Germany has just proved that a large scale timing attack to deanonymize Tor users was not only possible, but actually easier on the resources needed for such an attack to be carried out than what was originally assumed by most. ISP focused attacks under government orders to identify Tor users are not in the realm of potential "what ifs" anymore, they're now a serious threat to the security of protocol. https://www.tagesschau.de/investigativ/panorama/tor-netzwerk-100.htmlThe article is in German. There is no good independent English source making a report about this yet, to my knowledge. Tagesschau is reliable, but not that knowledgeable on specific tech matters. >What happenedLaw enforcement agencies coerced major ISPs to monitor connections to specific Tor relays. By analyzing the precise timing of data packets, they were able to link anonymous users to their real-world identities. While such traffic analyses have been theoretically known to pose a threat to Tor, this is (AFAIK) the first confirmed usage of them being used successfully on a larger scale to deanonymize tor users.>ImplicationsOn a surface level, this is a good thing for most people because to them it means pedos could be brought to justice more easily. But looking deeper, the obvious implications for the longevity and purpose of Tor network as a whole are extremely concerning. The involvement of a major German ISP raises serious questions about the future of online anonymity and the power of the current tools people use to protect their privacy. Especially now that there's a practical example for other governments to follow and apply as well. The methods required behind attacks of this nature are lighter on resources and easier to implement than what most users thought. So what's next for freedom on the web? i2p? Complete capitulation, eating the bugs and owning nothing?
tor was always a honeypot, nothing new
works on my machine
timing/correlation attacks on tor by adversaries monitoring multiple autonomous systems is not a new thinghttps://arxiv.org/pdf/1505.05173
>still using torWhat are you, a pedophile? Criminal? What do you need to hide?
guys if I get deanonymized what will happen
>>102439100I downloaded HBO series "the last of us" and watched it without paying anyoneIt was okay, a bit too far fetched and video-gamey for my tastes. Also they just had to throw in a couple of men having sex because, reasons.
>>102439099But not one so easy
Just use a bridge lol
>monero doesn't work and can't hide your traces unless you have a very autistic setup>now tor can be deanonymized by low level state actors It's genuinely over
>>102439172I2P
Mixnets never ever.>inb4 nymshit>>102439039>So what's next for freedom on the web? i2p?i2p is better, but a lot of its benefits stem from being primarily intended for dark web usage - as opposed to a glorified VPN for clearweb browsing. If you use a gateway to browse clearweb through i2p, it's basically as bad as Tor, if not worse because there are far fewer gateways due to not being a primary usecase.A mixnet would be a HUGE improvement. But nobody's bothered to build one yet, and it's not very easy. Except Nym, which tied the project to cryptoshit for some reason.>>102439172>monero doesn't work and can't hide your traces unless you have a very autistic setupRunning your own node has ALWAYS been the standard and recommended way to do things, retard.
Theu probably won't blow up their honey pot just to catch (you) and your cretinous sexual appetites
>>102439099Even your document is only talking about theoreticals and treats the strategies as last measure options. Now it's a common threat which post people won't be able to defend against
>>102439039unless they decrypt the packets all they know is that you are connecting to a tor relay, same way as you would be connecting to 4chan or reddit.>what if the feds own the relays that can decrypt, store, re-encrypt and forward your trafficthis is what actually happens.
>>102439170keeps btfoing Russia so you can be sure america has no chance.
>>102439357they can just ask for 4chan or reddit's traffic retard, same as anything elseso once they know it's you who sent those "encrypted packets", it's game over, unless you're connecting to some chink or russian site maybe (and that means owned by chinks/russians who are willing to defi US laws, AND hosted on chink/russian servers)
>>102439411the point is that if the server has nothing to show to the feds then a subpoena accomplishes nothing.The servers need to be compromised in the first place to be threatening.
>>102439172>>monero doesn't work and can't hide your traces unless you have a very autistic setupfud
>>102439320I don't actually use tor to download stuff, I just go on pirate streaming sites and watch it. I don't need a copy after I've watched most things.
