Karna@lemmy.ml to Privacy@lemmy.ml · 20 hours agoTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comexternal-linkmessage-square45fedilinkarrow-up1140arrow-down16cross-posted to: cybersecurity@sh.itjust.works
arrow-up1134arrow-down1external-linkTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comKarna@lemmy.ml to Privacy@lemmy.ml · 20 hours agomessage-square45fedilinkcross-posted to: cybersecurity@sh.itjust.works
minus-squareAutonomous User@lemmy.worldlinkfedilinkEnglisharrow-up10·19 hours agoWhat else you going to use?
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up25arrow-down1·17 hours agoI wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up2·3 hours agoWe use it but it doesn’t have the same protections or reliability as Tor
minus-squareMigratingtoLemmy@lemmy.worldlinkfedilinkEnglisharrow-up2·2 hours agoReally? Care to explain?
minus-squareHelixDab2@lemm.eelinkfedilinkarrow-up1·5 hours agoI’ve tried to use it, but have not managed to get it to work. Which is a bummer. I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up3·5 hours agoRemember that you need to let the server run for a bit, so it can establish , the routes. I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up7·11 hours agohttps://en.m.wikipedia.org/wiki/I2P
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up9·17 hours agoAFAIK it only makes it harder not impossible.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up1·10 hours agoAt least they can’t utili’e the applied tactic to host their own node.
What else you going to use?
I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
We use it but it doesn’t have the same protections or reliability as Tor
Really? Care to explain?
I’ve tried to use it, but have not managed to get it to work. Which is a bummer.
I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
Remember that you need to let the server run for a bit, so it can establish , the routes.
I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
Insane 2lown Posse?
https://en.m.wikipedia.org/wiki/I2P
AFAIK it only makes it harder not impossible.
At least they can’t utili’e the applied tactic to host their own node.