@jwildeboer So we shall mirror it #anonymously and over a #VPN plus tunneling into #tor then #i2p then IP over Avian Carriers… 😅😜 Jokes apart how big is it? And even more seriously, isn't it "a little #biased" at least on the #political issues?
Seja para uma organização, uma comunidade ou um bate-papo em grupo com amigos, o Quiet permite que você controle todos os seus dados sem precisar executar seus próprios servidores.
Idiocy ---------- Spending money in services that blocks legit users who use TOR because of: "Our system thinks you might be a robot!" while letting real "AI" bots to access the info because they disguise themselves as regular sheep user's browsers.
Our #38C3#tor talk is today at 20:30, Saal Zigzag:
“This talk is designed to give an overview of Tor's 'new and not-so-new' network health initiatives in response to some of the pressing questions that emerged from the recent reporting about Tor in Germany.”
src/test/test_crypto_ope.c:59:27: warning: initializer-string for array of ‘unsigned char’ is too long [-Wunterminated-string-initialization] 59 | const uint8_t key[32] = "A fixed key, chosen arbitrarily.";
it's right you know, @torproject that's a 33 "uint8_t" string not a 32 one
Enterprise IT Security tends to lose its shit when their endpoint protection finds #Tor browser on employees' devices.
Unless you do deep packet inspection / middlebox all traffic, I don't see a meaningful risk increase. (If you do, then it seems comparable to e.g., Apple Private Relay + browsers' DoH use.)
Does anybody have a good summary (not written by a VPN vendor) on the actual risk to the enterprise from its use by average users (not attacks on Tor itself, nor running a Tor node)?
Your monthly reminder to use the #Tor browser on a daily basis.
The more you use it, the better protected are people in repressive countries who want to use a free internet, journalists and researchers who want to protect themselves from discovery, whistleblowers, activists, and ordinary people who want to opt out of invasive third party tracking.
Votre rappel mensuel d'utiliser le navigateur #Tor au quotidien.
Plus vous l'utilisez, mieux sont protégées les personnes situées dans des pays où règne la répression et qui souhaitent utiliser un Internet libre, les journalistes et les chercheurs qui ne veulent pas être découverts, les lanceurs d’alerte et les personnes ordinaires qui ne veulent pas être suivis à la trace par des tiers invasifs.
In the spirit of a recent post on making the #Fediverse a more welcoming place, renewing a post I had on my old profile but apparently not here: ask me anything! I can't guarantee I'll have all the answers or be fast to reply but lll try to at least say something. Some things I can talk vaguely usefully about include:
Everyone has the right to browse, search, and speak online without the threat of their activities being tracked, sold to data brokers, or fed to the AI machine.
At Tor, we’re building tools to help people exercise that right to privacy easily (and at no cost)!
Please consider making a donation to Tor so we can keep building a better, privacy-respecting internet:
Creating a #freebsd#openbsd "security/tor" gateway in the cloud, so I can connect with all my Browsers/Apps/Services (Desktop & Mobile) from everywhere and route my traffic through it?
And to pump it up, I also would install a #headscale server, so I could tunnel my traffic to the VPS via Tailscale privately.