[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

[Advertise on 4chan]


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


Riddle me this /g/....
The CIA owns 90% of all tor exit nodes, yet you still suggest people should use it. The network itself is basically a honeypot at this point, when will you tards wake up and stop using this glowshit?
>>
you have nothing to hide right ? :)
>>
File: 1632328137306.jpg (46 KB, 570x624)
46 KB
46 KB JPG
>pic related: me
>>
>>83829341
no duh but if you play their game and dont do anything overly illegal and dont target them they wont care (hopefully)
>>
>>83829341
I know this so I always type into the address bar first ..

"Mr.CIA , this is Dr.Pavel" for which the first search result is "You don't get to bring friends" and then its A.OK to browse.
>>
File: 1633368816075.gif (27 KB, 112x112)
27 KB
27 KB GIF
I even donated to TOR once
they made web scraping easier for me
>>
so? just dont use same ip thats from your country. there is tor ip refresh button for a reason. set ipleak.net as your homepage
>>
>>83829341
Nice FUD glowie, the CIA doesn't own shit. I knew people who operared for years on skinroad and only got caught cause they met up irl.
>>
File: 1617763790784.png (1.92 MB, 1920x1080)
1.92 MB
1.92 MB PNG
>>83829452
>Dr. Pavel I am MIA
>>
>>83829341
>exit nodes
>>
File: hello_bait.jpg (20 KB, 619x619)
20 KB
20 KB JPG
>>83829341
>The CIA owns 90% of all tor exit nodes
>>
>>83830004
He didn't browse so good
>>
>>83829341
You don't know how Tor works.
The design of the Tor network as a whole is effectively to prevent this from having consequences.

Assume that 100%, not just 90%, of Tor exit nodes glow. Assuming that the protocol works as intended and they aren't exploiting some kind of unknown vulnerability, all the exit nodes can see is:
>outgoing traffic (which can still be hidden from them with any form of E2E encryption,which you should always use anyway
>what middle node the connection came from
As long as you do not send unencrypted information identifying you, even they won't be able to identify anything about you personally, at least according to this particular threat model.

If assume the possibility of global monitoring, then Tor won't be enough to protect you. This is a well known limitation of the Tor protocol that even the designers themselves fully acknowledge and openly explain on their website.

Same for the fact that Tor was funded by the U.S. government. Yes, it's true. so what? It's not some kind of horrible secret. This is well documented and again, fully acknowledged by the developers themselves.
Just because something was made by glowies doesn't mean it can't be useful to you personally. SELinux, for instance, was literally made by the NSA, and yet it's very good for defining security policies on the Linux kernel.
>>
>>83830004
Kek
>>
File: 1625500496984.jpg (21 KB, 525x478)
21 KB
21 KB JPG
>>83830128
Who wants to try next? Tell me about Google! Why do they index the web?
>>
>>83829341
so run them yourself and help
i run 3
>>
>>83830175
>sees a 25GB porn torrent

>That's a big file
>for u (torrent)
>>
>>83829341
>The CIA owns 90% of all tor exit nodes
Proof?
>The network itself is basically a honeypot at this point
Proof?
>>
>>83829341
I use TOR to download shit so fucking legal you could go in a cinema and watch it or download it for free via tor on the internet.
If glowies got a problem they can bring some popcorn, in exchange i can offer them a protein rich room-temperature refreshment.
>>
File: 1605392766874.png (229 KB, 800x800)
229 KB
229 KB PNG
>>83830207
>>
>>83829341
i2p is more resisten to this sybil attack, but it's crippled by cgnat
if you're behind nat your speed will be 20KB/s
>>
>>83830428
>cgnat
QRD on what this is?
I don't currently know if I'm behind one or not.
>>
File: 1633956243045.jpg (258 KB, 1024x1019)
258 KB
258 KB JPG
>>83829341
Simple. I don't use Tor to hide my identity from the CIA. Frankly, nothing can, and if you know otherwise then there's no way you're lurking on this wannabe board.

https://www.usenix.org/system/files/1401_08-12_mickens.pdf
>>
>>83830138
This. /thread
>>
>>83829399
this. the cia doesn't give a shit what illegal stuff /g/ does. they just want to topple governments. you're not important enough for them to care about you
>>
>>83831032
worked at cia. this is the truth
>>
>>83830138
For the first threat model, we could use a simple CIA proxy. Since we use HTTPS, it would not be a problem.
When 100% of nodes are run by CIA, then it is effectively global monitoring.
>>
>>83830678
it's a commercial NAT
cg is for carrier grade
>>
>>83829341
so many maho posters recently...
>>
Fuck off glownigger. If you don't want to use it, don't fucking use it. Stop spreading bullshit and go the fuck back to whatever hole you crawled out of. Matter of fact, I'm about to go on a darknet imageboard right now just to get away from this fucking nauseating stupidity.
>>
>>83830678
That's when your isp gives clients lan range IPs and has one shared external IP so you use PPPoE or similar to connect to internet.
>>
>>83830678
if you're behind a NAT then your torrent will show firewalled ports no matter if you forward on your router
>>
Since I don't plan on buying drugs, I pretty much only use Tor to visit onionweb imageboards occasionally and witness schizos in their natural habitat.
It's much more useful to access firewalled resources.
>>
>>83829341
The beauty of tor (as I understand it) is that 100% of the exit nodes could be owned by the Cia and you are still safe. Do I need to be redpilled on this? And what is the alternative?
>>
>>83831056
100% tor exit notes != 100% of tor nodes

There are orders of magnitude more middle relay tor nodes than exits nodes
>>
Works for me. I only use it to buy weed
>>
lokinet
>>
>>83829341
prob a lot but not all. i run one, and i know a few vpn services do, among other privacy groups. they can't all be owned by 3 letter groups.
>>
>>83830777
checked
>>
>>83829341
The cia doesn't give a shit about your drug habit or illegal ukrainian hrt suppliers.
>>
>>83830678
afaik residential isp plans are behind cgnat
>>
File: box.gif (498 KB, 500x233)
498 KB
498 KB GIF
my mercenary has hacked CIA and cyber raped their tooty hole and now i use CIA's backend infrastructure as my personal proxy to hide my traffic from Mossad.
i can confirm that CIA is not secretly running 80% or whatever number of Tor exit nodes are needed to identify all Tor users, because if they were, i would have come across it in my illegal exploration of CIA's classified computer systems.
>>
>>83829341
If that's true it's because they need a way to phone home while committing crimes in other countries.



Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.