>>102439482>i magically watch this thing without it being in RAM or swapped on diskfeds dont know if you are clicking ctrl+s, they know you clicked on the video
>>102439518I don't care I just want to watchI don't need a copy for myself so the various fmovies-style sites are good enough for me
>>102439103We don't talk about it...
At the risk of sounding retarded, why aren't Tor nodes themselves (the people hosting them) criminally liable?Like, let's say you're a government and you want to stop TOR: Can't you arrest the people hosting the nodes (and demonstrate they helped curry illegal material)?
>>102439905Well the point of Tor is not knowing what traffic went through what node. Once you deanonymise traffic, yes, you could do this kind of thing. Problem still though is nodes run as dumb as possible and only see encrypted data. There's no point where they're hosting anything; it'd be like prosecuting ISPs for having switches and network devices that illegal content flows through.
>>102439905probably for the same reason gun, car, and pager manufacturers aren't liable
>>102439103The feds will know all the transphobic posts you've been making on the farms and will send you to mandatory gender reeducation surgery
>>102439320mexico1 was gucci
would it be possible to send the packets to different nodes to thicken the smokescreen ?
>monero ded>tor dedat least I can still count on SurfShark and NordVPN to keep my online identity private.
>>102440027tor works on top of tcp
>>102439039Correct me if I'm wrong but would connecting to a vpn not fix this issue?
>>102440176they recommend to not connect through a vpn. i wonder why
>>102440189Because then the VPN provider can see you're using tor. Plus it might interfere with the routing on your system and leak traffic.Tor is made with paranoia in mind and some things they do don't make sense at first. If you read their documentation and their advice they explain it all though.
>>102439275>i2p is betterIn what way? How does i2p protect against ISPs colluding to cut down relay connections to see what goes down?
>>102439039GNUNet
>>102440205Just use a private or self hosted VPN
>>102439931he probably means the exit nodes
>>102439039it is well known that isps share traffic data with each other freely for anti ddos and flooding reasons. it may not be glownigs that get the data, but random ass network engineers sure do.it's why you should never trust low latency networks like tor for anything serious. anyone trying to gaslight you into thinking that the deficiencies of this architecture could even possibly fit anyone's threat model at all is banking on your ignorance and retardation.I do enjoy using it for its exit nodes. it's a free vpn, especially for torrents>>102439172monero on the other hand is not compromised. unlike bitcoin and tor it was not invented by glows
Based, pedos must die
>>102440407Because the hidden services aren't in the clearnet, it's much harder to do traffic analysis. You basically need to compromise every datacenter hosting every single node and get live memory dumps (assuming they're configured properly), because any node could be hosting services. It's similar to Tor hidden services. Notice how the vast majority of TA attacks involve exit nodes and subpoenaed website operators? Well i2p explicitly discourages being used as a VPN/proxy, and encourages hosting everything inside the network itself.
>>102440873Not him but1. shut down random ip connected to i2p2. 'p website goes downdoesn't that mean you have the guy idk if that's what they mean
>>102440205But your ISP (not trusted btw, logs 100%) can easily get any metadata without VPN. Are you retarded?
>>102440959I2P is an onion router like torThere are several differences though, and the main one is that everyone relays a percentage of traffic and your traffic gets mixed with others during hopsA percentage of traffic is also garbage by design(you can disable this, but it's a bad idea)
>>102439039Good, nobody should use glowieware
>>102439039>So what's next for freedom on the web? i2p?This or hosting your own node. What really interests me is if bridges are more easily discovered or not.
>>102440052>>monero dedStill not true fren
Testing if i am allowed to post. Interesting that my posts in this thread are shadow'd while my posts in other threads are not.
>>102443177Well I was just trying to point out that this "vulnerability" has been well known for 30-40 years, even before this software was made. It became possible for even rando companies to do this like a decade ago, lol.
You were glow-warned years ago
>>102439100>le pedospedos are use facebook
>>102439039Who cares. Just dont watch child porn or do drugs. How hard is that
>>102439039Fuck. I guess when America goes full authoritarian I'll have to cut the cord.
>>102439100ok glownigger
>>102439039>VulnerabilityIt's been compromised for some time now.Just don't be a tard online and you'll be fine.
