Karna@lemmy.ml to Privacy@lemmy.ml · 1 day agoTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comexternal-linkmessage-square60fedilinkarrow-up1165arrow-down16cross-posted to: cybersecurity@sh.itjust.works
arrow-up1159arrow-down1external-linkTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comKarna@lemmy.ml to Privacy@lemmy.ml · 1 day agomessage-square60fedilinkcross-posted to: cybersecurity@sh.itjust.works
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up25arrow-down2·1 day agoI wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up3·9 hours agoWe use it but it doesn’t have the same protections or reliability as Tor
minus-squareMigratingtoLemmy@lemmy.worldlinkfedilinkEnglisharrow-up2·9 hours agoReally? Care to explain?
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up1·4 hours agoCheck the FAQ Also it lacks the more advanced features of Tor
minus-squareMigratingtoLemmy@lemmy.worldlinkfedilinkEnglisharrow-up1·edit-24 hours agoPlease mention the “advanced features” it lacks compared to TOR. I have read the FAQ
minus-squareHelixDab2@lemm.eelinkfedilinkarrow-up1·12 hours agoI’ve tried to use it, but have not managed to get it to work. Which is a bummer. I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up3·11 hours agoRemember that you need to let the server run for a bit, so it can establish , the routes. I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up8·17 hours agohttps://en.m.wikipedia.org/wiki/I2P
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up9·24 hours agoAFAIK it only makes it harder not impossible.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up1·17 hours agoAt least they can’t utili’e the applied tactic to host their own node.
I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
We use it but it doesn’t have the same protections or reliability as Tor
Really? Care to explain?
Check the FAQ
Also it lacks the more advanced features of Tor
Please mention the “advanced features” it lacks compared to TOR. I have read the FAQ
I’ve tried to use it, but have not managed to get it to work. Which is a bummer.
I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
Remember that you need to let the server run for a bit, so it can establish , the routes.
I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
Insane 2lown Posse?
https://en.m.wikipedia.org/wiki/I2P
AFAIK it only makes it harder not impossible.
At least they can’t utili’e the applied tactic to host their own node.