Tor Project Conspiracies

What's the real reason the US Navy created this? They're funding it. What is their endgame?

Nothing Ever Happens Shirt $21.68

DMT Has Friends For Me Shirt $21.68

Nothing Ever Happens Shirt $21.68

  1. 2 months ago
    Anonymous

    spreading journalism in censored countries.

  2. 2 months ago
    Anonymous

    because they benefit from it as well, like most tech it gets funding to get created for military use, as long as everything is FOSS it should be good

    • 2 months ago
      Anonymous

      tor is closed source

      • 2 months ago
        Anonymous

        https://gitlab.torproject.org/tpo/core/tor
        dumbass

        • 2 months ago
          Anonymous

          there's proprietary NSA blobs there

          • 2 months ago
            Anonymous

            >moronic schizo does not know hot to compile software,

            <kys troony

        • 2 months ago
          Anonymous

          i wish it was called tord. not sure why it's not called that because it's literally is tor daemon

    • 2 months ago
      Anonymous

      What actual military use does it have?

      • 2 months ago
        Anonymous

        I'm going to make a wild guess and say it's probably comms. or glowie LAN parties

        • 2 months ago
          Anonymous

          >or glowie LAN parties
          Sounds comfy. Can I join in if I use Tor?

      • 2 months ago
        Anonymous

        military and glowBlack folk have their own secret and private onion networks that access the internet.

  3. 2 months ago
    Anonymous

    Is there anything like Tor that conceals the fact you are using it? In places you actually need it even using it is a red flag.

    • 2 months ago
      Anonymous

      any one of a million botnets

    • 2 months ago
      Anonymous

      yeah, tor are experimenting with a new feature that masks tor activity as https connections to make it harder to censor and filter.

      >"WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. "

      https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/

    • 2 months ago
      Anonymous

      tor is useful when both parties agree on using it.

    • 2 months ago
      Anonymous

      yeah, tor are experimenting with a new feature that masks tor activity as https connections to make it harder to censor and filter.

      >"WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. "

      https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/

      What you're asking about already exists, they're called tunnels. Actual nodes are publicly known (and often blocked in such places), tunnels are not publicly listed (though obviously it's still possible for anyone to find them through whatever way you found them and figure out you're connecting to a Tor tunnel that way). By analyzing the traffic to a Tor tunnel it is however still possible to discern that it is Tor traffic. The new feature they're experimenting with is to make it less obvious from the traffic you're sending to the tunnel that you're using Tor; they're trying to make a tunnel connection look the same as a normal HTTPS web connection.

      • 2 months ago
        Anonymous

        Yeah. Tor finally catching up with what v2ray people were doing FOR YEARS now. Better late than never.
        Plus not requiring your own vps is helpful, as v2ray historically required that

  4. 2 months ago
    Anonymous

    Is this a glowie-run operation too?

    • 2 months ago
      Anonymous

      i sometimes forget that i2p and freenet still exists. i miss the schizos on i2p and freenet. i forget which one had the message boards that needed a java program to view.

      • 2 months ago
        Anonymous

        >java
        Probably i2p. Now there's also a Russian version in C++.

        • 2 months ago
          Anonymous

          >Now there's also a Russian version in C++.
          very nice

    • 2 months ago
      Anonymous

      I2P is a small network and literally every node's IP (including client's IP) is visible if you go into the "router" tab of its web interface. Don't trust I2P. If something isn't stress tested (meaning more people using it and more bugs fixed) then you can't trust it.

      • 2 months ago
        Anonymous

        How big is the set of users? Is there a way to make your real IP invisible?

      • 2 months ago
        Anonymous

        >literally every node's IP (including client's IP) is visible if you go into the "router" tab of its web interface
        1. far from every public node
        2. 0 private/hidden nodes
        3. most have dynamic IPs, making this list outdated pretty quickly
        4. the list is pointless since, with the exception of people hosting exit nodes on purpose to clearnet, all traffic is happening inside the network, so you cant see who is doing what

        • 2 months ago
          Anonymous

          >so you cant see who is doing what
          there is an unspoken rule about i2p is that if you gonna run it you should run it 24/7 due to this reason alone. too easy for correlation attacks

        • 2 months ago
          Anonymous

          >most have dynamic IPs
          >making this list outdated pretty quickly
          some dynamic ip addresses provided by some hosts/isps can last weeks before a change. i wouldn't rely upon that has something that could be used to make it censor proof, especially if the dynamic ip address is taken from a known pool. an adversary could simply block entire ip ranges that nodes appear on. as italy proved to us all recently by blocking ip addresses of cloudflare to combat "piracy" of sports streams, there is not a care in the world about who could be affected by such rampant blocking.

          • 2 months ago
            Anonymous

            the dynamic ip comment was there to insinuate that someone harvesting these IPs will have a much harder job of doing anything with them, its not the core tenant of why the network itself is secure

    • 2 months ago
      Anonymous

      shit logo, will never take off

      • 2 months ago
        Anonymous

        you mean comfy and SOVL logo with fun colours?

    • 2 months ago
      Anonymous

      you mean comfy and SOVL logo with fun colours?

      >'ick 2 'p
      gemmy

  5. 2 months ago
    Anonymous

    Supposedly so glowBlack folk could phone home from foreign countries while blending in with civilian traffic. Later, the State Department realized they could use it to help pro-globohomosexual dissidents launch color revolutions in countries that don't play along with American global hegemony. That's why Tor lost all funding briefly after EFF funding ran out circa 2006. The current purpose to support color revolutions only started at that point.

  6. 2 months ago
    Anonymous

    to sell spice to each other

  7. 2 months ago
    Anonymous

    >What's the real reason
    Anything involving the internet and looking for a reason, the answer will always be porn. Sure, they might let intelligence agencies use it to hide their traffic among us plebs, but the answer is always porn. The internet is for porn.

Your email address will not be published. Required fields are marked *