[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: TOR-chan surprised.png (513 KB, 575x899)
513 KB
513 KB PNG
Germany has just proved that a large scale timing attack to deanonymize Tor users was not only possible, but actually easier on the resources needed for such an attack to be carried out than what was originally assumed by most. ISP focused attacks under government orders to identify Tor users are not in the realm of potential "what ifs" anymore, they're now a serious threat to the security of protocol.
https://www.tagesschau.de/investigativ/panorama/tor-netzwerk-100.html
The article is in German. There is no good independent English source making a report about this yet, to my knowledge. Tagesschau is reliable, but not that knowledgeable on specific tech matters.

>What happened
Law enforcement agencies coerced major ISPs to monitor connections to specific Tor relays. By analyzing the precise timing of data packets, they were able to link anonymous users to their real-world identities. While such traffic analyses have been theoretically known to pose a threat to Tor, this is (AFAIK) the first confirmed usage of them being used successfully on a larger scale to deanonymize tor users.
>Implications
On a surface level, this is a good thing for most people because to them it means pedos could be brought to justice more easily. But looking deeper, the obvious implications for the longevity and purpose of Tor network as a whole are extremely concerning. The involvement of a major German ISP raises serious questions about the future of online anonymity and the power of the current tools people use to protect their privacy. Especially now that there's a practical example for other governments to follow and apply as well. The methods required behind attacks of this nature are lighter on resources and easier to implement than what most users thought.

So what's next for freedom on the web? i2p? Complete capitulation, eating the bugs and owning nothing?
>>
tor was always a honeypot, nothing new
>>
works on my machine
>>
timing/correlation attacks on tor by adversaries monitoring multiple autonomous systems is not a new thing

https://arxiv.org/pdf/1505.05173
>>
>still using tor
What are you, a pedophile? Criminal? What do you need to hide?
>>
guys if I get deanonymized what will happen
>>
>>102439100
I downloaded HBO series "the last of us" and watched it without paying anyone

It was okay, a bit too far fetched and video-gamey for my tastes. Also they just had to throw in a couple of men having sex because, reasons.
>>
>>102439099
But not one so easy
>>
Just use a bridge lol
>>
>monero doesn't work and can't hide your traces unless you have a very autistic setup
>now tor can be deanonymized by low level state actors

It's genuinely over
>>
>>102439172
I2P
>>
Mixnets never ever.
>inb4 nymshit

>>102439039
>So what's next for freedom on the web? i2p?
i2p is better, but a lot of its benefits stem from being primarily intended for dark web usage - as opposed to a glorified VPN for clearweb browsing. If you use a gateway to browse clearweb through i2p, it's basically as bad as Tor, if not worse because there are far fewer gateways due to not being a primary usecase.

A mixnet would be a HUGE improvement. But nobody's bothered to build one yet, and it's not very easy. Except Nym, which tied the project to cryptoshit for some reason.

>>102439172
>monero doesn't work and can't hide your traces unless you have a very autistic setup
Running your own node has ALWAYS been the standard and recommended way to do things, retard.
>>
Theu probably won't blow up their honey pot just to catch (you) and your cretinous sexual appetites
>>
>>102439099
Even your document is only talking about theoreticals and treats the strategies as last measure options. Now it's a common threat which post people won't be able to defend against
>>
>>102439039
unless they decrypt the packets all they know is that you are connecting to a tor relay, same way as you would be connecting to 4chan or reddit.

>what if the feds own the relays that can decrypt, store, re-encrypt and forward your traffic
this is what actually happens.
>>
>>102439170
keeps btfoing Russia so you can be sure america has no chance.
>>
>>102439357
they can just ask for 4chan or reddit's traffic retard, same as anything else
so once they know it's you who sent those "encrypted packets", it's game over, unless you're connecting to some chink or russian site maybe (and that means owned by chinks/russians who are willing to defi US laws, AND hosted on chink/russian servers)
>>
>>102439411
the point is that if the server has nothing to show to the feds then a subpoena accomplishes nothing.
The servers need to be compromised in the first place to be threatening.
>>
>>102439172
>>monero doesn't work and can't hide your traces unless you have a very autistic setup
fud
>>
>>102439320
I don't actually use tor to download stuff, I just go on pirate streaming sites and watch it. I don't need a copy after I've watched most things.
>>
>>102439482
>i magically watch this thing without it being in RAM or swapped on disk
feds dont know if you are clicking ctrl+s, they know you clicked on the video
>>
>>102439518
I don't care I just want to watch
I don't need a copy for myself so the various fmovies-style sites are good enough for me
>>
>>102439103
We don't talk about it...
>>
At the risk of sounding retarded, why aren't Tor nodes themselves (the people hosting them) criminally liable?

Like, let's say you're a government and you want to stop TOR: Can't you arrest the people hosting the nodes (and demonstrate they helped curry illegal material)?
>>
>>102439905
Well the point of Tor is not knowing what traffic went through what node. Once you deanonymise traffic, yes, you could do this kind of thing. Problem still though is nodes run as dumb as possible and only see encrypted data. There's no point where they're hosting anything; it'd be like prosecuting ISPs for having switches and network devices that illegal content flows through.
>>
>>102439905
probably for the same reason gun, car, and pager manufacturers aren't liable
>>
>>102439103
The feds will know all the transphobic posts you've been making on the farms and will send you to mandatory gender reeducation surgery
>>
>>102439320
mexico1 was gucci
>>
would it be possible to send the packets to different nodes to thicken the smokescreen ?
>>
>monero ded
>tor ded
at least I can still count on SurfShark and NordVPN to keep my online identity private.
>>
>>102440027
tor works on top of tcp
>>
>>102439039
Correct me if I'm wrong but would connecting to a vpn not fix this issue?
>>
>>102440176
they recommend to not connect through a vpn. i wonder why
>>
>>102440189
Because then the VPN provider can see you're using tor. Plus it might interfere with the routing on your system and leak traffic.
Tor is made with paranoia in mind and some things they do don't make sense at first. If you read their documentation and their advice they explain it all though.
>>
>>102439275
>i2p is better
In what way? How does i2p protect against ISPs colluding to cut down relay connections to see what goes down?
>>
>>102439039
GNUNet
>>
>>102440205
Just use a private or self hosted VPN
>>
>>102439931
he probably means the exit nodes
>>
>>102439039
it is well known that isps share traffic data with each other freely for anti ddos and flooding reasons. it may not be glownigs that get the data, but random ass network engineers sure do.
it's why you should never trust low latency networks like tor for anything serious. anyone trying to gaslight you into thinking that the deficiencies of this architecture could even possibly fit anyone's threat model at all is banking on your ignorance and retardation.
I do enjoy using it for its exit nodes. it's a free vpn, especially for torrents
>>102439172
monero on the other hand is not compromised. unlike bitcoin and tor it was not invented by glows
>>
Based, pedos must die
>>
>>102440407
Because the hidden services aren't in the clearnet, it's much harder to do traffic analysis. You basically need to compromise every datacenter hosting every single node and get live memory dumps (assuming they're configured properly), because any node could be hosting services.

It's similar to Tor hidden services. Notice how the vast majority of TA attacks involve exit nodes and subpoenaed website operators? Well i2p explicitly discourages being used as a VPN/proxy, and encourages hosting everything inside the network itself.
>>
File: 1706730016146067.webm (2.28 MB, 1280x720)
2.28 MB
2.28 MB WEBM
>>102440873
Not him but
1. shut down random ip connected to i2p
2. 'p website goes down
doesn't that mean you have the guy idk if that's what they mean
>>
>>102440205
But your ISP (not trusted btw, logs 100%) can easily get any metadata without VPN. Are you retarded?
>>
>>102440959
I2P is an onion router like tor
There are several differences though, and the main one is that everyone relays a percentage of traffic and your traffic gets mixed with others during hops
A percentage of traffic is also garbage by design
(you can disable this, but it's a bad idea)
>>
>>102439039
Good, nobody should use glowieware
>>
>>102439039
>So what's next for freedom on the web? i2p?
This or hosting your own node. What really interests me is if bridges are more easily discovered or not.
>>
File: 1682409265090786.png (1.29 MB, 1024x1024)
1.29 MB
1.29 MB PNG
>>102440052
>>monero ded
Still not true fren
>>
Testing if i am allowed to post. Interesting that my posts in this thread are shadow'd while my posts in other threads are not.
>>
>>102443177
Well I was just trying to point out that this "vulnerability" has been well known for 30-40 years, even before this software was made. It became possible for even rando companies to do this like a decade ago, lol.
>>
File: TOR.png (110 KB, 1030x408)
110 KB
110 KB PNG
You were glow-warned years ago
>>
>>102439100
>le pedos
pedos are use facebook
>>
>>102439039
Who cares. Just dont watch child porn or do drugs. How hard is that
>>
>>102439039
Fuck. I guess when America goes full authoritarian I'll have to cut the cord.
>>
>>102439100
ok glownigger
>>
>>102439039
>Vulnerability
It's been compromised for some time now.
Just don't be a tard online and you'll be fine.
>>
>>102443259
Most articles I've seen mention snapchat and telegram
>>
Hello anons, let me introduce you to a novel concept in the form of an acronym - SEW

This stands for

SOMEONE
ELSES
WIFI

You see niggers and naggers, with a wifi extender you can reach a range in the multiples of miles, many wifi access points are unencrypted to encourage business, alternatively you can use tools in kali linux to access your neighbors wifi

I hope this has been eye opening to the clinically retarded who overthink security every time it comes to mind
>>
>>102444200
discord youtube.......
>>
>>102439936
You mean The Tor Project is a group of huge corporations with a powerful lobby?
>>
>>102443259
>>102444200
Telegram is mostly a boogeyman because it refuses to work with the feds. There's definitely pedos on there, but not nearly as much as on Western messenger services and social media.
>>
>>102444320
>Okay this 90 year olds wifi was used who might be the suspect.. the other 50-90 year old neighbours or the 30 year old guy downstairs working in IT
Genius move kiddo.
>>
>>102443266
And also don't be an activist, don't be a journalist reporting negatively on the government, don't look into parts of history the government doesn't want you to see, don't look into current government lies, don't question things. Just be an obedient model citizen, ready to bend over and take the government's cock when asked to.
>>
>>102446330
>it refuses to work with the feds.
>t. lives in 2018
>>
>>102446500
>strawman
Ok
>>
>>102440176
the vpn provider will decrypt your traffic
>>
>>102439275
>i2p is better, but a lot of its benefits stem from being primarily intended for dark web usage - as opposed to a glorified VPN for clearweb browsing.
But then what's the point? Do you have (historical) news articles on I2P? Research journals? Analysis and discussion of forbidden ideas? Does it help people evade mass surveillance and censorship in countries where more advanced web blocking is in place?
>>
>>102440176
No, they would realize that some VPN is connecting and then ask the provider to give out your info or just use a timing attack again, this time way cheaper btw.

>>102440189
Because that's what bridges are for and if you're that concerned you can host your own bridge.
>>
so they can identify a tor user but not what he is browsing, so whats the point of this?
did i understand it correctly?
>>
>>102446592
>Thinks there's anything worthwhile in the clearnet
>Pro CP
Ah checks out
>>
>>102446539
It is called a counter-argument you fucking child
>>
>>102446539
How is it a strawman? You implied deanonymization isn't a problem unless you watch CP or buy drugs. Glowies around the world have a documented track record of spying on (and sometimes disposing of) activists, journalists and other dissidents.
>>
>42069 eyes intelligence network has eyes literally everywhere
>you really think you werent already boned before by this intel network having a large collection of tor nodes for years

