362
top 50 comments
sorted by: hot top controversial new old
[-] Eggyhead@kbin.social 57 points 1 year ago* (last edited 1 year ago)

It's really worth reading the article.

Tor can be used for any internet browsing you usually do. The key difference with Tor is that the network hides your IP address and other system information for full anonymity.

The company behind a VPN can still access your information, sell it or pass it along to law enforcement. With Tor, there’s no link between you and your traffic, according to Jed Crandall, an associate professor at Arizona State University.

I don't know if it's even possible, but it would be cool if I could use the fediverse over TOR just for the sake of supporting TOR. Not sure if there would have to be specific .onion instances, if normal instances could just be mirrored with a .onion address, or if a .onion instance would even be able to federated in the first place. I just don't know how it works.

Other use cases may include keeping the identities of sensitive populations like undocumented immigrants anonymous, trying to unionize a workplace without the company shutting it down, victims of domestic violence looking for resources without their abuser finding out or, as Crandall said, wanting to make embarrassing Google searches without related targeted ads following you around forever.

I'm certain an all-out legislative war would be waged against TOR if it were to become popularized for most of those reasons, under the more convenient guise of "criminals and children!"

[-] davehtaylor@beehaw.org 44 points 1 year ago

Tor can be used for any internet browsing you usually do. The key difference with Tor is that the network hides your IP address and other system information for full anonymity

Also, this isn't true. MANY sites and services block access from Tor, including major ones that people use everyday.

[-] freeman@lemmy.pub 16 points 1 year ago

Also. Those running an exit node can and do sniff traffic.

It’s bad practice to login to stuff that’s important (like banking) over tor. Or login to anything over for you have logged into over the clear.

Also, nation states can track you using a variety of techniques from fingerprinting to straight up working together to associate connection streams. A large number of tor nodes are run by alphabet agencies. Hell the protocol was developed by the us navy.

load more comments (6 replies)
load more comments (18 replies)
[-] wgs 28 points 1 year ago

You don't need to access a .onion instance to use Tor. You can simply perform your day-to-day web usage through Tor directly.

On your phone, you can even use Tor natively with most of your apps.

[-] CanadaPlus 10 points 1 year ago* (last edited 1 year ago)

I've literally always browsed Lemmy over Tor. I even made this account over it, which surprised me when it worked.

load more comments (4 replies)
load more comments (10 replies)
[-] zephyrvs@lemmy.ml 39 points 1 year ago

I always have Tor installed and I often use it instead of incognito browser sessions when researching stuff. It's sometimes slow and Cloudflare made it a lot more annoying to use than ~5-10 years ago, but I'm glad it exists.

I'm sure it's still more useful to US interests though, or it wouldn't be funded anymore.

[-] kent_eh@lemmy.ca 13 points 1 year ago

Any time I've tried to use Tor in the past I gave up because it was frustratingly slow.

[-] astral_avocado@programming.dev 16 points 1 year ago

Those onion layers don't add up to nothing.. also I've heard it's under constant attack. Plus not enough people running relays and exit nodes.

[-] davehtaylor@beehaw.org 25 points 1 year ago

There is no amount of money that you could pay me to run an exit node

load more comments (4 replies)
load more comments (1 replies)
load more comments (1 replies)
[-] l0v9ZU5Z@feddit.de 33 points 1 year ago

Actual legal risks and consequences don't go away by applying wishful thinking.

[-] deFrisselle 16 points 1 year ago
[-] ErgodicTangle@feddit.de 29 points 1 year ago

I am not sure what he's hinting at. Just using Tor doesn't bear any legal risks. Hosting an exit node is different, as depending on the country you might get into serious trouble if certain traffic goes through it.

[-] TWeaK@lemm.ee 11 points 1 year ago

Yes exactly, and I think there have been stories recently where the exit node host has been held liable for content that's gone through it.Which is complete bullshit, but the unfortunate reality is that the legal system doesn't need to understand technology to regulate it.

load more comments (3 replies)
load more comments (3 replies)
load more comments (8 replies)
[-] NaoPb@beehaw.org 26 points 1 year ago

I don't think I really have a reason to use it.

[-] sam@lemmy.ca 17 points 1 year ago* (last edited 1 year ago)

The reason is privacy, everybody has a reason to use it.

[-] WorseDoughnut@kbin.social 35 points 1 year ago

In theory yes, but practically speaking trying to access a lot of the modern web over TOR would be at best painfully slow and at worst almost impossible thanks to DDoS protection providers like cloudflare.

[-] davehtaylor@beehaw.org 21 points 1 year ago

This right here. A very large part of the web is inaccessible from TOR. Last I tried you couldn't access social media, Google constantly forces you through captchas because it thinks you're a bot, and anything on a CDN will either forces captchas or just doesn't work. Financial institutions absolutely are all inaccessible.

Privacy is important, but most of the places you want to go with TOR to stay private won't let you in because malicious actors want to use it for the same reasons.

[-] nickiam2@aussie.zone 8 points 1 year ago

Facebook has an official.onion domain and it's the only way I access it, as it's required for my employer.

load more comments (1 replies)
load more comments (3 replies)
[-] Zeus@lemm.ee 8 points 1 year ago

then try reading the article

load more comments (8 replies)
[-] sznio@beehaw.org 25 points 1 year ago

I heard of a guy who went to prison because he bought something from Allegro (Polish Amazon) over TOR. Someone used the same exit node for hacking, so they pinned it on him.

[-] astral_avocado@programming.dev 32 points 1 year ago* (last edited 1 year ago)

What country? Sounds like a kangaroo court or a court staffed entirely by old people.

[-] Thalestr@beehaw.org 43 points 1 year ago

court staffed entirely by old people

Isn't that most courts?

[-] sznio@beehaw.org 7 points 1 year ago

Poland.

He could've easily got it solved but he didn't have money and the public defender just told him confessing was the best option.

It might be a legend, it's just a thing that supposedly happened to someone in a community I participate in.

load more comments (1 replies)
load more comments (5 replies)
[-] lloram239@feddit.de 25 points 1 year ago

It would help if Tor would be more useful for regular use. The few times I used it, it was for VPN-style geolocation circumvention. Tor supports it by changing ExitNodes, but the setting is hidden deep down in a config file and required a restart. Not exactly a great user experience for a setting that you might wanna flip pretty frequently.

[-] refurbishedrefurbisher 22 points 1 year ago

It's a hidden setting because it's not recommended to change that setting for people who need anonymity.

load more comments (1 replies)
[-] sculd@beehaw.org 15 points 1 year ago

I will use it if the speed is comparable to normal browsing......

load more comments (1 replies)
[-] pkulak@beehaw.org 12 points 1 year ago

You go first.

[-] baltakatei@sopuli.xyz 12 points 1 year ago

I imagine more people would use Tor if they could get paid to provide bandwidth (like Orchid as described on FLOSS Weekly 633).

[-] A2PKXG@feddit.de 11 points 1 year ago

Someone correct me if I'm wrong.

Operating nodes is expensive, offers no reward, and comes with a serious legal risk.

This won't stop the NSA from operating a few. I assume that a significant portion of Tor nodes is run by intelligence agencies. If they control all nodes used for a connection(i believe three are used), they can probably piece together what connections a user is having.

load more comments (1 replies)
[-] Lexam@lemmy.ca 9 points 1 year ago

But that's part of its appeal. How else do I know I'm one of the cool kids?

load more comments (1 replies)
[-] A2PKXG@feddit.de 9 points 1 year ago

I'm under the impression that my use will only make it slower for people who really need it.

load more comments (2 replies)
load more comments
view more: next ›
this post was submitted on 29 Jul 2023
362 points (100.0% liked)

Technology

37443 readers
344 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS