Hacker Newsnew | past | comments | ask | show | jobs | submit | bauruine's commentslogin

Blending in with the crowd doesn't work. If you use Chrome on Windows you're part of a very large group and "don't stick out". But it's also very easy to fingerprint so you're also part of the "theturtletalks" group with the size of one.


You mean like Matrix or XMPP? They just aren't as ubiquitous as email unfortunately.


At least you can bridge WhatsApp and then use whatever client you like.


how to?


I mean I know that I can google it up but I'm looking for a working example. I found some code in github that is obsolete. Also whatsapp requires phone code and qr scan so looks like it's designed to prevent a server-only bridge.


I got it running with NixOS https://github.com/benjajaja/nixos-rk3588/tree/main

WhatsApp does work, I use it on a daily basis. The bot/bridge makes it easy to log in with the QR code. You need to keep the phone app as you need to open it at least once a month or so.

HMU if you need more info.


thanks!


Yes it does but you can use Tor with other browsers too so it can make sense if you want to support them.


I wouldn't recommend using Tor with anything other than Tor browser because there are so many browser features that will expose you now. If you don't need the Tor browser protections, you probably don't need Tor either.


Fair point but using Tor even if you don't need it, just to put more legit traffic noise in the network is a valid use case.


Given the actual correlations attacks governments have done on Tor traffic, I don't think more traffic moves the needle in any appreciable way. Ultimately the Tor architecture is very vulnerable to timing and correlation attacks (never use something like IRC over Tor), and the kinds of changes that would be needed to mitigate those would probably slow it down past the point of usability.

One could argue, given the limited bandwidth of the Tor network, that by using it when you don't need it, you make the experience for those that do need it worse (looking at you everyone who tries to torrent over tor).


It's only 185.220.100 [0] and 185.220.101 [1] that contain all those relays. Some of the bigger German families work together as "Stiftung Erneuerbare Freiheit" that's why you see a big cluster there. But Tor never uses relays in the same /16 for a circuit so it's not really an issue.

[0] https://metrics.torproject.org/rs.html#search/185.220.100 [1] https://metrics.torproject.org/rs.html#search/185.220.101


Correct. "Stiftung Erneuerbare Freiheit" acts as LIR in charge of the address space, handing out chunks of that space to exit relay operating non-profits for free, but does not operate any Tor infrastructure themselves and has no visibility into the traffic. The cost for us are the RIPE membership fees (approx 2000€/yr).

Source: I'm its director and founder of torservers.net. Usually using a different nick here.


Tor does this sort of although not like you think. It's used as a bridge transport.

>https://blog.torproject.org/introducing-webtunnel-evading-ce...

>WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. So, for an onlooker without the knowledge of the hidden path, it just looks like a regular HTTP connection to a webpage server giving the impression that the user is simply browsing the web.


Not sure what it is but certificate transparency logs are a goldmine for this.

https://crt.sh/?q=liuxinyi1.cn


Oh got this"

"CONTEXT: PL/pgSQL function web_apis(text,text[],text[]) line 4671 at FOR over EXECUTE statement ERROR: server conn crashed?"

May be pushing a bit too hard on their postgres-rest ?


That's interesting. Suppose it doesn't do you any good if you're looking for subdomains that don't have certs though.


Tor uses the ESR (Extended Support Release) version of Firefox.


It would be completely wrong for peak demand. I had to learn this the hard way. While the small fridge I bought only uses 80 W while running the compressor uses 800W+ for a second on startup which was too much for my off the grid inverter.


You don't have to run an exit. A middle node is as important as an exit. And running a non-exit relay is pretty hassle free. You will get blocked by some sites, especially banks and governments unfortunately so be aware of that if you want to run one at home. There is a list for ISPs that allow Tor nodes [0] but diversity is important so if you know an ISP with generous traffic allotments that's better. Just check the TOS that they don't explicitly forbid running a relay. Or you could run a bridge to help censored users connect to Tor.

There is also some information on the community site about running and setting up all kinds of relays or bridges [1]

[0] https://community.torproject.org/relay/community-resources/g...

[1] https://community.torproject.org/relay/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: