|
The Worst Muslim posted:Onions used mostly by cowardly nerds to cover up their illegal pornography habit and sometimes used by people who insist that it's not all about hiding illegal pornography, it's just that the GOVERNMENT is SPYING on MY Even worse, the government themselves are using tor to send EMAILS http://www.zdnet.com/blog/security/sensitive-government-e-mails-leak-through-tor-exit-nodes/503
|
# ? Oct 8, 2012 13:12 |
|
|
# ? Jun 11, 2024 14:44 |
|
i love how tor is secure and poo poo except for the part where the people at the end of the connection can see absolutely everything you browse/do
|
# ? Oct 8, 2012 14:09 |
|
youre tax dollers at work http://patft1.uspto.gov/netacgi/nph...4&RS=PN/6266704
|
# ? Oct 8, 2012 15:01 |
|
Zombywuf posted:Even worse, the government themselves are using tor to send EMAILS http://www.zdnet.com/blog/security/sensitive-government-e-mails-leak-through-tor-exit-nodes/503 what if they tell my mom about my folder?!
|
# ? Oct 8, 2012 15:11 |
|
running an exit node seems like it would be a way easy way for the gov to scoop up tons of pedos
|
# ? Oct 8, 2012 15:12 |
|
Shaggar posted:running an exit node seems like it would be a way easy way for the gov to scoop up tons of pedos i mean, not to go all darkside, but if the exit nodes CAN be compromised, and theres no way to either detect or avoid this, they need to all be regarded as compromised and thus the network never used, this is bsaic security
|
# ? Oct 8, 2012 15:16 |
|
plus, any ISP (in the US atleast) holds you 100% accountable for all traffic coming from your connection regardless of if its actually you. so running a tor exit node seems like it would be a terrible idea and no one in their right mind would do it.
|
# ? Oct 8, 2012 15:28 |
|
Orbi posted:i love how tor is secure and poo poo except for the part where the people at the end of the connection can see absolutely everything you browse/do lol yea gently caress those guys cant even do something thats impossible
|
# ? Oct 8, 2012 15:31 |
|
Jonny 290 posted:i mean, not to go all darkside, but if the exit nodes CAN be compromised, and theres no way to either detect or avoid this, they need to all be regarded as compromised and thus the network never used, this is bsaic security tor isn't end to end encryption, it's an anonymizer.
|
# ? Oct 8, 2012 15:37 |
|
i think his point was the anonymity is defeated if the exit node watches everything you do.
|
# ? Oct 8, 2012 15:38 |
|
my favourite anonymous broadcast primitive is a dining cryptographers network http://en.wikipedia.org/wiki/Dining_cryptographers_problem
|
# ? Oct 8, 2012 15:41 |
|
Shaggar posted:i think his point was the anonymity is defeated if the exit node watches everything you do. only if you're sending messages with your name in ? it's like putting a return address on the letter but not the envelope
|
# ? Oct 8, 2012 15:42 |
|
cant you see the traffic coming in though? or does tor traffic go across multiple nodes before getting to the final exit node every time?
|
# ? Oct 8, 2012 15:44 |
|
quote:Tor passes your traffic through at least 3 different servers before sending it on to the destination. Because there's a separate layer of encryption for each of the three relays, Tor does not modify, or even know, what you are sending into it. It merely relays your traffic, completely encrypted through the Tor network and has it pop out somewhere else in the world, completely intact. effort.
|
# ? Oct 8, 2012 15:51 |
|
or https://blog.torproject.org/blog/one-cell-enough my favourite tor attack is the one for finding hidden servers through their clock skew
|
# ? Oct 8, 2012 15:56 |
|
oic. i wonder if you could game whatever system it uses to pick nodes so that you could be more likely to own all the nodes in the path.
|
# ? Oct 8, 2012 15:57 |
|
Shaggar posted:oic. i wonder if you could game whatever system it uses to pick nodes so that you could be more likely to own all the nodes in the path. lol if you think the NSA doesn't already run a majority of Tor nodes
|
# ? Oct 8, 2012 16:11 |
|
Johnny Cache Hit posted:lol if you think the NSA doesn't already run a majority of Tor nodes there are a shitton of exit nodes in langley, va
|
# ? Oct 8, 2012 16:13 |
|
Johnny Cache Hit posted:lol if you think the NSA doesn't already run a majority of Tor nodes yeah that too. lol.
|
# ? Oct 8, 2012 16:16 |
|
http://www.infoq.com/news/2012/10/Ruby-on-Rails-Node-js-LinkedIn Those linkedIn guys sure are clever. Switching to nodejs from RoR and having frontend programmers do backend code will not only save time, but it will improve security!
|
# ? Oct 8, 2012 17:09 |
|
im actually doin some node stuff now but its a bunch of one-off things that'll be used like once an hour so far so good, but i can see how this'd get out of hand pretty fast.
|
# ? Oct 8, 2012 17:11 |
|
Condiv posted:http://www.infoq.com/news/2012/10/Ruby-on-Rails-Node-js-LinkedIn linked in has been known for their past security efforts
|
# ? Oct 8, 2012 17:13 |
|
Otto Skorzeny posted:there are a shitton of exit nodes in langley, va running tor nodes is mainly of interest to cryptonerds, OTOH nsa/cia/fbi employ a lot of cryptonerds correlation is not causation
|
# ? Oct 8, 2012 17:17 |
|
rotor posted:but i can see how this'd get out of hand pretty fast. javascript in a nutshell
|
# ? Oct 8, 2012 17:23 |
|
Shaggar posted:oic. i wonder if you could game whatever system it uses to pick nodes so that you could be more likely to own all the nodes in the path. Spin up a few thousand exit nodes on EC2, problem solved.
|
# ? Oct 8, 2012 18:03 |
|
abraham linksys posted:javascript in a nutshell do one thing and do it well. make larger programs out of many smaller programs.
|
# ? Oct 8, 2012 18:06 |
|
rotor posted:do one thing and do it well. If only this were remotely possible in the modern world...
|
# ? Oct 8, 2012 18:27 |
|
Zombywuf posted:If only this were remotely possible in the modern world...
|
# ? Oct 8, 2012 18:28 |
|
code:
|
# ? Oct 8, 2012 18:42 |
|
Zombywuf posted:If only this were remotely possible in the modern world... its called soa and it owns.
|
# ? Oct 8, 2012 18:42 |
|
Shaggar posted:its called soa and it owns. If step one of your "small programs" method requires firing up a monstrous IDE you might be missing the point.
|
# ? Oct 8, 2012 18:52 |
|
if you're arent developing in an ide you arent developing software
|
# ? Oct 8, 2012 18:55 |
|
Shaggar posted:if you're arent developing in an ide you arent developing software I use Emacs as an IDE, by today's standards it's a small program that uses lots of other small programs to do its thing.
|
# ? Oct 8, 2012 19:19 |
|
emacs isnt an ide, its a text editor (and a bad one at that)
|
# ? Oct 8, 2012 19:19 |
|
Zombywuf posted:If step one of your "small programs" method requires firing up a monstrous IDE you might be missing the point. why does the ide matter at all
|
# ? Oct 8, 2012 19:32 |
|
JawnV6 posted:ugh why
|
# ? Oct 8, 2012 19:32 |
|
when you do your soa you need to make sure that the communication between services is standardized (ex: soap) and not a total mess of crap (ex: rest/string parsing)
|
# ? Oct 8, 2012 19:33 |
|
Shaggar posted:emacs isnt an ide, its a text editor (and a bad one at that) i will beat you black and blue with a garden hose
|
# ? Oct 8, 2012 20:07 |
|
WHOIS John Galt posted:i will beat you black and blue with a garden hose how many emacs meta keys does that take
|
# ? Oct 8, 2012 20:11 |
|
|
# ? Jun 11, 2024 14:44 |
|
lol, vi is trash! who wants to type 'd4w' to delete four words? Simply hit Ctrl-Alt-meta-Super-AltGr-Rubout-T, select your number of words to delete by hitting CTRL-F(x) where X is the least significant digit of your word count in octal,
|
# ? Oct 8, 2012 20:12 |