New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
How many tor relays currently do you have?
This discussion has been closed.
Comments
Okay.. You're clearly immature. Attacking me on a personal level doesn't make your argument valid. I'm not going to waste my time talking to you anymore.
It's like using Gmail/Hotmail while it's already compromised by governments'.
Avoiding government compromised services means trusting third party person (mxroute for example).
Immature? Is that like some kind of insult you are trying to express? Because here I was having fun at your demonstrated inability of using the basic tenets of logic and somehow you're feeling sour about it and can't resist the urge to express yourself in such a way so as to avoid
the iconification of intellectual competencefeeling bad? Right.Furthermore, I am not sure why you equate my mocking of your words as a personal attack. Clearly, I do not plan to enslave you or cut off parts of you, so how does that constitute an attack? Are your words by matter of definition the antithesis of foolishness? If not, how is the description of their inadequacy of conforming to reality an attack and not merely an act of describing the said inadequacy? And, to be blunt, why do you feel that you being lacking on this department, is a shameful event, worthy of being attacked as?
Talking about security in absolutes is immature. The first lesson of security is that nothing and nobody is perfect, and no tool is going to do everything. One has to plan every situation specifically and know that the quality of the result is limited by, and can only be as good as, one's skill level.
@deadbeef You know what I just edited. Just one step too far. I feel like we're cool enough that I can do that and you'll understand.
No problem. Had to read a bit to realize which one of them I was just picking them out of the rolodex to check for the responses. Gotta keep those provocateur skills honed. Sorry for busting your balls - wasn't my intention - getting out of the thread. Cheers.
It doesn't matter if an exit node is compromised, because:
1) nobody sane does any plain protocol over Tor anyways (only browse HTTPS websites, connect to IRC using SASL and TLS, etc, so that an exit node can't capture or mess with your traffic);
2) as mentioned above, there are three hops in a circuit, and those controlling the exit node STILL can't find your real IP address. Even with controlling two of the three it's still going to be tricky; and as long as regular non-evil people like us also run relays, the likelihood of that will be low.
I provide multiple Gbit and NEVER had this issue, this ONLY happens if they are inside the same network or /24 and this is NOT admin ban but automatic by the network.
A bunch are owned by a company on the Seychelles with no owner. Secure enough. One is incorporated in Liberia which has no government to speak of, a few are in countries with none either.
Not a risk at this time.
Further, moot, SSL is uncracked - run plaintext over an exit and you are an idiot anyway and deserve it.
The fucking Tor source? The chaining is secure and unless you are a top level actor, in which case acting would be not in your interest anyway, there is zero way to reverse it at this time. Zero cases in any court worldwide (both US and EU disclose sentences semi-public; EU just no/not much content) have been decided by a reversed Tor chain or a cracked SSL certificate of a HTTPS/SSL connection on an exit.
Wrong, internal (onion) is NOT a 3 chain. You seem to have no idea.
The entry, bridge and it is not much relevant, you cannot prove the traffic is the same unless you hold all keys which is naturally impossible if the connection is end-to-end encrypted. This is not enough evidence for a sentence in the US in any way without either compromising your source computer or the target server.
Bullshit, as there is nothing that comes even near in terms of network size and security - all others are BY DEFAULT due to less nodes more insecure. No point.
Real trust-worthy bunch who I'm sure have never thought of just handing over the relays for a few million $_$
Handing over a relay is pointless? It only sees relay/bridge and exit traffic, if at all, encrypted by keys it does not have and will never get. Buying all relays would help you but as at least 25% are ran by reputable organizations (eg. Torservers) gaining a network majority is very unlikely without major notice.
Kind of hard to also pay someone for something if you do not know the owner (in SC you do not need to have one at this time; a lawyer is all entered and you never have to show any ID unless you want a bank account).
Your entire point is also idiotic as i can just avoid the owner entirely and pay the DC; the IP of the relay/exit is after all public.
Please figure out how Tor and public/private cryptography as well as SSL/TLS works (and then also quantum computing to reverse RSA/DSA, then you can go on to quantum safe algorithms).
Same for an exit, as long as the stream is encrypted controlling it is pointless - The Iranians turn on exits inside Iran all the time (for whatever reason, it is fairly pointless, everyone knows it's the gov as normal connections can't even connect and surely not run relay/exit) which are nearly immediately kicked automatically as bad.
This is why im here, keep on the discussion. Good stuff.
Oh.. is cyber monday... $
Tor is broken; sure every platform has its proponents but why hold onto a platform that is broken by design and is ripe for exploits?
Member Riffle?
Despite saying I was out of this thread, I'm going to respond because it's @William.
a) Your argument is exactly the same as "OpenSSL is secure, see the source." We all know how that one ended.
b) Take a look at the Tor blog for a history and technical explanation of real-world-already-done attacks. Sure, they're not 100% no-false-positive but when was that a requirement.
a) Who cares about internal?
b) So you used a bridge and got an extra hop. Such wow.
c) You do know that the number 3 was chosen by the core devs for a reason, right?
I run 1 exit node and 2 relays
I wouldnt run an exit node because of abuse, but Im looking into running a relay.
Anyone with a clue? Hidden .onion sites are a major use of Tor. You could almost say the ability to exit to the plain Internet is secondary. Honestly at this point you're being an annoying dork just on purpose, to not get "proven wrong". Kindly shut the fuck up and go away already.
Sure buddy. I'm pretty sure you have plenty of data that compares onion vs exit usage to back that up... oh wait.
Please Mr. Big Bad @deadbeef, don't be so mean to my feeelz. I don't care about facts, I just want to circlejerk quietly.
Guys, I asked how many tor relays currently you have.
If you don't like tor or don't want use/plan please leave.
Some persons talking like security experts showing security issues in tor.
"Hey, I read this article and it says tor is not secure!!"
I love tor. All my junk traffic goes through there. And to top it off, I don't run any relay, I just leech traffic.
I know right? Like, how can one go say it's secure without being a hardened security expert? No responsibility for fellow people's security, I'll tell you that. Sad
Keep it civil.
You exactly CAN'T understand what others have pointed to you.
But hey you're security expert. Sorry kid.
To be clear, literally no one has pointed anyone to anything. This is just conversation here.
Sure pal, whatever makes you feel warm in the belly.
I wonder. How does it feel to be twice wrong on a single small line of text? Never experienced that, do share please.
@jarland please close thread because it goes nowhere due to kid.
Just don't forget to send the mandatory sobbing with a shoe on head pic.
Roger that. I see it that way too.