this post was submitted on 12 Jul 2025
124 points (99.2% liked)
chapotraphouse
13929 readers
672 users here now
Banned? DM Wmill to appeal.
No anti-nautilism posts. See: Eco-fascism Primer
Slop posts go in c/slop. Don't post low-hanging fruit here.
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Move everything to TOR.
TOR isn't really all that safe either
How so? If you keep everything in network on hidden services you don't really need to worry about timing attacks, right? And as long as the server is keeping their shit secure and up to date and the client isn't running every bit of JavaScript it comes across that covers most of your holes, no?
it only takes time and patience for the feds to track down and infiltrate dark web sites if they want to.. exploits are everywhere and people are bad at opsec
I didn't say it was a silver bullet, but we don't have to make it easy for them either. TOR is about as good as we've got at the moment, yeah? I mean, "they'll hack you eventually because nothing is perfect" isn't really a reason not to do it.
move everything to TOR isn't really a solution either. just saying, if they're gonna pinch you, they're gonna pinch you. most people don't understand how TOR works and that would kinda negate the whole purpose.
if you were gonna go that route you could just tell everyone to grab their roms from usenet, but again most people don't know how that works so what's the point. 100 other websites will take the place of this one and life will move on.
Oh, I'm not talking just the roms. I mean everything. The emulation projects should be hosted on Tor and taking monero for donations. Etc. Apply that shit across the board. We need an alternative structure to their infrastructure where they get to pull the plug on anything that's a threat to their profits, hegemony, or sensibilities. Parallel institutions, if you will.
oh.. yeah, i guess.. but TOR was created by ONI and you can be sure the US government runs most of the exit nodes.. and I wouldn't be the slightest bit surprised if they had the ability to turn up enough machines on the TOR network to do end-to-end connection tracing if there were things of interest
That's the timing attacks I was talking about. Again, you keep everything in network on hidden services. Afaik, the onion routing's layers keep everything moving and untrackable within that space. They would have to directly infiltrate the host they want or have a backdoor that still hasn't been found... After what, 20 years now?
Plus, the more people that do use it, the less possible the timing attacks become on data that does leave the network.
Its probably decently expensive running those nodes, and so why do that, when you can just let someone else do it and then tap into German and French and US ISPs and get all the data anyways.