What's the real reason the US Navy created this? They're funding it. What is their endgame?
Nothing Ever Happens Shirt $21.68 |
DMT Has Friends For Me Shirt $21.68 |
Nothing Ever Happens Shirt $21.68 |
What's the real reason the US Navy created this? They're funding it. What is their endgame?
Nothing Ever Happens Shirt $21.68 |
DMT Has Friends For Me Shirt $21.68 |
Nothing Ever Happens Shirt $21.68 |
spreading journalism in censored countries.
because they benefit from it as well, like most tech it gets funding to get created for military use, as long as everything is FOSS it should be good
tor is closed source
https://gitlab.torproject.org/tpo/core/tor
dumbass
there's proprietary NSA blobs there
>moronic schizo does not know hot to compile software,
<kys troony
i wish it was called tord. not sure why it's not called that because it's literally is tor daemon
What actual military use does it have?
I'm going to make a wild guess and say it's probably comms. or glowie LAN parties
>or glowie LAN parties
Sounds comfy. Can I join in if I use Tor?
military and glowBlack folk have their own secret and private onion networks that access the internet.
Is there anything like Tor that conceals the fact you are using it? In places you actually need it even using it is a red flag.
any one of a million botnets
yeah, tor are experimenting with a new feature that masks tor activity as https connections to make it harder to censor and filter.
>"WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. "
https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/
tor is useful when both parties agree on using it.
What you're asking about already exists, they're called tunnels. Actual nodes are publicly known (and often blocked in such places), tunnels are not publicly listed (though obviously it's still possible for anyone to find them through whatever way you found them and figure out you're connecting to a Tor tunnel that way). By analyzing the traffic to a Tor tunnel it is however still possible to discern that it is Tor traffic. The new feature they're experimenting with is to make it less obvious from the traffic you're sending to the tunnel that you're using Tor; they're trying to make a tunnel connection look the same as a normal HTTPS web connection.
Yeah. Tor finally catching up with what v2ray people were doing FOR YEARS now. Better late than never.
Plus not requiring your own vps is helpful, as v2ray historically required that
Is this a glowie-run operation too?
i sometimes forget that i2p and freenet still exists. i miss the schizos on i2p and freenet. i forget which one had the message boards that needed a java program to view.
>java
Probably i2p. Now there's also a Russian version in C++.
>Now there's also a Russian version in C++.
very nice
I2P is a small network and literally every node's IP (including client's IP) is visible if you go into the "router" tab of its web interface. Don't trust I2P. If something isn't stress tested (meaning more people using it and more bugs fixed) then you can't trust it.
How big is the set of users? Is there a way to make your real IP invisible?
>literally every node's IP (including client's IP) is visible if you go into the "router" tab of its web interface
1. far from every public node
2. 0 private/hidden nodes
3. most have dynamic IPs, making this list outdated pretty quickly
4. the list is pointless since, with the exception of people hosting exit nodes on purpose to clearnet, all traffic is happening inside the network, so you cant see who is doing what
>so you cant see who is doing what
there is an unspoken rule about i2p is that if you gonna run it you should run it 24/7 due to this reason alone. too easy for correlation attacks
>most have dynamic IPs
>making this list outdated pretty quickly
some dynamic ip addresses provided by some hosts/isps can last weeks before a change. i wouldn't rely upon that has something that could be used to make it censor proof, especially if the dynamic ip address is taken from a known pool. an adversary could simply block entire ip ranges that nodes appear on. as italy proved to us all recently by blocking ip addresses of cloudflare to combat "piracy" of sports streams, there is not a care in the world about who could be affected by such rampant blocking.
the dynamic ip comment was there to insinuate that someone harvesting these IPs will have a much harder job of doing anything with them, its not the core tenant of why the network itself is secure
shit logo, will never take off
you mean comfy and SOVL logo with fun colours?
>'ick 2 'p
gemmy
Supposedly so glowBlack folk could phone home from foreign countries while blending in with civilian traffic. Later, the State Department realized they could use it to help pro-globohomosexual dissidents launch color revolutions in countries that don't play along with American global hegemony. That's why Tor lost all funding briefly after EFF funding ran out circa 2006. The current purpose to support color revolutions only started at that point.
to sell spice to each other
>What's the real reason
Anything involving the internet and looking for a reason, the answer will always be porn. Sure, they might let intelligence agencies use it to hide their traffic among us plebs, but the answer is always porn. The internet is for porn.