>>102443259Most articles I've seen mention snapchat and telegram
Hello anons, let me introduce you to a novel concept in the form of an acronym - SEWThis stands forSOMEONEELSESWIFIYou see niggers and naggers, with a wifi extender you can reach a range in the multiples of miles, many wifi access points are unencrypted to encourage business, alternatively you can use tools in kali linux to access your neighbors wifiI hope this has been eye opening to the clinically retarded who overthink security every time it comes to mind
>>102444200discord youtube.......
>>102439936You mean The Tor Project is a group of huge corporations with a powerful lobby?
>>102443259>>102444200Telegram is mostly a boogeyman because it refuses to work with the feds. There's definitely pedos on there, but not nearly as much as on Western messenger services and social media.
>>102444320>Okay this 90 year olds wifi was used who might be the suspect.. the other 50-90 year old neighbours or the 30 year old guy downstairs working in ITGenius move kiddo.
>>102443266And also don't be an activist, don't be a journalist reporting negatively on the government, don't look into parts of history the government doesn't want you to see, don't look into current government lies, don't question things. Just be an obedient model citizen, ready to bend over and take the government's cock when asked to.
>>102446330>it refuses to work with the feds.>t. lives in 2018
>>102446500>strawmanOk
>>102440176the vpn provider will decrypt your traffic
>>102439275>i2p is better, but a lot of its benefits stem from being primarily intended for dark web usage - as opposed to a glorified VPN for clearweb browsing.But then what's the point? Do you have (historical) news articles on I2P? Research journals? Analysis and discussion of forbidden ideas? Does it help people evade mass surveillance and censorship in countries where more advanced web blocking is in place?
>>102440176No, they would realize that some VPN is connecting and then ask the provider to give out your info or just use a timing attack again, this time way cheaper btw. >>102440189Because that's what bridges are for and if you're that concerned you can host your own bridge.
so they can identify a tor user but not what he is browsing, so whats the point of this? did i understand it correctly?
>>102446592>Thinks there's anything worthwhile in the clearnet>Pro CPAh checks out
>>102446539It is called a counter-argument you fucking child
>>102446539How is it a strawman? You implied deanonymization isn't a problem unless you watch CP or buy drugs. Glowies around the world have a documented track record of spying on (and sometimes disposing of) activists, journalists and other dissidents.
>42069 eyes intelligence network has eyes literally everywhere>you really think you werent already boned before by this intel network having a large collection of tor nodes for yearsIts not that im not objecting to the privacy violation, but pedophiles use tor on windows 10+ (known nsa spyware) and they literally never caught two people who tried to kill trump until it was almost too late. Regardless of how intrusive this shit is, the government obviously is too incompetent to be able to use it. That or theres something else theyre looking for that is much worse than pedophilia and people trying to kill a former head of state
>>102446617Not pro CP, just fully aware they're using the CP scare to curtail our freedoms. Just yesterday there was a thread (ironically now deleted) about an article which pushed for further weakening section 230 because omg pedos protect the children: >>102438285
>>102440957If someone hosts a website, there's a good chance that>The website isn't hosted on their home network>The website is on multiple networks for redundancy>The website is behind 7 (any potentially anonymizing tech) so the first IP you manage to find is just the IP for a random VPN on the other side of the worldIt's not impossible but it's extremely difficult, almost always the most difficult one. Social engineering is simpler, so if they do what you said it's after getting info out of people to confirm you're the one they're looking for and give you a few more years in jail.
>>102446518Anon, Telegram's CEO was literally arrested in France recently because he kept refusing to cooperate with feds.
>>102446727it was not an independent citizen that shot Donald Trump.
>>102439039just use bridges
>>102446414Copium, with a wifi extender you can have the range the size of a small city, and circumstantial evidence like you describe is routinely thrown out of court
>>102440027That's the "garlic routing" I2P does : different packets take different tunnels.
>>102447300No, they cooperated for years, just not enough. There were years in which europol even thanked telegram for cooperating. Instead use something were nobody can help state actors even if he wants to. >>102447602Not an applicable solution unless you host your own bridge.
>>102447626works on my machine, poor opsec from normalnigs with JS enabled is not my concern
>>102447307Lol who was it then? Do you have a source for this
>>102447661>works on my machineAnon, do you even understand what timing attacks are?
