Post AcqbdFHbyvFwbP4pcm by philcolbourn@noagendasocial.com
 (DIR) More posts by philcolbourn@noagendasocial.com
 (DIR) Post #Acn7m66YmWsZ9e13K4 by philcolbourn@noagendasocial.com
       2023-12-14T06:10:35Z
       
       0 likes, 0 repeats
       
       Steve Gibson says to keep away from TOR.TOR may be our only way to secure ourselves from malware and baddies and other three letter intelligence services.
       
 (DIR) Post #Acn80i0WeoNilIA1hY by harvhat@noagendasocial.com
       2023-12-14T06:13:13Z
       
       1 likes, 1 repeats
       
       @philcolbourn Though you should make note that TOR is a three letter service! 🤔 🤨  🤠
       
 (DIR) Post #Acn97u1wSGYc1zojVg by El_Jefe@noagendasocial.com
       2023-12-14T06:25:44Z
       
       0 likes, 0 repeats
       
       @harvhat @philcolbourn wasn’t it a Navy project?  thought I read or heard that somewhere
       
 (DIR) Post #AcnA85wcG5Ssw6yvYW by ned@noagendasocial.com
       2023-12-14T06:36:58Z
       
       1 likes, 1 repeats
       
       @philcolbourn not if those 3 letter agencies are running all the exit nodes!
       
 (DIR) Post #AcnA8I6d2gbWedl5pQ by TikToc@noagendasocial.com
       2023-12-14T06:37:00Z
       
       0 likes, 0 repeats
       
       @El_Jefe @harvhat @philcolbourn -- I heard the same thing.
       
 (DIR) Post #AcnAICy30AA7c7TQKu by harvhat@noagendasocial.com
       2023-12-14T06:38:48Z
       
       0 likes, 0 repeats
       
       @TikToc @El_Jefe @philcolbourn I heard similar, it definitely got some government funds. I don't remember the details (and maybe it was FUD) but I wouldn't be surprised at all if the CIA was involved.
       
 (DIR) Post #AcnAeLk13tkdCCT6aO by Mummabear@noagendasocial.com
       2023-12-14T06:42:48Z
       
       0 likes, 0 repeats
       
       @philcolbourn why?
       
 (DIR) Post #AcnAsCYM1HpEkmcQAS by Sophistifunk@noagendasocial.com
       2023-12-14T06:45:18Z
       
       0 likes, 0 repeats
       
       @ned @philcolbourn which they most certainly are.
       
 (DIR) Post #AcnAzatRvCpqGq0jdQ by El_Jefe@noagendasocial.com
       2023-12-14T06:46:38Z
       
       0 likes, 1 repeats
       
       @harvhat @TikToc @philcolbourn From wikiThe core principle of Tor, onion routing, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, to protect American intelligence communications online.https://en.m.wikipedia.org/wiki/Tor_(network)
       
 (DIR) Post #AcnBkSeiMnk8KfT07c by FortyTwo@noagendasocial.com
       2023-12-14T06:55:04Z
       
       0 likes, 0 repeats
       
       @Mummabear @philcolbourn because that was the "VPN" of the day.TOR was super secret and secure and your government couldn't spy on you, but, just like VPN providers, it's only as secure as the people who own the machines you're routing your internet traffic through.You're hoping they won't keep logs and sell your web traffic, or pass it along to a government agency.Plus, a lot of ne'er-do-wells set up shop on TOR thinking they're safe from gov't (they're not)
       
 (DIR) Post #AcnQ5RVZE8z0DG5SWO by cook@noagendasocial.com
       2023-12-14T09:35:46Z
       
       0 likes, 0 repeats
       
       @ned @philcolbourn I recall @adam saying during a show several years ago that early development/funding came from US intel. Not sure how trustworthy that is.
       
