Comment by m00dy
Comment by m00dy 6 hours ago
hey guys, anyone believes Tor still can provide anonymity to users ? just trying to ask politely.
Comment by m00dy 6 hours ago
hey guys, anyone believes Tor still can provide anonymity to users ? just trying to ask politely.
There are countermeasures you can take against timing attacks, pattern analysis, and other capabilities an attacker may have if they control many relays. If you're trying to exfiltrate military secrets to the Russians, you can probably do it, but you'll have to be extremely careful. Your behaviour is as important as the network you use to communicate over, if not more important.
There is no single state actor that has access to all data centers in the EU, though. For some countries, there's barely a state actor that can access all data centers within a single country.
There is no tool that will let you become immune against a theoretical hyper powerful super government that controls all data centers, just by clicking a button. There never will be.
While there aren't as many services available, there are alternatives to Tor. Veilid on the protocol level seems to be quite promising, and I2P and other networks also provide some Tor-like features.
If you're trying to browse the web then you won't find many alternatives, but if you're looking to avoid the authorities doing some data exchange, you have options.
What you'd do is that you'd write a distributed remailer where fixed-size messages are sent on fixed timeslots, possibly with some noise in when it's transmitted, with a message always being sent on its timeslot, even if a dummy message must be sent.
I've been writing a system like this in Erlang, intended to be short enough that you can take a picture of the source code and then type it in by hand in a reasonable amount of time, as a sort of protest against Chat Control. I'm not sure I'm going to release it-- after all, they haven't passed it yet, and there are all sorts of problems that this thing could needlessly accelerate, but I've started fiddling with it more intensively recently.
You may be interested in Katzenpost and the research behind it: https://katzenpost.network/
I'm not sure. Freenet actually stores information, this is pure communication system. I don't think it uses dummy messages.
My target size is also <500 lines, and I think <200 is feasible, whereas Freenet is apparently 192,000 lines.
broadly yes, but the real question is: what's your threat model? https://ssd.eff.org/glossary/threat-model