>>102447681yes, I don't think you do howeveryou assume everything is already compromised and a presumed guilty state so everything except absolute perfect anonymity is a gotcha
>>102439039>By analyzing the precise timing of data packetsif that's all there is, isn't it enough to just implement random delays on each node before sending a packet further?could even let users tag their requests with a wished randomness in the delay, which may or may not be respected by each relay. for example someone may accept up to 25% slower downloads to make timing less precise, and by default the protocol has 0-100ms random delay. something like that
>>102447707>you assume everything is already compromisedNo but I know that they will just go to whoever has that bridge and will tell him they know he's been hosting a bridge. You know, exactly how did with the entry nodes in the example given. This is why 'just use a bridge' isn't correct advice.
Is Freenet safe?
>>102447751>if that's all there is, isn't it enough to just implement random delays on each node before sending a packet further?Updates of the whole network take some coordination and also take some time. Also they are already rewriting a lot of it, pushing new features then won't help much. The real solution would be to find a way for more people to host nodes (especially guard and exit) or everyone finally switching to I2P. >>102447776Yes because no one cares about it.
>>102447761yes, they'll go to the public bridge registry that definitely exists and bring proof that the obfuscated traffic is TOR traffic they magically found using super secret back doors and the bridge will... show the logs it doesn't store? or will they just say you connected to this bridge within a week someone else did so we'll arrest everyone to be sure
>>102447776it's being called hyphanet now, the freenet one is infiltrated
>>102439039Well, this explains why everyone was trying to get me to turn off my vpn while using Tor.
>>102446265>From March 1952 until at least May 1956, however, the Micronite filter in Kent cigarettes contained compressed blue asbestos within the crimped crepe paper, which is the most carcinogenic type of asbestos.lulzthere was a lot of talk about asbestos being the miracle material in the 50shttps://youtu.be/tug_E9YKye0?t=23
>>102439039Yeah, this is a huge red flag. What used to be theoretical is now very real, and it’s not just about “bad actors” anymore. When ISPs can be leaned on to help deanonymize Tor users, we’re talking about a much bigger problem. This sets a precedent—governments now have a roadmap for how to destroy anonymity for anyone they deem "interesting." If it’s this easy for them to compromise Tor, then what’s next? Even something like I2P might not be enough once this playbook is out there.Sure, some might cheer because it helps track down criminals, but what happens when it’s used to suppress dissent or clamp down on free speech? The real question is, how do we respond? Is this the point where we just accept that true privacy is dead? Or is there still a way to push back against this, either by strengthening the tech or by pushing for real policy changes?Either way, it feels like we’re at a crossroads. Curious to hear what others think the next move is. Are we looking at the death of online anonymity as we know it, or is there still hope?
FUD THREAD DO NOT REPLY, SHILLBOThttps://blog.torproject.org/tor-is-still-safe/https://blog.torproject.org/tor-is-still-safe/https://blog.torproject.org/tor-is-still-safe/https://blog.torproject.org/tor-is-still-safe/IT WAS TARGETED ATTACK ON .onion RUNNING ON VULNERABLE OUTDATED SOFTWARE
>>102447751tor packets are obfuscated, their size is padded to 514 bytes>>102447897
>>102447619tor has stream isolation aswell, different destinations have different paths>>102447897
>>102447802Ok, you might be retarded. They have the IP since they have already talked to the middle node. That's even to find out the ISP and ask if any of their users in the specific area sends a lot of data to some of the IPs of the middle nodes they know. Then they go to the guy who has been hosting the bridge and will tell him that he needs to start logging or will face jail time. Now fuck off.
>>102447825How?
>>102447922>suddenly everyone is cryptanalysis expert>>102447897
>>102447786>Updates of the whole network take some coordination and also take some time.Though if it's just adding some random delays that can be done gradually as each node updates, no need for all to use it at the same time since even if it's just one node in the chain it still introduces randomness.>switching to I2PIs it easy to publish websites on I2P? Do they need to be static or can they be dynamic with login sessions?
>>102447942board is full of mossad nigger bots because of the exploding devices today, so fuck off FUDSHILLBOT KIKE
>>102447922>and will tell him that he needs to start logging or will face jail timeaha, so he'll just turn the magic log traffic flag all bridge software has built in and now they'll catch the meanieseverybody knows you only use one bridge all the time and he'll instantly comply without a warrant because he wants to instead of just turning off the bridgeglad to see that in your statist power fantasy everything works so smoothly anon, truly a model society
>>102447920Retard, stream isolation doesn't help when you're using fucking Tor browser. Read about what it DOES YOU MONKEY
>>102448015stream isolation works with tbb, every tab will go through different route>>102447999please read >>102447897
>>102447897>it's still safe>but we weren't given access to the documents
>>102448034>stream isolation works with tbb, every tab will go through different routeIt isn't stream isolation. Stream isolation is when you make a couple of SocksPort s and use them with different apps. All these ports with use different routes
>>102448039it was exploit against old chat software that didnt use vanguards, same exploit from years ago when vanguards wasnt in placerecycled garbage
>>102448039update your software browhen tor is updated it's actually good for you instead of adding ads to the start menu
>>102447938>>suddenly everyone is cryptanalysis expertNo, just saying 'just use a bridge' isn't a solution. >>102447943>Though if it's just adding some random delays that can be done gradually as each node updates, no need for all to use it at the same time since even if it's just one node in the chain it still introduces randomness.Then it depends on how many people even connect to those nodes. Also believable randomness isn't easy to create. It doesn't has to look like random noise. Let's say there were two users who directly connect to clear net sites. You know want to figure out who of those two users is actually just some bot randomly connecting to sites. Is it user A who connects to youtube, tiktok and sometimes google or B who visit xzudxs.org, sadasd.com and so on regularly? >Is it easy to publish websites on I2P?Pretty sure it's about as hard as it is for onion sites. I've never done either though. Right to privacy might have some info since he has an I2P blog. >>102447995>aha, so he'll just turn the magic log traffic flag all bridge software has built in and now they'll catch the meaniesNo, but they can just tell him to log it on a network level. The could also just do the same with the ISP and this specific user. This is exactly how timing attacks work. >everybody knows you only use one bridge all the timeSwitching bridges often isn't recommended, the same goes for guard nodes. I disagree with the decision but you gotta take that up to the Tor community if you wanna complain about it. >glad to see that in your statist power fantasy everything works so smoothly anonNo, I just understand how these attacks work and what the actual benefits of bridges are. Use I2P and fuck off.
>>102448075it wasnt timing attack or anything you are saying, it was deanon on onion service without vanguards
>>102448075no, I'll keep using Tor like thousands of others including the glowies themselves>>102448091yeah it's obvious he hasn't even read the article
>>102448097your apology is more valuable than any information
>>102448091>By analyzing the precise timing of data packetsWanna know who else calls it a timing attack? The CCC who UNLIKE the Tor team GOT ACCESS TO THE DOCUMENTS. >>102448099>no, I'll keep using Tor like thousands of others including the glowies themselvesI really don't care, just know that I2P is better and a random bridge won't help you, especially if you don't follow Tor's best practices.
>>102448201yes, because there were no guard nodes due to lack of vanguardsvanguards prevents this
>>102448213Correct, it's still a timing attack though.
>>102448256that has been patched years ago
>>102447776>>102447825Freenet/Hyphanet is consistently deanonymizable without opsec failures on the user's side. It's not safe.>>102447930The project currently called 'Freenet' is some crypto-based alternative unrelated to the original Freenet. The network originally called 'Freenet' is now instead named 'Hyphanet'.
>>102448272>that has been patched years agoWas already performed years ago and it's a PoC. Btw don't underestimate how many people use outdated software, even big hacker crews use abandoned tox clients. Also still a timing attack, so you were wrong when you said >it wasnt timing attack or anything you are saying
>>102448075>Pretty sure it's about as hard as it is for onion sites.according to this random post i foundhttps://mhatta.medium.com/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271dit seems like you can run PHP (dynamic sites).>You can run more complex, dynamic content websites on I2P, such as PHP-powered forums. In such case, you might want to use other full-fledged webservers such as Apache or Nginx instead of Jetty.so it's not like websites hosted on for example freenet, which are static web pages and content copied throughout the network (and then cant be taken down)
>>102448305timing attack can mean anything retardthis is deploying first malicious nodes, what the fuck are you "timing"??? of course reading packet timestamps is part of it but its not the entire thinghttps://blog.torproject.org/tor-is-still-safe/https://blog.torproject.org/tor-is-still-safe/https://blog.torproject.org/tor-is-still-safe/>Btw don't underestimate how many people use outdated software, even big hacker crews use abandoned tox clientshas nothing to do with thisif you run irc as onion then nothing can happen to you with this
>>102446849potentially but in the case of a onion site that i heard about on a podcast, when the owner got arrested it was just his own computer in his house, they got him because he leaked his i.p address with bad code.side note also they found all his customers through Bitcoin blockchain, and they started killing themselves but most of the agents didn't care because they were pedos and the agents saw the videos of what they didsite owner was south korean tho so maybe he's stupid
>>102448477>so it's not like websites hosted on for example freenet, which are static web pages and content copied throughout the network (and then cant be taken down)That's pretty much unique to freenet/hyphanet and torrenting. Honestly not a concern imo but if that's your threat model you can only do hyphanet. >>102448543>timing attack can mean anything retardThen it was a timing attack. Funny how you said the exact opposite half an hour ago. >what the fuck are you "timing"???The size of packages, where they are coming from and where they are going. Let's say you can only hear steps for some part of the street, then a part is blocked and then another part of the street where you can hear them again. If you hear high heels coming from the left, them disappearing behind the wall or whatever is blocking your hearing and then you hear high heels on the right side that are going towards right you can be pretty sure that this was the same person. This is basically how timing attacks work.>has nothing to do with thisI'm informing you because you think just updating helps when the problem is systemic and the solution isn't bridges. The correct solution is to switch to I2P where those attacks are way harder to perform because of the way the routing works and the P2P nature. Also don't forget that the guy who actually has access to the documents as to how this works said it's a timing attack while the Tor team doesn't have those documents. If you have any questions, consider googling before asking me and embarrassing yourself.
>>102448636i2p is dogshit stop recommending itever since Z had a meltdown>Then it was a timing attack. Funny how you said the exact opposite half an hour ago.doesnt matter since its not the main part of the exploitfuck off with your wall of texthttps://blog.torproject.org/tor-is-still-safe/
>>102448664>i2p is dogshit stop recommending itIt isn't and you're just an adhd zoomer who can't handle having to wait 5 secs for a page to build up>doesnt matter since its not the main part of the exploitIt literally is. Ask the CCC. You know what the CCC is, right normfren?>fuck off with your wall of textNo arguments>https://blog.torproject.org/tor-is-still-safe/>The Tor Project has released since to mitigate against the kind of 'timing' analysis described in the articles. The most current versions of Ricochet-Refresh have such protections in place.>Another important thing to mention is the longevity of the user connection for such 'timing' analysis to be successful.Just ctrl f and look for timing and you will see that EVEN THE SOURCE YOU LINK calls is a timing attack.
>>102448798>It isn't and you're just an adhd zoomer who can't handle having to wait 5 secs for a page to build upyes i2p is safe with its backdoored java and c++ clientsif you are gonna recommend a meshnet, recommend the original gnunet which is 20 years old and superior for file sharing>wait 5 secs for a page to build upi2p for messaging and filesharing, not your tech blog>Just ctrl f and look for timing and you will see that EVEN THE SOURCE YOU LINK calls is a timing attack.its overall tor exploit, not just timingwall of text
>>102448891>yes i2p is safe with its backdoored java and c++ clientsLiterally not happening>if you are gonna recommend a meshnet, recommend the original gnunet which is 20 years old and superior for file sharingCompletely incorrect and nobody uses it>i2p for messaging and filesharing, not your tech blogI told you to stop embarrassing yourself>not just timingEveryone except you is calling it a timing attack because it exploits the timing of incoming and outgoing messages>wall of textNo arguments, log off
>>102448944another wall of text cope LEL enjoy your JAVASIRS client>>102448955good morning sirs, working overtime IDF?
>>102448955He tried to tell me nothing is a timing attack and everything is a timing attack in the span of 30 minutes, so don't worry about him
>>102439100Why you asked? Are you looking for it?
>>102448955We know exactly how it works, it's the same kind of traffic analysis used for decades.This is like saying steel is compromised and has a new vulnerability because of the well known fact of what it's maximum tensile strength is.
>>102439100if you hadn't noticed regular people are being jailed for speech that other people hate. usa isn't there yet but there are people talking about how problematic this whole "free speech" thing is. americans have already invented a new word (misinformation) to cover up the fact that you're censoring something not based on truth but on what the desired narrative should be. as soon as the boomers are dead the american values can start being deconstructed because they've certainly failed to pass them on to the younger generation.tl;dr Tor or other solutions need to be ready for when you do need it.
easy fix just have to add in some random keepaplive payloads across the net to mask traffic
>>102449963This was the dominant idea back when the tool was being developed, but it was too expensive for volunteers.Even now it would probably cost a volunteer like several hundred bucks a month if we wanted to have padding traffic and still guarantee decent bandwidth for users.
>>102447930I quote anon:>It's not "the original developers". It was an unilateral decision by Ian Clarke, and the only reason he did it was because he wanted to apply for free money to Louis Rossmann's FUTO founding program.>He wanted to pitch something that looked popular when searching it on Google but he couldn't pitch a plan to modify the real Freenet because he hasn't been involved with it since the early 2000s.>So he decided to steal the name for his own scam cryptocurrency project that will never actually see the light of day.>And the two leftists german cucks who are the only active developers the real project has (Bombe and Arne Bab), didn't have big enough balls to refuse the forced name change and keep using the original name, so instead they choose the worst name they could think of, which is supposed to be related to a fungus or something. >>his own scam cryptocurrency project>What about it is crypto? >You have to pay them to prove you are human to be able to interact with some parts of the system that in a normal webpage would be protected by a captcha.>The more you pay, the more "trusted" you are, and you "may" qualify to get some other unspecified "perks".>https://archive.is/aFl3a>This is kinda weird because the original FMS (Freenet Messaging System) already has captchas and web of trust for spam protection, so that's both more decentralized and more technically advanced than the new thing. In the old Freenet anyone can publish trust lists and anyone can decide what trust lists to subscribe to. With the new Freenet, there is only one trust list, the one published by Ian. And to be on that trust list, you have to pay him.>There's also a system that tracks how much you contribute and allocates resources based on that. Presumably those credits may also be able to be resold. ("Contracts are prioritized by balancing resource usage with value created").>https://web.archive.org/web/20230206190158/https://freenet.org/
>>102448274>Freenet/Hyphanet is consistently deanonymizable without opsec failures on the user's side. It's not safe.Kind of expected behaviour, hyphanet is about preventing censorship/downtime, not anonymity. You need proxys/VPNs/i2p/Tor/whatever else exists for that.
>>102448636>The correct solution is to switch to I2PAs I asked in >>102446592, how does I2P help me anonymously access forbidden knowledge, and how does it let me help others do the same? The use case for illegal pictures and videos is obvious, but how is it an alternative for activism, journalism and other dangerous thinking?
>>102450205There's a proposed invite system (looks like it will be implemented) and "proof-of-trust" (haven't seen any work on it) that will not require any moneyhttps://github.com/freenet/freenet-core/issues/1115https://freenet.org/news/799-proof-of-trust-a-wealth-unbiased-consensus-mechanism-for-distributed-systems/
>>102451572An invite system is the opposite of anonymous though
>>102451572I see no point in that whole crypto project.
>>102452011It's built to add dynamic website/content support. Last big effort to achieve something like that was Zeronet I think
>>102452362Why are there two posts asking this? But you're right, there should be more threads about this. Anons life could be in danger.
>>102451014Again, I won't help pedos. I already told you how it's already used for important info, unlike your redpilled facebook group.
>>102451081???>live in shithole>see neighbours murdered>go on i2p irc>"yo police just murdered my neighbour can someone set me up with a journalist?">???>profit