Its not that im not objecting to the privacy violation, but pedophiles use tor on windows 10+ (known nsa spyware) and they literally never caught two people who tried to kill trump until it was almost too late. Regardless of how intrusive this shit is, the government obviously is too incompetent to be able to use it. That or theres something else theyre looking for that is much worse than pedophilia and people trying to kill a former head of state
>>
>>102446617
Not pro CP, just fully aware they're using the CP scare to curtail our freedoms. Just yesterday there was a thread (ironically now deleted) about an article which pushed for further weakening section 230 because omg pedos protect the children: >>102438285
>>
>>102440957
If someone hosts a website, there's a good chance that
>The website isn't hosted on their home network
>The website is on multiple networks for redundancy
>The website is behind 7 (any potentially anonymizing tech) so the first IP you manage to find is just the IP for a random VPN on the other side of the world
It's not impossible but it's extremely difficult, almost always the most difficult one. Social engineering is simpler, so if they do what you said it's after getting info out of people to confirm you're the one they're looking for and give you a few more years in jail.
>>
>>102446518
Anon, Telegram's CEO was literally arrested in France recently because he kept refusing to cooperate with feds.
>>
>>102446727
it was not an independent citizen that shot Donald Trump.
>>
>>102439039
just use bridges
>>
>>102446414
Copium, with a wifi extender you can have the range the size of a small city, and circumstantial evidence like you describe is routinely thrown out of court
>>
>>102440027
That's the "garlic routing" I2P does : different packets take different tunnels.
>>
>>102447300
No, they cooperated for years, just not enough. There were years in which europol even thanked telegram for cooperating. Instead use something were nobody can help state actors even if he wants to.

>>102447602
Not an applicable solution unless you host your own bridge.
>>
>>102447626
works on my machine, poor opsec from normalnigs with JS enabled is not my concern
>>
>>102447307
Lol who was it then? Do you have a source for this
>>
>>102447661
>works on my machine
Anon, do you even understand what timing attacks are?
>>
>>102447681
yes, I don't think you do however
you assume everything is already compromised and a presumed guilty state so everything except absolute perfect anonymity is a gotcha
>>
File: 4.gif (408 KB, 200x200)
408 KB
408 KB GIF
>>102439039
>By analyzing the precise timing of data packets
if that's all there is, isn't it enough to just implement random delays on each node before sending a packet further?
could even let users tag their requests with a wished randomness in the delay, which may or may not be respected by each relay. for example someone may accept up to 25% slower downloads to make timing less precise, and by default the protocol has 0-100ms random delay. something like that
>>
>>102447707
>you assume everything is already compromised
No but I know that they will just go to whoever has that bridge and will tell him they know he's been hosting a bridge. You know, exactly how did with the entry nodes in the example given. This is why 'just use a bridge' isn't correct advice.
>>
Is Freenet safe?
>>
>>102447751
>if that's all there is, isn't it enough to just implement random delays on each node before sending a packet further?
Updates of the whole network take some coordination and also take some time. Also they are already rewriting a lot of it, pushing new features then won't help much. The real solution would be to find a way for more people to host nodes (especially guard and exit) or everyone finally switching to I2P.

>>102447776
Yes because no one cares about it.
>>
>>102447761
yes, they'll go to the public bridge registry that definitely exists and bring proof that the obfuscated traffic is TOR traffic they magically found using super secret back doors and the bridge will... show the logs it doesn't store? or will they just say you connected to this bridge within a week someone else did so we'll arrest everyone to be sure
>>
>>102447776
it's being called hyphanet now, the freenet one is infiltrated
>>
>>102439039
Well, this explains why everyone was trying to get me to turn off my vpn while using Tor.
>>
>>102446265
>From March 1952 until at least May 1956, however, the Micronite filter in Kent cigarettes contained compressed blue asbestos within the crimped crepe paper, which is the most carcinogenic type of asbestos.
lulz

there was a lot of talk about asbestos being the miracle material in the 50s
https://youtu.be/tug_E9YKye0?t=23
>>
>>102439039
Yeah, this is a huge red flag. What used to be theoretical is now very real, and it’s not just about “bad actors” anymore. When ISPs can be leaned on to help deanonymize Tor users, we’re talking about a much bigger problem. This sets a precedent—governments now have a roadmap for how to destroy anonymity for anyone they deem "interesting." If it’s this easy for them to compromise Tor, then what’s next? Even something like I2P might not be enough once this playbook is out there.

Sure, some might cheer because it helps track down criminals, but what happens when it’s used to suppress dissent or clamp down on free speech? The real question is, how do we respond? Is this the point where we just accept that true privacy is dead? Or is there still a way to push back against this, either by strengthening the tech or by pushing for real policy changes?

Either way, it feels like we’re at a crossroads. Curious to hear what others think the next move is. Are we looking at the death of online anonymity as we know it, or is there still hope?
>>
FUD THREAD DO NOT REPLY, SHILLBOT

https://blog.torproject.org/tor-is-still-safe/
https://blog.torproject.org/tor-is-still-safe/
https://blog.torproject.org/tor-is-still-safe/
https://blog.torproject.org/tor-is-still-safe/

IT WAS TARGETED ATTACK ON .onion RUNNING ON VULNERABLE OUTDATED SOFTWARE
>>
>>102447751
tor packets are obfuscated, their size is padded to 514 bytes

>>102447897
>>
>>102447619
tor has stream isolation aswell, different destinations have different paths

>>102447897
>>
>>102447802
Ok, you might be retarded. They have the IP since they have already talked to the middle node. That's even to find out the ISP and ask if any of their users in the specific area sends a lot of data to some of the IPs of the middle nodes they know. Then they go to the guy who has been hosting the bridge and will tell him that he needs to start logging or will face jail time. Now fuck off.
>>
>>102447825
How?
>>
>>102447922
>suddenly everyone is cryptanalysis expert

>>102447897
>>
File: 4.jpg (66 KB, 1000x399)
66 KB
66 KB JPG
>>102447786
>Updates of the whole network take some coordination and also take some time.
Though if it's just adding some random delays that can be done gradually as each node updates, no need for all to use it at the same time since even if it's just one node in the chain it still introduces randomness.

>switching to I2P
Is it easy to publish websites on I2P? Do they need to be static or can they be dynamic with login sessions?
>>
>>102447942
board is full of mossad nigger bots because of the exploding devices today, so fuck off FUDSHILLBOT KIKE
>>
>>102447922
>and will tell him that he needs to start logging or will face jail time
aha, so he'll just turn the magic log traffic flag all bridge software has built in and now they'll catch the meanies
everybody knows you only use one bridge all the time and he'll instantly comply without a warrant because he wants to instead of just turning off the bridge
glad to see that in your statist power fantasy everything works so smoothly anon, truly a model society
>>
>>102447920
Retard, stream isolation doesn't help when you're using fucking Tor browser. Read about what it DOES YOU MONKEY
>>
>>102448015
stream isolation works with tbb, every tab will go through different route

>>102447999
please read >>102447897
>>
>>102447897
>it's still safe
>but we weren't given access to the documents
>>
>>102448034
>stream isolation works with tbb, every tab will go through different route
It isn't stream isolation. Stream isolation is when you make a couple of SocksPort s and use them with different apps. All these ports with use different routes
>>
>>102448039
it was exploit against old chat software that didnt use vanguards, same exploit from years ago when vanguards wasnt in place

recycled garbage
>>
>>102448039
update your software bro
when tor is updated it's actually good for you instead of adding ads to the start menu
>>
>>102447938
>>suddenly everyone is cryptanalysis expert
No, just saying 'just use a bridge' isn't a solution.

