[ / / / / / / / / / / / / / ] [ dir / agatha2 / b2 / choroy / dempart / freeb / mde / trap / vichan ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.1062841>>1063014 >>1063033 [Watch Thread][Show All Posts]

How can we trust Tor nodes or server of any type, when they use botnets like Intel ME, AMD PSP, Systemd, HDD firmware?

If you own server you don't own it, Mossad is the true owner of your server

 No.1062844>>1062959 >>1062960 >>1062993

gonna need more than that to get me to stop, cia. You cunts can't even bust pedos with that shit how tf.


 No.1062959>>1062962

>>1062844

George Mason University - Center for Humanities and New Media - Children & Youth in History: Age of Consent Laws by Stephen Robertson, University of Sydney, Australia

https://chnm.gmu.edu/cyh/items/show/230

https://anonfile.com/X9y24aq7n8/George_Mason_University_-_Center_for_Humanities_and_New_Media_-_Children_Youth_in_History_-_Age_of_Consent_Laws_pdf


 No.1062960>>1062962 >>1063026

>>1062844

TEDx | Pedophilia is a natural sexual orientation | Mirjam Heine | University of Würzburg

https://archive.org/details/TEDxPedophiliaTalkFull


 No.1062962

File (hide): 79dc96c6e24446b⋯.jpeg (41.18 KB, 500x500, 1:1, police.jpeg) (h) (u)


 No.1062993>>1062996

>>1062844

They don't bust them because they don't really give a shit about them.


 No.1062996

>>1062993

They don't bust them because they are the pedos.


 No.1062999>>1063003

Let me remind Tor worshippers that there are nine nodes it automatically trusts, and if even half of them are compromised, all Tor's security is GONE: https://jordan-wright.com/blog/2014/12/19/what-happens-if-tor-directory-authorities-are-seized/


 No.1063003>>1063010

>>1062999

Oh I'm sure an article from 2014 is still accurate with all the shit they've changed and updated in the 5 years since.


 No.1063010

>>1063003

Uh, yes it is still accurate. Just no one is speaking about it (coincidence?). Fortunately Tor's own site admits the issues in a roundabout way of course: https://2019.www.torproject.org/docs/faq (2019 recent enough?)

>The directory authorities provide a signed list of all the known relays, and in that list are a set of certificates from each relay (self-signed by their identity key) specifying their keys, locations, exit policies, and so on. So unless the adversary can control a majority of the directory authorities (as of 2012 there are 8 directory authorities), they can't trick the Tor client into using other Tor relays.

So the adversary CAN trick the Tor client into using other Tor relays if he can control the directory authorities.

>How do clients know what the directory authorities are? The Tor software comes with a built-in list of location and public key for each directory authority.


 No.1063014

>>1062841 (OP)

I compromised your mom last night OP.


 No.1063015

whoops forgot to sage


 No.1063026


 No.1063032>>1063048 >>1063063 >>1063077

File (hide): 9f650835690ae71⋯.png (14.13 KB, 220x220, 1:1, i2p.png) (h) (u)

i2p doesn't have these problems as far as I'm aware but the network is also essentially dead for anything but torrenting at 100kbps. I'm under the impression that its supposed to be faster than tor on paper but in the current year it definitely isn't. i2pd seems to be the way forward since it doesn't rely on java. Does anyone know why tor has become the end all be all in terms of markets and other criminal activities? I don't see why it lacks that popularity other than the fact that its a bit more difficult to use.


 No.1063033>>1065607

>>1062841 (OP)

Tor was always compromised. It was created by the USA military. Also edward snowden recommends it which is a big nono.


 No.1063048

>>1063032

>Does anyone know why tor has become the end all be all in terms of markets and other criminal activities? I don't see why it lacks that popularity other than the fact that its a bit more difficult to use.

Tor allows you to access clearnet. many people install it to browse clearnet. they can learn to use .onion sites later


 No.1063063>>1063078

>>1063032

> but the network is also essentially dead for anything but torrenting at 100kbps

You're definitely not looking close enough, but you might not like the content :^)


 No.1063077>>1063078

>>1063032

> I'm under the impression that its supposed to be faster than tor on paper but in the current year it definitely isn't.

It's not supposed to be faster at all. More secure though.

If you're not behind a NAT it's probably faster to use.

i2p isn't know for rampant cp


 No.1063078

>>1063077

last lines was for >>1063063


 No.1065607>>1065637

>>1063033

new here, what's wrong with edward snowden recommending it?


 No.1065637>>1065677

>>1065607

Hi, the general consensus is basically like this: Edward Snowden is CIA operative whose purpose was to leak fake information about surveillance to scare the general populace into submission and herd privacy minded people and dissidents into snakeoil/honeypot projects like tor to filter them for further investigation.

>If someone recommends for something it's CIA.

>If someone recommends against something it's CIA.

>If someone doesn't have an opinion on something, still probably CIA.

You are welcome newfag, remember thorazine tablets chemically castrate you, don't eat them.


 No.1065643

Yeah, shit is all compromised but not because of hardware botnet although that is a thing but because 90%+ of those nodes are literally owned by the feds.


 No.1065677

>>1065637

Actually you are partially right. The TOR project started out as something for the genuine usage by CIA operatives but turned into a let the public use this to hide our operatives thing. The software behind TOR, the vpn, is technically sound. Its just all the requirements to use it like avoiding the 90% pwned nodes and the bridges services autologging your IP see https://archive.fo/XRiS4 at line 312 makes it difficult to use without breaking your opsec. Sure its possible, but things like i2p and standalone bridge software exist so weigh your choices carefully.

Oh by the way if you ever requested a tor BRIDGE from their database you had your IP logged if using a proxy, which you should be using you faggot


 No.1065689

>If someone recommends for something it's CIA.

>If someone recommends against something it's CIA.

>If someone doesn't have an opinion on something, still probably CIA.

What a completely sensible viewpoint. Surely this advocate is a reasonable chap with reasonable rationality.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
23 replies | 2 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / agatha2 / b2 / choroy / dempart / freeb / mde / trap / vichan ][ watchlist ]