Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Zombywuf
Mar 29, 2008

The Worst Muslim posted:

Onions used mostly by cowardly nerds to cover up their illegal pornography habit and sometimes used by people who insist that it's not all about hiding illegal pornography, it's just that the GOVERNMENT is SPYING on MY PORN C:/Users/Brian/Desktop/Momdontclick/stopmom/mymomisabitch.exe

Even worse, the government themselves are using tor to send EMAILS http://www.zdnet.com/blog/security/sensitive-government-e-mails-leak-through-tor-exit-nodes/503

Adbot
ADBOT LOVES YOU

Miley Virus
Apr 9, 2010

i love how tor is secure and poo poo except for the part where the people at the end of the connection can see absolutely everything you browse/do

tef
May 30, 2004

-> some l-system crap ->
youre tax dollers at work

http://patft1.uspto.gov/netacgi/nph...4&RS=PN/6266704

ants on my cum rag
Sep 2, 2011

"Oh God you got the spray gun, DO NOT LOSE IT, you seriously better not screw this up, I'm not kidding"
~~The Battle Hymn of the Contra Tiger Mother~~

what if they tell my mom about my folder?!

Shaggar
Apr 26, 2006
running an exit node seems like it would be a way easy way for the gov to scoop up tons of pedos

Jonny 290
May 5, 2005



[ASK] me about OS/2 Warp

Shaggar posted:

running an exit node seems like it would be a way easy way for the gov to scoop up tons of pedos

i mean, not to go all darkside, but if the exit nodes CAN be compromised, and theres no way to either detect or avoid this, they need to all be regarded as compromised and thus the network never used, this is bsaic security

Shaggar
Apr 26, 2006
plus, any ISP (in the US atleast) holds you 100% accountable for all traffic coming from your connection regardless of if its actually you. so running a tor exit node seems like it would be a terrible idea and no one in their right mind would do it.

Sweeper
Nov 29, 2007
The Joe Buck of Posting
Dinosaur Gum

Orbi posted:

i love how tor is secure and poo poo except for the part where the people at the end of the connection can see absolutely everything you browse/do

lol yea gently caress those guys cant even do something thats impossible

tef
May 30, 2004

-> some l-system crap ->

Jonny 290 posted:

i mean, not to go all darkside, but if the exit nodes CAN be compromised, and theres no way to either detect or avoid this, they need to all be regarded as compromised and thus the network never used, this is bsaic security

tor isn't end to end encryption, it's an anonymizer. :confused:

Shaggar
Apr 26, 2006
i think his point was the anonymity is defeated if the exit node watches everything you do.

tef
May 30, 2004

-> some l-system crap ->
my favourite anonymous broadcast primitive is a dining cryptographers network :3:

http://en.wikipedia.org/wiki/Dining_cryptographers_problem

tef
May 30, 2004

-> some l-system crap ->

Shaggar posted:

i think his point was the anonymity is defeated if the exit node watches everything you do.

only if you're sending messages with your name in ?

it's like putting a return address on the letter but not the envelope

Shaggar
Apr 26, 2006
cant you see the traffic coming in though? or does tor traffic go across multiple nodes before getting to the final exit node every time?

tef
May 30, 2004

-> some l-system crap ->

quote:

Tor passes your traffic through at least 3 different servers before sending it on to the destination. Because there's a separate layer of encryption for each of the three relays, Tor does not modify, or even know, what you are sending into it. It merely relays your traffic, completely encrypted through the Tor network and has it pop out somewhere else in the world, completely intact.

A bad first of three servers can see encrypted Tor traffic coming from your computer. It still doesn't know who you are and what you are doing over Tor. It merely sees "This IP address is using Tor".

A bad third of three servers can see the traffic you sent into Tor. It won't know who sent this traffic. If you're using encryption, such as visiting a bank or e-commerce website, or encrypted mail connections, etc, it will only know the destination. It won't be able to see the data inside the traffic stream. You are still protected from this node figuring out who you are and if using encryption, what data you're sending to the destination.

effort.

tef
May 30, 2004

-> some l-system crap ->
or https://blog.torproject.org/blog/one-cell-enough

my favourite tor attack is the one for finding hidden servers through their clock skew

Shaggar
Apr 26, 2006
oic. i wonder if you could game whatever system it uses to pick nodes so that you could be more likely to own all the nodes in the path.

Johnny Cache Hit
Oct 17, 2011

Shaggar posted:

oic. i wonder if you could game whatever system it uses to pick nodes so that you could be more likely to own all the nodes in the path.

lol if you think the NSA doesn't already run a majority of Tor nodes

Blotto Skorzany
Nov 7, 2008

He's a PSoC, loose and runnin'
came the whisper from each lip
And he's here to do some business with
the bad ADC on his chip
bad ADC on his chiiiiip

Johnny Cache Hit posted:

lol if you think the NSA doesn't already run a majority of Tor nodes

there are a shitton of exit nodes in langley, va :tinfoil:

Shaggar
Apr 26, 2006

Johnny Cache Hit posted:

lol if you think the NSA doesn't already run a majority of Tor nodes

yeah that too. lol.

