zlacker

[parent] [thread] 3 comments
1. fsflov+(OP)[view] [source] 2020-06-05 14:25:58
It is enough to have at least a few independent relays to cover the trace. Everyone who can should be running a relay node at home I guess. Also we generally need more participants in Tor of course.

There is also I2P network, which is even harder to break (unless someone owns practically all nodes there).

replies(1): >>nix23+N4
2. nix23+N4[view] [source] 2020-06-05 14:52:18
>>fsflov+(OP)
Well i run a node (not exit) and yes it's better then nothing, but to fully trust Tor is a big nono, i said nothing else. Protections from private company or country's yes..but protection from GCHQ/NSA probably not.

And no you can trace it thru the ISP's, the problem is the latency, Connection from here to there in that millisecond trace one...and so on.

replies(1): >>fsflov+u5
◧◩
3. fsflov+u5[view] [source] [discussion] 2020-06-05 14:56:01
>>nix23+N4
If you are speaking about the timing attack, then you should consider I2P. It makes them significantly harder. In general, I agree that if your enemy is NSA, you can do very little. But you can make their life harder, and you should.
replies(1): >>nix23+J7
◧◩◪
4. nix23+J7[view] [source] [discussion] 2020-06-05 15:07:25
>>fsflov+u5
I2P is absolutely great, a shame that it's no covered so much and Freenet was once also a cool project...i see we are on the same page ;)

Edit: GnuNet, RetroShare and ZeroNet should also be mentioned

[go to top]