 (DIR) Post #AcnkNDa9jyC3JlzFI0 by amerika@noagendasocial.com
       2023-12-14T13:23:04Z
       
       0 likes, 0 repeats
       
       @philcolbourn Who do you think runs the biggest exit nodes
       
 (DIR) Post #AcnoRiEq6S4LN5Pm1Q by chanon@noagendasocial.com
       2023-12-14T14:08:43Z
       
       0 likes, 0 repeats
       
       @FortyTwoTor is much more than a VPN, to be fair. It makes it so that traffic on any single node is encrypted, so logs do the spooks no good until that encryption can be broken. The concern is whether the spooks own enough nodes to potentially compromise the system, and that's still unknown. If enough legitimate nodes still exist, there is still hope.@Mummabear @philcolbourn
       
 (DIR) Post #AcpkoLjT34LYDeW3TE by philcolbourn@noagendasocial.com
       2023-12-15T12:37:25Z
       
       0 likes, 0 repeats
       
       @Mummabear he doesn't like dark web sites - well, ones he doesn't like and so it all must be bad
       
 (DIR) Post #AcplmYDHm1ggIrAZ4y by philcolbourn@noagendasocial.com
       2023-12-15T12:48:18Z
       
       0 likes, 0 repeats
       
       @FortyTwo @MummabearToR can be used like a VPNit can also run services that don't appear on Interneteg. i have a home automation serveri rarely want to look at it when I'm not home, but i sometimes want to show othersi run a TOR hidden serviceto access it, you need a tor browser or browser connected via socks to TOR - same thing really...then with an address like http://asfdr476gds36ch5.onionin this case, you have to have this to access my serverbaddies can't find and attack it
       
 (DIR) Post #AcpmJ2TYnHOBQYH03k by philcolbourn@noagendasocial.com
       2023-12-15T12:54:10Z
       
       0 likes, 0 repeats
       
       @FortyTwo @Mummabear VPN are good for 2 things in my mind1. appearing to be in a country you are not in2. moving your firewall to someone else's computer.ok... one more...3. hide your traffic from your ISP - but only if you secure your DNS queries and don't use your ISP' DNS
       
 (DIR) Post #AcpmTexmYMXHgpTQWG by philcolbourn@noagendasocial.com
       2023-12-15T12:56:05Z
       
       0 likes, 0 repeats
       
       @amerika how does it matter?
       
 (DIR) Post #AcpnCwsCoKXWGgScfw by philcolbourn@noagendasocial.com
       2023-12-15T13:04:16Z
       
       0 likes, 1 repeats
       
       @cook yep. US naval gazers. but it's open source now. there are ways to de-anomyise by packet timing analysisbut if general tor routing method is backdoored then all encryption is likely backdoored.
       
 (DIR) Post #AcpnH4drrvBJWLimrw by Zerglingman@freespeechextremist.com
       2023-12-15T13:05:01.808917Z
       
       0 likes, 0 repeats
       
       @El_Jefe @philcolbourn @TikToc @harvhat >>>>GoldschlagNose
       
 (DIR) Post #AcpnKtOpbsyVoLVcps by philcolbourn@noagendasocial.com
       2023-12-15T13:05:42Z
       
       0 likes, 0 repeats
       
       @ned how does this matter?
       
 (DIR) Post #AcpnQwkm3MLTwzewbI by philcolbourn@noagendasocial.com
       2023-12-15T13:06:48Z
       
       0 likes, 0 repeats
       
       @Sophistifunk @ned yes, they use it too.
       
 (DIR) Post #Acq9MzaNmKHgZIJns0 by cook@noagendasocial.com
       2023-12-15T17:12:36Z
       
       0 likes, 0 repeats
       
       @philcolbourn why is it better than just using a vpn and brave browser?
       
 (DIR) Post #AcqbbfoWMzLoJ5ijJY by philcolbourn@noagendasocial.com
       2023-12-15T22:28:59Z
       
       0 likes, 0 repeats
       
       @cook brave has a built-in tor option! but i assume you are not referring to that.it's better for running remote access to your servers, or limiting who access this services, or DoS protection, or anonymity if you don't login with a traceable account.ideal for my home automation remote access server. perhaps you want to run your own file server but are concerned about security of port forwarding?
       