Condiv
May 7, 2008

Sorry to undo the effort of paying a domestic abuser $10 to own this poster, but I am going to lose my dang mind if I keep seeing multiple posters who appear to be Baloogan.

With love,
a mod


http://www.infoq.com/news/2012/10/Ruby-on-Rails-Node-js-LinkedIn

Those linkedIn guys sure are clever. Switching to nodejs from RoR and having frontend programmers do backend code will not only save time, but it will improve security!

rotor
Jun 11, 2001

classic case of pineapple on pizzadog derangement syndrome
im actually doin some node stuff now but its a bunch of one-off things that'll be used like once an hour

so far so good, but i can see how this'd get out of hand pretty fast.

Sweeper
Nov 29, 2007
The Joe Buck of Posting
Dinosaur Gum

Condiv posted:

http://www.infoq.com/news/2012/10/Ruby-on-Rails-Node-js-LinkedIn

Those linkedIn guys sure are clever. Switching to nodejs from RoR and having frontend programmers do backend code will not only save time, but it will improve security!

linked in has been known for their past security efforts

Max Facetime
Apr 18, 2009

Otto Skorzeny posted:

there are a shitton of exit nodes in langley, va :tinfoil:

running tor nodes is mainly of interest to cryptonerds, OTOH nsa/cia/fbi employ a lot of cryptonerds

correlation is not causation :rant:

abraham linksys
Sep 6, 2010

:darksouls:

rotor posted:

but i can see how this'd get out of hand pretty fast.

javascript in a nutshell

Zombywuf
Mar 29, 2008

Shaggar posted:

oic. i wonder if you could game whatever system it uses to pick nodes so that you could be more likely to own all the nodes in the path.

Spin up a few thousand exit nodes on EC2, problem solved.

rotor
Jun 11, 2001

classic case of pineapple on pizzadog derangement syndrome

abraham linksys posted:

javascript in a nutshell

do one thing and do it well.

make larger programs out of many smaller programs.

Zombywuf
Mar 29, 2008

rotor posted:

do one thing and do it well.

make larger programs out of many smaller programs.

If only this were remotely possible in the modern world...

rotor
Jun 11, 2001

classic case of pineapple on pizzadog derangement syndrome

Zombywuf posted:

If only this were remotely possible in the modern world...

:rolleyes:

Jonny 290
May 5, 2005



[ASK] me about OS/2 Warp
code:
print "<td>".sprintf("0%1d",$derp{$_}{'herp'})."</td>\n\t" if ($derp{$_}{'herp'} < 10);
                                print "<td>$derp{$_}{'herp'}</td>\n\t" if ($derp{$_}{'herp'} >= 10);
HACKED UP BY CHINESE

Shaggar
Apr 26, 2006

Zombywuf posted:

If only this were remotely possible in the modern world...

its called soa and it owns.

Zombywuf
Mar 29, 2008

Shaggar posted:

its called soa and it owns.

If step one of your "small programs" method requires firing up a monstrous IDE you might be missing the point.

Shaggar
Apr 26, 2006
if you're arent developing in an ide you arent developing software

Zombywuf
Mar 29, 2008

Shaggar posted:

if you're arent developing in an ide you arent developing software

I use Emacs as an IDE, by today's standards it's a small program that uses lots of other small programs to do its thing.

Shaggar
Apr 26, 2006
emacs isnt an ide, its a text editor (and a bad one at that)

rotor
Jun 11, 2001

classic case of pineapple on pizzadog derangement syndrome

Zombywuf posted:

If step one of your "small programs" method requires firing up a monstrous IDE you might be missing the point.

why does the ide matter at all

wolffenstein
Aug 2, 2002
 
Pork Pro

JawnV6 posted:

ugh

i love this and hate this

why

Shaggar
Apr 26, 2006
when you do your soa you need to make sure that the communication between services is standardized (ex: soap) and not a total mess of crap (ex: rest/string parsing)

Catalyst-proof
May 11, 2011

better waste some time with you

Shaggar posted:

emacs isnt an ide, its a text editor (and a bad one at that)

i will beat you black and blue with a garden hose

Jonny 290
May 5, 2005



[ASK] me about OS/2 Warp

WHOIS John Galt posted:

i will beat you black and blue with a garden hose

how many emacs meta keys does that take

Adbot
ADBOT LOVES YOU

Jonny 290
May 5, 2005



[ASK] me about OS/2 Warp
lol, vi is trash! who wants to type 'd4w' to delete four words? Simply hit Ctrl-Alt-meta-Super-AltGr-Rubout-T, select your number of words to delete by hitting CTRL-F(x) where X is the least significant digit of your word count in octal,

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply