• 2 Posts
  • 52 Comments
Joined 1 year ago
cake
Cake day: June 20th, 2023

help-circle













  • I typically don’t have the time to watch videos but I did in this case. It’s not wrong. The question is: what is your threat model?

    First, Tor is not designed to protect you from a global passive adversary nevermind an active one. Global network probes can be used to identify individual sessions by traffic timing correlations. Locating hidden services is quite easy that way, since they’re sitting ducks. It is fairly easy to remotely compromise hidden service marketplaces for TLA players and/or use physical access to hardware and/or operators to make them cooperate with LEOs.

    If you are trying to avoid ISP level snooping and blocking, advertisers, Google and national scale actors then Tor is the right tool to use. And by all means, do run your own relays to help the network. The more relays we have, the harder the attack.






  • Your profile contains your post history to many of your communities.

    I’m pointing out that if you’re going to the trouble of hosting your own instance you could as well allow some convenient number of random users to register. It would erase most of your signal and help distribute the load and exposure to specific legal compartments.