15 Jan 2025 |
Privacy Guides Forum | @Lukas (Lukas Dutovas) posted in Hardened-chromium is now Trivalent!
| 17:53:50 |
Kremzli | In reply to @kremzli:arcticfoxes.net Ok well gnome's wireguard vpn implementation doesn't work with the new router ProtonVPN works for 3 seconds and then somehow my ISP takes over | 18:11:51 |
Kremzli | Mullvad says I'm using protonvpn but ip.me owned by proton is saying I'm using my isp normally | 18:16:11 |
Kremzli | I am gonna blow up | 18:16:45 |
Kremzli | Redacted or Malformed Event | 18:17:44 |
laitinlok | In reply to @kremzli:arcticfoxes.net ProtonVPN works for 3 seconds and then somehow my ISP takes over openwrt? | 18:48:18 |
zrxcs58 | As usual, use VPN on your router, kids. | 19:09:11 |
Kremzli | ISP router | 20:09:08 |
Kremzli | Adult | 20:09:27 |
Anarken | Has there been any research regarding the number of Tor nodes operated by governments? Have there been any nodes that have been discovered to be controlled by three letter agencies? | 20:25:49 |
Anarken | I should note that: 1) I don't believe Tor is compromised. I believe it is still the safest way to browse and communicate privately. 2) I don't believe nearly all nodes are owed by three letter agencies. However, from a privacy/security perspective, I think it's good to take a look at all possibilities so you don't get lax. I know Tor occasionally kicks some nodes off the network that they find to be hostile... Could they possibly discover some government nodes that way? | 20:40:35 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | In reply to @k-riot-er:matrix.org Has there been any research regarding the number of Tor nodes operated by governments? Have there been any nodes that have been discovered to be controlled by three letter agencies? Search for KAX17 | 22:05:06 |
Anarken | In reply to @anonymous:digitale-gesellschaft.ch Search for KAX17 Thanks! | 22:09:44 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | In reply to @k-riot-er:matrix.org I should note that: 1) I don't believe Tor is compromised. I believe it is still the safest way to browse and communicate privately. 2) I don't believe nearly all nodes are owed by three letter agencies. However, from a privacy/security perspective, I think it's good to take a look at all possibilities so you don't get lax. I know Tor occasionally kicks some nodes off the network that they find to be hostile... Could they possibly discover some government nodes that way? Search for 51% attack, netflow (AI) analytics, "IP catching boystown ricochet". Last search request includes childporn related keywords, so its recommended to search it via Tor to not raise interest. This is the story behind last one: https://www.heise.de/en/news/Boystown-investigations-Catching-criminals-on-the-darknet-with-a-stopwatch-9904534.html | 22:09:55 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | Look also for "most VPN providers use M247". Similar/related attack vector possible at Tor. M247/Datacamp is British. | 22:14:55 |
Anarken | I read about the boystown op. Hadn't heard of M247 though. | 22:16:35 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | Technically they dont need to own the nodes to fuck a Tor user, they can also TKÜ/surveil the connection as done with IP catching and use longterm process of elimination. There were news about the BND (German secret agency for spying in other countries) having presented the NSA a method to deanonymize Tor users easily years ago. Which method they use wasnt publicly reported. | 22:19:39 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | German article, sorry: https://netzpolitik.org/2017/geheime-dokumente-der-bnd-hat-das-anonymisierungs-netzwerk-tor-angegriffen-und-warnt-vor-dessen-nutzung/ | 22:20:32 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | In reply to @k-riot-er:matrix.org I read about the boystown op. Hadn't heard of M247 though. M247 is just a known example of widespread usage, but the attack vector is having/using an ISP that has many ASNs under their control and can correlate entry and exit of VPN/Tor on their own without much help from other countries, agencies, courts, jurisdictions. | 22:23:29 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | * M247 is just a known example of widespread usage, but the attack vector is (related to) having/using an ISP that has many ASNs under their control and can correlate entry and exit of VPN/Tor on their own without much help from other countries, agencies, courts, jurisdictions. | 22:24:50 |
Anarken | Intersting. | 22:24:58 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | In reply to @k-riot-er:matrix.org Intersting. You may want to take a look also at a younger counter measure against traffic analysis. https://mullvad.net/en/blog/introducing-defense-against-ai-guided-traffic-analysis-daita | 22:29:08 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | The privacy/fundamental rights/constitition undermining terrorists/secret agencies are everywhere. One can learn to recognize them and their tactics. Counter police interrogation handbook: https://projet-evasions.org/verhor/ | 22:35:00 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | In reply to @k-riot-er:matrix.org I read about the boystown op. Hadn't heard of M247 though. IP catching that scale is legal grey area in Germany, BKA (German police similar to FBI) was bold as shit... again. | 22:38:07 |
anonymous (♠counter 1984 tinfoiled tactical resistance special forces♠) | and the boystown admin confessed. SEK (German SWAT) also got him at his computer unlocked or pressured him to unlock device. | 22:40:47 |
Anarken | Thanks for the info | 22:45:09 |
16 Jan 2025 |
| unseeing8191 joined the room. | 01:01:19 |
zrxcs58 | OK WHOS THE CHAD RUNNING SAILFISHOS | 02:52:29 |
zrxcs58 | same with plasma mobile | 02:53:51 |
zrxcs58 | hardcore | 02:53:52 |