 (DIR) Post #AcqbdFHbyvFwbP4pcm by philcolbourn@noagendasocial.com
       2023-12-15T22:29:16Z
       
       0 likes, 0 repeats
       
       @cook what I'm thinking is that it secures so called IoT devices on public or private networks - only devices with - effectively - shared key or unique private key pair can access device or local network.
       
 (DIR) Post #Acqc8gsXQpr7AKLLGq by philcolbourn@noagendasocial.com
       2023-12-15T22:34:57Z
       
       0 likes, 0 repeats
       
       @cook a VPN is good. but it you have an account so you can't be anonymous.it makes your masquerading firewall at VPN provider which is also good. hard to run a server behind it, so good for clients.
       
 (DIR) Post #AcqcEUmzIFJzPMVzbE by Sabex@noagendasocial.com
       2023-12-15T22:36:00Z
       
       0 likes, 0 repeats
       
       @cook @ned @philcolbourn @adam that is known Khaleesi
       
 (DIR) Post #AcqfB4TCzRe6m6K2Nc by cook@noagendasocial.com
       2023-12-15T23:09:00Z
       
       0 likes, 0 repeats
       
       @philcolbourn mainly surfing privacy and torrenting for me
       
 (DIR) Post #AcrvBTiguAoRVgjwbA by philcolbourn@noagendasocial.com
       2023-12-16T13:43:04Z
       
       0 likes, 0 repeats
       
       @cook VPNs don't give your surfing privacy when doing anything - your VPN knows who you are.
       
 (DIR) Post #Acx6pNuZzQNUMjKdCC by philcolbourn@noagendasocial.com
       2023-12-19T01:47:05Z
       
       0 likes, 0 repeats
       
       @chanon @FortyTwo @Mummabear say TLA have all nodes. what does this matter?can they see my traffic? yes but they can see it now. if i send traffic unencrypted, they can already see it if i send encrypted traffic, they can record it and they can see what site traffic went to.if i login to a site, they can see who i am regardless of tor. only advantage they get is to de-anomyise someone who is trying to stay anonymous.they can't see any more or less of my traffic.
       
 (DIR) Post #AcxDnYellhqqn50r8C by chanon@noagendasocial.com
       2023-12-19T03:05:12Z
       
       0 likes, 0 repeats
       
       @philcolbournYou're not actually making the, "if you have nothing to hide..." argument, are you? De-anonymizing someone who wants to be anonymous is an issue.@FortyTwo @Mummabear
       
 (DIR) Post #AcxH5H3GGHy3GTbkn2 by FortyTwo@noagendasocial.com
       2023-12-19T03:42:01Z
       
       0 likes, 0 repeats
       
       @chanon @philcolbourn @Mummabear Somebody owning a Tor exit node can sniff and modify any traffic. This includes of course also man-in-the-middle attacks against HTTPS connections. This is not only theoretical attack but used in practice, see https://trac.torproject.org/projects/tor/ticket/8657
       
 (DIR) Post #AcydiQF2Q5cbD69Hnc by Mummabear@noagendasocial.com
       2023-12-19T19:30:19Z
       
       0 likes, 0 repeats
       
       @chanon @philcolbourn @FortyTwo
       
 (DIR) Post #Aczh7W5SJkwbbFHg9Y by philcolbourn@noagendasocial.com
       2023-12-20T07:43:10Z
       
       0 likes, 0 repeats
       
       @FortyTwo ditto for your isp and vpn
       
 (DIR) Post #AczhhNPW3OrH7ClaYC by philcolbourn@noagendasocial.com
       2023-12-20T07:49:39Z
       
       0 likes, 0 repeats
       
       @chanon @FortyTwo @Mummabear no. I'm saying that a tor exit node is no different to your isp or vpn. if your https can be hacked it can be hacked by isp and vpn and anyone they are controlled by.but if there are non TLA exit nodes then your is of being anonymous are better.
       
 (DIR) Post #AczmV83VohSbmxSBma by FortyTwo@noagendasocial.com
       2023-12-20T08:43:28Z
       
       0 likes, 0 repeats
       
       @philcolbourn yeah, no argument there