285
submitted 1 year ago by CrypticCoffee@lemmy.ml to c/privacy@lemmy.ml

Looks like UK is going the same way as a few states. Spare a thought for us. So messed up this increasing surveillance state.

you are viewing a single comment's thread
view the rest of the comments
[-] tetris11@lemmy.ml 10 points 1 year ago

Tor can be compromised though, you just need someone watching a good portion of the end nodes and hosting the fastest intermediate nodes, then run a viterbi trace back to a source. Tor is also very slow.

I'm looking at IPFS and FreeNet as viable alternatives

[-] LukefromDC@kolektiva.social 16 points 1 year ago

@tetris11 Slow yes, but if you download videos rather than stream them, slow is much less of an issue.

Even the US is not capable of watching all Tor exit and guard nodes. The UK sure as hell is not. The Torproject by the way is always looking for and decommissioning malicious Tor nodes, so the risk to any one user is low.

The usual way to attack a Tor user is to get them to connect to Tor to destination site you have compromised with javascript ON, then send a malware installer to the real target's computer. The installer then downloads a rather standard payload that tells the computer to phone home on a non-Tor connection. The widely reported 2013 incident used a Windows-only payload, today they probably add iOS and Android. Stock android that is. If it was reasonably practical for cops to see through Tor they would not put so much effort in seeing around it instead.

Things like the Silk Road takedown were very time consuming and labor-intensive, and required a lot of old fashioned exploits and unskilled admins at the targets. In other words, Tor, Signal, anything else running on an untrusted device also become untrusted. Silk Road was still brutally difficult for the cops, and that was a major, motivated investigation that unlike UK or Utah porn cops wasn't going to run into a stone wall of non-extraditability or lack of jurisidiction on someone with zero local "business presence."

BTW, do not use Google Fiber to connect to Tor to use Google privately, because if you do, Google can see your device directly(being your ISP), and see the one exit node they are talking to, allowing a confirmation attack.

this post was submitted on 07 Dec 2023
285 points (100.0% liked)

Privacy

32465 readers
511 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS