be safe


 No.1022893>>1024655

>ever trusting (((Tor))) in the first place

Search "PTHC" on Google Chrome and wait for the glow-in-the-darks to show up and fuck your ass


 No.1022922>>1022947 >>1022948 >>1022991 >>1025003 >>1046896

Anything using C can't be related to performance or security. If this check is really unnecessary, 1970s optimization techniques would be able to turn that check into "true" at compile time, but this is written in C and the semantics of C are "gee, I don't know, whatever the PDP-11 compiler did." This is another example of C and UNIX weenies taking a big shit on decades of computer science. Browsers are also tens of millions of lines of code because web "standards" are made in the UNIX style of hacks and kludges instead of being designed by smart people.

https://github.com/nmathewson/tor/blob/68c52f2e7c202782c67479d489bd30f5466fe1b3/src/lib/crypt_ops/crypto_dh_openssl.c#L53

Looking at the code, it's just a simple usage of bignums, which Lisp could evaluate at compile time. This could even be a compile-time error if it's false.

Speaking of C and UNIX sucking, I got this error when looking at those links.

>The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.

>Apache Server at trac.torproject.org Port 443

Subject: Think how much faster and more efficiently this
smaller program is able to trash the filesystem compared
to a bloated AI-weenie one (which would all its time
checking for uninitialised variables, doing bounds
checking, allocating and freeing storage, actually caring
about exceptional cases, signalling errors, etc.)


Sender: MY

From: KB
Newsgroups: comp.bugs.4bsd.ucb-fixes
Subject: V1.92 (4.3BSD-Reno fsck fix)
Date: 14 Dec 90 00:10:24 GMT
Organization: University of California at Berkeley
Subject: 4.3BSD-Reno fsck fix


Description:
There is an uninitialized variable in the version of fsck(8)
distributed with 4.3BSD-Reno which can cause fsck to destroy
the file system instead of repair it. Note, this problem is
ONLY found in 4.3BSD-Reno systems.

Fix:
Apply the following patch:

[...]


 No.1022947

>>1022922

>I got this error when looking at those [OP] links

http://archive.fo/ufZH4

https://archive.vn/8Njlu

All up for me.


 No.1022948>>1022949 >>1023013

>>1022922

Lisp users are like a cuck of the computing world. You sit in the corner whining with your little weenies while C programmers dominate your computers.


 No.1022949

>>1022948

You know I shouldn't have said Lisp users because most of you don't even use any software written in Lisp. Lisp fanboys it is.


 No.1022950

>>1022889 (OP)

So whats the alternative? A botnet browser that has completely unique fingerprint? No thanks, not going to go to something even worse.


 No.1022951>>1022958

Use i2p? I've been using it for some time now, mostly to listen to pirate radio and get some free shit, but I would reccomend it if TOR has gotten too gay for you


 No.1022952>>1022954 >>1047237

I was screwing around with ipfs yesterday - I think that its just a file brotocol sysdem, but to have a larger and larger user-base would basically negate the need for what was intended by tor.

using i2p in conjunction with ipfs sounds redundant to me, but it breddy much guarantees anonymity imo

amirite?


 No.1022954

>>1022952

QmS3Yg1BJM5Y6c97VjqLE2Ua9DsMfMrPPnxHcuLR3ZpeBs very_important


 No.1022955>>1022957 >>1023028

>>1022889 (OP)

>another proofs of Tor Project being owned by CIA

It's no such thing.

>they trade performance over security. they implement tiny performance gains at expense of security, privacy of users

Nothing about these changes compromises the security or privacy of users. Do you even understand the changes that were made? If not, you have no basis for making the claims you have. If you do, please explain, with details from the code, how these changes decrease the security and privacy of users.

Or fuck off, LARPer.


 No.1022957>>1023059

>>1022955

>FBI has managed to infiltrate just about every single organization on their watchlist

>but it's absolutely impossible that the CIA has infiltrated the TOR project


 No.1022958>>1023074 >>1037211

>>1022951

I was talking about browser/device fingerprinting. At bare minimum if I were to use another browser I would have to have javascript disabled 24/7 yet I still could be fingerprinted to specific browser, on specific os, connecting from specific anonymity network at certain times. And that would be a sample of max few thousand users in best case scenario. Now if I install browser plugins or use a browser that is not common, or visit sites/content that aren't common I have completely unique fingerprint.

Also browsers like firefox by default send your browsing history to OCSP servers and unique hash of downloads to google. It's a game of whack-a-mole with you never knowing how firefox will try to fuck you over next time.


 No.1022991

>>1022922

>Anything using C can't be related to performance or security.

Found the rust shill


 No.1023013

>>1022948

XPde is a good lisp program...

but 1/2 the functionality is broken on 64 bit systems... somehow


 No.1023014

Reminds me of the time, for years, a game engine would load the same assets on connect and mapload. 2x the time for no reason. Was eventually fixed.


 No.1023028>>1023059 >>1023061

>>1022955

I do think not verifying the hard coded DH params at boot could be a security risk, what if spooks manage to change them to weaken encryption and there's nothing checking that?


 No.1023059

>>1022889 (OP)

>they trade performance over security

Not using 1GB keys is "trading performance over security".

You need to make a cutoff somewhere.

>>1022957

Learn to read nigger, absence of proof is not proof of absence.

>>1023028

>what if spooks manage to change them

At that point they could also hex edit the validation code to always return true.


 No.1023061

>>1023028

>What if spooks manage to change them?

Then your fucked, kiddo. At that point they could modify arbitrary code, and wouldn't even bother messing around with tor.


 No.1023074>>1023085

>>1022889 (OP)

>tor is fucked

TorFork or I2P migration.

Any Tor forks or better, anons?

>>1022958

>OCSP privacy issue

Disable OCSP. That's what Tor does.


 No.1023085>>1023285

>>1023074

>Disable OCSP

Then the Certificate Authorities (CAs) know your metadata instead, you dumb fag.


 No.1023285>>1023366

>>1023085

>Disable OCSP

>Then the Certificate Authorities (CAs) know your metadata instead, you dumb fag.

How? Can you explain?

and whats OCSP?


 No.1023366>>1023419

File (hide): ac450bb81533309⋯.jpg (14.32 KB, 480x360, 4:3, hqdefault.jpg) (h) (u)


 No.1023419>>1023445

>>1023366

Yeah nigga, FUCK WHITE PEOPLE!


 No.1023445>>1023688

>>1023419

you stupid newfag that song is called OPP it's about hacking that's why they sing "you down with OPP?" because it means Other People's Pc's which is what they are hacking


 No.1023685

I don't trust Tor Project


 No.1023688

>>1023445

Didn't watch the vid.

But it sounds like you're talking about McHawkings


 No.1023862

>>1022889 (OP)

>Since our diffie hellman parameters are hardcoded, maybe we don't actually need to validate them on every startup

>at expense of security

how?


 No.1024655

>>1022893

they showed up and watch me fuck my own ass instead


 No.1025003

>>1022889 (OP)

>autistic thread about how Tor is compromised

>>1022922

>anti-Unix fag comes in and drops a huge derailment shitpost


 No.1025758>>1025882

so Tor is compromised now?


 No.1025882

>>1025758

no, learn2read


 No.1026554>>1026562

TOR is staffed by ex-NSA employees with falsified identities


 No.1026562

>>1026554

>says the NSA shill


 No.1026566

>>1022889 (OP)

>startup time

so no real visible performance improvements then.


 No.1036985>>1037080

LOOK AT THIS /pol/TARD

http://archive.fo/7nKHe


 No.1036987>>1037064 >>1037962 >>1037970

>>1022889 (OP)

No shit.

>doesn't ship with uBlockOrigin

>doesn't ship with uMatrix instead of noscript

>has js enabled by default


 No.1036994

This thread was shit in January, it was shit in February, and now somebody has managed to drag the shit into March. Neato. It was frozen shit before. Soon, spring will arrive, and the shit will melt and smell up the whole place. April here we come!


 No.1037064>>1037075 >>1037962

>>1036987

Not to mention

>instead of disabling JS by default, they patch 192857192487 little leaks in the JS engine

Why do the simple and correct thing when you can do busy work, right?


 No.1037075>>1037099

>>1037064

Patching leaks is still a good thing, but yes they should enable the highest privacy profile by default.


 No.1037080

>>1036985

can you say what is wrong with his claims?


 No.1037099

>>1037075

Patching leaks in a sieve is a complete waste of time on par with maintaining a malware blacklist and it easily eats up most of their development. Ironically, I'm pretty sure Appelbaum criticized exactly that (something like "most of our time is spent on a firefox fork while hidden services still don't work"), but I can't find the log pastebin now, years later. Always save everything.


 No.1037211

>>1022958

>browser fingerprinting

Just accept a different browser fingerprint for each persona and never cross them.


 No.1037962

>>1036987

>>1037064

Ironically, they could just remove noScript and add uBlock Origin but have it pre-configured so that it disables JavaScript by default and has the "advanced features" enabled to let users unblock specific JavaScript sources. uBlock is then essentially noScript+ad block+domain blocker, just with an easier interface. Tor devs said once that the only reason they aren't including uBO in the bundle is because it updates hosts files automatically and has multiple sources, which is an easy to solve problem.


 No.1037970>>1038048 >>1038097

>>1036987

Tor Browser is also used to evade censorship in certain countries to access websites such as youtube, facebook etc. so javascript needs to be turned on by default. This is the official rationale for keeping javascript on by default:

> The existing way that the user expects to use a browser must be preserved. If the user has to maintain a different mental model of how the sites they are using behave depending on tab, browser state, or anything else that would not normally be what they experience in their default browser, the user will inevitably be confused. They will make mistakes and reduce their privacy as a result. Worse, they may just stop using the browser, assuming it is broken.

>User model breakage was one of the failures of Torbutton: Even if users managed to install everything properly, the toggle model was too hard for the average user to understand, especially in the face of accumulating tabs from multiple states crossed with the current Tor-state of the browser.


 No.1038048>>1038093 >>1038097 >>1038116

>>1037970

but wont increasing the security level to turn off javascript change your fingerprint to a much less common one? im sure that most people use it with the default setting that has js enabled so the paranoid people here would have a different fingerprint


 No.1038093

>>1038048

What is the meaning of having a unique browser fingerprint when nobody knows who you could possibly be when you are using Tor?


 No.1038097

>>1037970

>the users have come to expect being fucked in the ass in the name of convenience, so better not change that

>even though he went out of his fucking way to install tor

I hate this meme.

>>1038048

No, because the vast majority of fingerprinting techniques only work because of Javascript. Without it, you have much less to go by.


 No.1038116>>1038119

>>1038048

Without JavaScript you're just a generic <insert OS here> user. With JavaScript there's a lot more information given, plus js exploits can be used to not only identify you but also infect you with malware.


 No.1038119>>1038126

>>1038116

Note that even the OS part can be hidden easily if you disable/replace the user agent string, though note that if you replace it with something dumb, you obviously stand out more. Also some sites break/block clients without UAS. I can recommend HTTP Header Mangler for this.


 No.1038126

>>1038119

Reminder that your actual OS/architecture can be detected even if you spoof the user agent, but only if you have js enabled.

https://panopticlick.eff.org

https://browserleaks.com/


 No.1046354

The only problem I see here is that DH params are hardcoded.

I hope tor devs change them regularly.

https://weakdh.org/


 No.1046896

>>1022889 (OP)

>we should check 3 numbers at runtime for no reason because we're too retarded to be trusted to get it right at compile time

damnit /pol/

>>1022922

Uhh what does DH_set0_pqg do? Is this like RSA where you have to check if numbers are coprime and shit? I don't think any optimizer can remove these. If you're just thinking of some retarded shit like evaluating it at compile time, that will just transfer runtime delay to compile time delay (which could be hours depending on the application).


 No.1046998>>1047029

Next, you'll tell us that we shouldn't get VPNs because that's what the NSA wants.


 No.1047029>>1047042

>>1046998

Not sure if sarcasm or reddit.


 No.1047042

>>1047029

Reddit totally


 No.1047070

The only problem I see here is that DH params are hardcoded.

I hope tor devs change them regularly.

https://weakdh.org/

Also fuck the NSA censorship spammer.


 No.1047098

>>1022889 (OP)

you chose performance over security by posting this on pigchan, cuck


 No.1047100

>300 posts of spam ITT

>mods do nothing

LMAO @ the absolute state of 8cucks


 No.1047107>>1047109

>>1022889 (OP)

>tor browser

The sole purpose of that bloatware is for the masses to make noise on the Tor network, while people who know what the fuck they are doing use a Tor gateway on a hardened network with DPI and proper firewall settings.


 No.1047109>>1047110

>>1047107

do you even know what half of those words mean?

also: can the admin delete the spam ITT?


 No.1047110>>1047111 >>1047129

>>1047109

all of them combined means you're a fucking idiot that cannot formulate a technical argument.

also: mode please ban that poster


 No.1047111


 No.1047129

>>1047110

Mods, can you ban this guy instead?


 No.1047165>>1047180

I say that Tor Project is the say shit like ussing a clearnet firefox with addons, same shit.

Do you know that Tor Project have implemented Tor Guards, wich is the first server in your tor network wich always will know your real ip adress because when you connect in tor network you connect like so:

Your Real IP (Your PC) connect to --> Tor Guard wich connect to--> Tor Relay wich connect to --->Another tor relay wich connect to --->Another tor relay wich conect to -->Tor exit relay.

Tor Guard know your real ip and exit relay know what you do, anyway i talk with tor project staff on freenode and asked them if this tor guards log us in any way.

The official answer from tor project dev team was that tor guards yes it log you but not to affect you in anyway.

I say it is bullshit, when you log me even 1kb it is logs, and i don`t belive that Tor Guards are not log all, I say that tor guards are loging all what us do inside tor network, a tor guard can log anything about you, almost anything like, when you connect, when you disconnect, your real ip, what sites you visit, you know tor guard first server and last server in tor network the tor exit relay know anything about you, i mean tor guard know who you are, your real ip, date when you connect/disconnect, real ip etc. and exit relay don`t know your real ip but know what you do, all tor guards ip servers are public same as tor exit relay servers ip are public. So ... anybody who have access to this tor guards public ip servers, have access to anything you did/do on tor network and to put you in jail they have logs files wich they take this logs from tor guards and compare with the logs files from the exit tor relays, and you go to jail, this tor guards never change in a period of 3 months, they are the same for 3 months this is how much the NSA made to log you, after this 3 months they take and verify the logs, and you get another tor guards.

TO USE TOR BROWSER/NETWORK IS SAME SHIT AS USSING A FIREFOX ON CLEARNET WITH ADDONS WITH YOUR REAL IP! SAME SHIT! GOOD LUCK ! Start ussing i2p or i2pd or freenet project and connect to your friends not to strangers for extrem higly security! But best is i2p!

Use https://www.tixati.com or https://www.fopnu.com or https://www.supersimpleserver.com

or https://www.geti2p.net or https://www.freenetproject.org

Anything but not tor! Tor is not safe, I belive more than half of tor project devs team are NSA undercover agents! Fuck NSA!


 No.1047180>>1047320

>>1047165

this is a known attack and doesn't work very well as tor has taken precautions against this, especially when it was analyzed in depth in like 2008 or so.

if you know of a way to do it better, please share.


 No.1047237

>>1022952

>using i2p in conjunction with ipfs sounds redundant to me

>I'm a retard that think ipfs offers anonymity and security, when it doesn't and has never claimed to.


 No.1047320>>1047378

>>1047180

how would it even work if they dont know what address you want to access?


 No.1047378

>>1047320

I think the tl;dr guy said that when NSA owns entry and exit relay they can do time and size correlation to guess that it was you who visited penisland.net

But with packet padding and a shitton of people using tor all the time this attack is pretty impractical irl.

Some pretty leet security guy did some research on this back in the day and the deep state shills spread a plethora of FUD articles based on his findings so the tor devs blogged their reply and the study's author posted a comment confirming angrily that indeed this was just FUD and not at all what he had written.


 No.1051969

the new sha4 is superior to sha3

nigger monkey




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
70 replies | 3 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / caco / chemo / dempart / general / idchan / vg / vichan / wmafsex ][ watchlist ]