>>102447943
>Though if it's just adding some random delays that can be done gradually as each node updates, no need for all to use it at the same time since even if it's just one node in the chain it still introduces randomness.
Then it depends on how many people even connect to those nodes. Also believable randomness isn't easy to create. It doesn't has to look like random noise. Let's say there were two users who directly connect to clear net sites. You know want to figure out who of those two users is actually just some bot randomly connecting to sites. Is it user A who connects to youtube, tiktok and sometimes google or B who visit xzudxs.org, sadasd.com and so on regularly?
>Is it easy to publish websites on I2P?
Pretty sure it's about as hard as it is for onion sites. I've never done either though. Right to privacy might have some info since he has an I2P blog.

>>102447995
>aha, so he'll just turn the magic log traffic flag all bridge software has built in and now they'll catch the meanies
No, but they can just tell him to log it on a network level. The could also just do the same with the ISP and this specific user. This is exactly how timing attacks work.
>everybody knows you only use one bridge all the time
Switching bridges often isn't recommended, the same goes for guard nodes. I disagree with the decision but you gotta take that up to the Tor community if you wanna complain about it.
>glad to see that in your statist power fantasy everything works so smoothly anon
No, I just understand how these attacks work and what the actual benefits of bridges are. Use I2P and fuck off.
>>
>>102448075
it wasnt timing attack or anything you are saying, it was deanon on onion service without vanguards
>>
>>102448075
no, I'll keep using Tor like thousands of others including the glowies themselves

>>102448091
yeah it's obvious he hasn't even read the article
>>
>>102448097
your apology is more valuable than any information
>>
>>102448091
>By analyzing the precise timing of data packets
Wanna know who else calls it a timing attack? The CCC who UNLIKE the Tor team GOT ACCESS TO THE DOCUMENTS.

>>102448099
>no, I'll keep using Tor like thousands of others including the glowies themselves
I really don't care, just know that I2P is better and a random bridge won't help you, especially if you don't follow Tor's best practices.
>>
>>102448201
yes, because there were no guard nodes due to lack of vanguards
vanguards prevents this
>>
>>102448213
Correct, it's still a timing attack though.
>>
>>102448256
that has been patched years ago
>>
>>102447776
>>102447825
Freenet/Hyphanet is consistently deanonymizable without opsec failures on the user's side. It's not safe.

>>102447930
The project currently called 'Freenet' is some crypto-based alternative unrelated to the original Freenet. The network originally called 'Freenet' is now instead named 'Hyphanet'.
>>
>>102448272
>that has been patched years ago
Was already performed years ago and it's a PoC. Btw don't underestimate how many people use outdated software, even big hacker crews use abandoned tox clients. Also still a timing attack, so you were wrong when you said
>it wasnt timing attack or anything you are saying
>>
>>102448075
>Pretty sure it's about as hard as it is for onion sites.
according to this random post i found
https://mhatta.medium.com/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d
it seems like you can run PHP (dynamic sites).
>You can run more complex, dynamic content websites on I2P, such as PHP-powered forums. In such case, you might want to use other full-fledged webservers such as Apache or Nginx instead of Jetty.

so it's not like websites hosted on for example freenet, which are static web pages and content copied throughout the network (and then cant be taken down)
>>
>>102448305
timing attack can mean anything retard
this is deploying first malicious nodes, what the fuck are you "timing"??? of course reading packet timestamps is part of it but its not the entire thing

https://blog.torproject.org/tor-is-still-safe/

https://blog.torproject.org/tor-is-still-safe/

https://blog.torproject.org/tor-is-still-safe/

>Btw don't underestimate how many people use outdated software, even big hacker crews use abandoned tox clients
has nothing to do with this
if you run irc as onion then nothing can happen to you with this
>>
>>102446849
potentially but in the case of a onion site that i heard about on a podcast, when the owner got arrested it was just his own computer in his house, they got him because he leaked his i.p address with bad code.
side note also they found all his customers through Bitcoin blockchain, and they started killing themselves but most of the agents didn't care because they were pedos and the agents saw the videos of what they did
site owner was south korean tho so maybe he's stupid
>>
>>102448477
>so it's not like websites hosted on for example freenet, which are static web pages and content copied throughout the network (and then cant be taken down)
That's pretty much unique to freenet/hyphanet and torrenting. Honestly not a concern imo but if that's your threat model you can only do hyphanet.

>>102448543
>timing attack can mean anything retard
Then it was a timing attack. Funny how you said the exact opposite half an hour ago.
>what the fuck are you "timing"???
The size of packages, where they are coming from and where they are going. Let's say you can only hear steps for some part of the street, then a part is blocked and then another part of the street where you can hear them again. If you hear high heels coming from the left, them disappearing behind the wall or whatever is blocking your hearing and then you hear high heels on the right side that are going towards right you can be pretty sure that this was the same person. This is basically how timing attacks work.
>has nothing to do with this
I'm informing you because you think just updating helps when the problem is systemic and the solution isn't bridges. The correct solution is to switch to I2P where those attacks are way harder to perform because of the way the routing works and the P2P nature. Also don't forget that the guy who actually has access to the documents as to how this works said it's a timing attack while the Tor team doesn't have those documents. If you have any questions, consider googling before asking me and embarrassing yourself.
>>
>>102448636
i2p is dogshit stop recommending it
ever since Z had a meltdown

>Then it was a timing attack. Funny how you said the exact opposite half an hour ago.
doesnt matter since its not the main part of the exploit

fuck off with your wall of text

https://blog.torproject.org/tor-is-still-safe/
>>
>>102448664
>i2p is dogshit stop recommending it
It isn't and you're just an adhd zoomer who can't handle having to wait 5 secs for a page to build up
>doesnt matter since its not the main part of the exploit
It literally is. Ask the CCC. You know what the CCC is, right normfren?
>fuck off with your wall of text
No arguments
>https://blog.torproject.org/tor-is-still-safe/
>The Tor Project has released since to mitigate against the kind of 'timing' analysis described in the articles. The most current versions of Ricochet-Refresh have such protections in place.
>Another important thing to mention is the longevity of the user connection for such 'timing' analysis to be successful.
Just ctrl f and look for timing and you will see that EVEN THE SOURCE YOU LINK calls is a timing attack.
>>
>>102448798
>It isn't and you're just an adhd zoomer who can't handle having to wait 5 secs for a page to build up

yes i2p is safe with its backdoored java and c++ clients

if you are gonna recommend a meshnet, recommend the original gnunet which is 20 years old and superior for file sharing

>wait 5 secs for a page to build up
i2p for messaging and filesharing, not your tech blog

>Just ctrl f and look for timing and you will see that EVEN THE SOURCE YOU LINK calls is a timing attack.
its overall tor exploit, not just timing

wall of text
>>
>>102448891
>yes i2p is safe with its backdoored java and c++ clients
Literally not happening
>if you are gonna recommend a meshnet, recommend the original gnunet which is 20 years old and superior for file sharing
Completely incorrect and nobody uses it
>i2p for messaging and filesharing, not your tech blog
I told you to stop embarrassing yourself
>not just timing
Everyone except you is calling it a timing attack because it exploits the timing of incoming and outgoing messages
>wall of text
No arguments, log off
>>
>>102448944
another wall of text cope LEL enjoy your JAVASIRS client

