Karna@lemmy.ml to Privacy@lemmy.ml · 16 hours agoTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comexternal-linkmessage-square26fedilinkarrow-up1111arrow-down15cross-posted to: cybersecurity@sh.itjust.works
arrow-up1106arrow-down1external-linkTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comKarna@lemmy.ml to Privacy@lemmy.ml · 16 hours agomessage-square26fedilinkcross-posted to: cybersecurity@sh.itjust.works
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up22·13 hours agoI wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
minus-squareHelixDab2linkfedilinkarrow-up1·1 hour agoI’ve tried to use it, but have not managed to get it to work. Which is a bummer. I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up1·35 minutes agoRemember that you need to let the server run for a bit, so it can establish , the routes. I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up8·13 hours agoAFAIK it only makes it harder not impossible.
minus-squarePrunebutt@slrpnk.netlinkfedilinkarrow-up1·6 hours agoAt least they can’t utili’e the applied tactic to host their own node.
I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
I’ve tried to use it, but have not managed to get it to work. Which is a bummer.
I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
Remember that you need to let the server run for a bit, so it can establish , the routes.
I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
Insane 2lown Posse?
https://en.m.wikipedia.org/wiki/I2P
AFAIK it only makes it harder not impossible.
At least they can’t utili’e the applied tactic to host their own node.