this post was submitted on 02 Feb 2024
545 points (97.2% liked)

linuxmemes

21263 readers
482 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     

    image description:
    using the famous inside you three are two wolves template.

    the headline says, "inside you there are two wolves"
    the text on top of black wolf reads, "tell her the importance of libre software, and how I use services", while on top of white wolf the text reads, "don't reveal too much information. she might be a CIA glowie"

    you are viewing a single comment's thread
    view the rest of the comments
    [–] [email protected] 10 points 9 months ago (1 children)

    If your threat model involves evaluating whether someone is a glowie, ask your mental health care professional about symptoms of paranoia/schizophrenia.

    Unless distrusting strangers is the only reason you’re not in jail for violations of the Computer Fraud and Abuse Act. In that case, how’s your connection speed to Lemmy via TOR (I’m actually curious!)?

    …I think you’d want to use TOR for everything if you were actually deep into black hat stuff, or is that overkill?

    Another question, how many of us have actually interacted with the CIA? Aren’t they going after like super naughty people? And Aaron Swartz, motherfucking murderers. (different feds though) RIP

    Signed,

    Glowie throwing you off the scent

    [–] [email protected] 5 points 9 months ago (1 children)

    TOR has a bunch of backdoors for three letter agencies. You're better off not connecting to the Internet if that's the threat model, and people do have to live with such threats in some parts of the world.

    [–] [email protected] 5 points 9 months ago (1 children)

    The devs promise no backdoorsies!

    A reddit thread claims it’s open source & used by the government. I would definitely agree hardcore criminals shouldn’t touch some modern technology, but how’d you ascertain it’s backdoored?

    [–] [email protected] 3 points 9 months ago (1 children)

    It's used by the government because the keys to the backdoors rest with the NSA. I don't have the source for what I read right now, but TOR devs are known to work with the government. I believe a similar interaction exists between I2P devs and the government but perhaps not to the extent that TOR does. Note that the government has a vested interest in having backdoors to TOR since it is used more by cybercriminals (for what reasons I do not understand since they know just as well that TOR cannot be trusted).

    Read recent research publications about the vulnerabilities of TOR and I2P and you'll quickly realise how trivial it would be for the government. As with semi-decentralised designs, there are many ways to break such architectures and the government holds such capabilities.

    [–] [email protected] 6 points 9 months ago* (last edited 9 months ago) (1 children)

    I don’t have the source for what I read right now, but TOR devs are known to work with the government.

    bro it was developed by them, for secure communication lmao.
    https://en.wikipedia.org/wiki/Tor_(network)

    The core principle of Tor, onion routing, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, to protect American intelligence communications online

    [–] [email protected] 2 points 9 months ago

    It was handed over to the foundation as an independent organisation. However, that doesn't mean that they don't have their stinky hands in the project, it's just that it's not public.