>>102448955
good morning sirs, working overtime IDF?
>>
>>102448955
He tried to tell me nothing is a timing attack and everything is a timing attack in the span of 30 minutes, so don't worry about him
>>
>>102439100
Why you asked? Are you looking for it?
>>
>>102448955
We know exactly how it works, it's the same kind of traffic analysis used for decades.
This is like saying steel is compromised and has a new vulnerability because of the well known fact of what it's maximum tensile strength is.
>>
>>102439100
if you hadn't noticed regular people are being jailed for speech that other people hate. usa isn't there yet but there are people talking about how problematic this whole "free speech" thing is. americans have already invented a new word (misinformation) to cover up the fact that you're censoring something not based on truth but on what the desired narrative should be. as soon as the boomers are dead the american values can start being deconstructed because they've certainly failed to pass them on to the younger generation.
tl;dr Tor or other solutions need to be ready for when you do need it.
>>
easy fix just have to add in some random keepaplive payloads across the net to mask traffic
>>
>>102449963
This was the dominant idea back when the tool was being developed, but it was too expensive for volunteers.
Even now it would probably cost a volunteer like several hundred bucks a month if we wanted to have padding traffic and still guarantee decent bandwidth for users.
>>
>>102447930
I quote anon:
>It's not "the original developers". It was an unilateral decision by Ian Clarke, and the only reason he did it was because he wanted to apply for free money to Louis Rossmann's FUTO founding program.
>He wanted to pitch something that looked popular when searching it on Google but he couldn't pitch a plan to modify the real Freenet because he hasn't been involved with it since the early 2000s.
>So he decided to steal the name for his own scam cryptocurrency project that will never actually see the light of day.
>And the two leftists german cucks who are the only active developers the real project has (Bombe and Arne Bab), didn't have big enough balls to refuse the forced name change and keep using the original name, so instead they choose the worst name they could think of, which is supposed to be related to a fungus or something.

>>his own scam cryptocurrency project
>What about it is crypto?

>You have to pay them to prove you are human to be able to interact with some parts of the system that in a normal webpage would be protected by a captcha.
>The more you pay, the more "trusted" you are, and you "may" qualify to get some other unspecified "perks".
>https://archive.is/aFl3a
>This is kinda weird because the original FMS (Freenet Messaging System) already has captchas and web of trust for spam protection, so that's both more decentralized and more technically advanced than the new thing. In the old Freenet anyone can publish trust lists and anyone can decide what trust lists to subscribe to. With the new Freenet, there is only one trust list, the one published by Ian. And to be on that trust list, you have to pay him.
>There's also a system that tracks how much you contribute and allocates resources based on that. Presumably those credits may also be able to be resold. ("Contracts are prioritized by balancing resource usage with value created").
>https://web.archive.org/web/20230206190158/https://freenet.org/
>>
>>102448274
>Freenet/Hyphanet is consistently deanonymizable without opsec failures on the user's side. It's not safe.
Kind of expected behaviour, hyphanet is about preventing censorship/downtime, not anonymity. You need proxys/VPNs/i2p/Tor/whatever else exists for that.
>>
>>102448636
>The correct solution is to switch to I2P
As I asked in >>102446592, how does I2P help me anonymously access forbidden knowledge, and how does it let me help others do the same? The use case for illegal pictures and videos is obvious, but how is it an alternative for activism, journalism and other dangerous thinking?
>>
>>102450205
There's a proposed invite system (looks like it will be implemented) and "proof-of-trust" (haven't seen any work on it) that will not require any money
https://github.com/freenet/freenet-core/issues/1115
https://freenet.org/news/799-proof-of-trust-a-wealth-unbiased-consensus-mechanism-for-distributed-systems/
>>
>>102451572
An invite system is the opposite of anonymous though
>>
>>102451572
I see no point in that whole crypto project.
>>
>>102452011
It's built to add dynamic website/content support. Last big effort to achieve something like that was Zeronet I think
>>
>>102452362
Why are there two posts asking this? But you're right, there should be more threads about this. Anons life could be in danger.
>>
>>102451014
Again, I won't help pedos. I already told you how it's already used for important info, unlike your redpilled facebook group.
>>
>>102451081
???
>live in shithole
>see neighbours murdered
>go on i2p irc
>"yo police just murdered my neighbour can someone set me up with a journalist?"
>???
>profit



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.