Conversation
Notices
-
Embed this notice
You DEFINITELY need to get a VPN.
-
Embed this notice
@AshChapelsGhost a bnch of commercial vpns are owned by the same company that is run by a guy who worked for intelligence in the IDF
-
Embed this notice
@AshChapelsGhost It is correct you don't need to rely on VPNs anymore to secure a connection with websites, since TLS.
Too bad many TLS connections are MiTM'd by clownflare or google (but a VPN won't help with that).
If you want any possibility of anonymity, a VPN will not do - you'll need to use Tor Browser.
-
Embed this notice
@sally @AshChapelsGhost Unfortunately not enough people use i2p or GNUnet to build up a big enough anonymity set, although they're pretty good.
Tor is focused on exiting, while i2p and GNUnet are focused on in-network.
-
Embed this notice
@Suiseiseki @AshChapelsGhost
> If you want any possibility of anonymity, a VPN will not do - you'll need to use Tor Browser.
Or I2P, or Gnunet.
-
Embed this notice
@sally @AshChapelsGhost >something the Tor project strongly discourages for some mysterious reason.
Torrenting uses a lot of Tor's limited exit bandwidth, especially when using TCP, causes exit hosts to receive copyright complaints and most torrent clients work out your IP and sends that to either a tracker (many trackers only work over UDP and most torrent clients opt to bypass the SOCKS proxy for UDP so trackers work) or to the DHT, thus the intended goal of anonymous torrenting usually ends up failing.
i2p and GNUnet meanwhile happily tunnels UDP, which bittorrent works great over.
-
Embed this notice
@Suiseiseki @AshChapelsGhost
I2P in my experience is enough robust that torrent is possible, something the Tor project strongly discourages for some mysterious reason. I would hope the future of free internet was taken over by I2P or Gnunet rather than Tor to be honest, exit nodes being so built into the network is an unacceptable compromise.
-
Embed this notice
@sally @AshChapelsGhost Exit nodes are opt-in - if you connect to an .onion, your packets do not exit.
Glowers host some guards and some exits, but they're removed when they're discovered as they only make up a small percentage of the network.
i2p does not have in-protocol support for exiting, although one group is hosting exit tunnels that can be accessed via an .i2p address.
-
Embed this notice
@Suiseiseki @AshChapelsGhost
Yeah, that's a problem started because of exit nodes being opt-out rather than opt-in like on I2P, it's no surprise some users go around claiming Tor is compromised by corporate and federa agents.
-
Embed this notice
@sally @AshChapelsGhost You can configure tor to not build circuits with exit nodes, although there is no Tor Browser setting for that - but you can just configure the bundled tor, or configure a separate tor and get Tor Browser to use that instead.
-
Embed this notice
@Suiseiseki @AshChapelsGhost
> Exit nodes are opt-in
Is there any setting on the browser to block exit nodes entirely?