pull down to refresh

They announced on twitter at somepoint but search is awful, could only find this
Might just be an API endpoint you can switch out for boltz
Tor
No, just connecting to it is getting your IP flagged for additional scrutiny
Nothing good can come from using it. Rat poison.
0 sats \ 4 replies \ @klk OP 6h
Looks like Zeus didn't release the atomic swaps yet. Looking forward to it.
Flagged by who? There are millions of IPs connected to Tor.
Tor has its problems, but it's a really amazing tool with very good protocol design.
Feel free to prove me wrong. IMO it's still the best tool to privately connect two points over Internet. Where the relay nodes can't know the route or the contents of the communication.
Any protocol that does that is going to have the problem of ISPs, governments, or whatever, flagging whoever tries to use it. But the same happens with Bitcoin and that doesn't make it rat poison either.
reply
Flagged by who? There are millions of IPs connected to Tor.
Assume that roughly half are controlled by Langley and the other half by Ft. Meade, who also has telemetry in your ISP's networking equipment.
There's no reason to believe the middle node and exit node aren't colluding, there's no sybil resistance whatsover, and the fact that it only exists as a "privacy" tool ensures that its a honeypot under constant surveillance.
Anything marketed or spread through the virtue of privacy is inherently less private. This is the privacy paradox.
the best tool to privately connect two points over Internet
lol... you mean the laziest
reply
0 sats \ 2 replies \ @klk OP 4h
Do you have any data to support that assumption? Most Tor nodes are run by volunteers and decent foundations spread across different jurisdictions. There are lists to filter the nodes that you use, and protocols to avoid having all node within the same jurisdiction.
The sybil resistance is in getting the node approved.
lol... you mean the laziest
So what's the better alternative?
reply
You didn't base your decision to use it on data that refutes it
volunteers, foundations
You mean operatives and front organization "NGOs"... you don't know who any of these people actually are or who's funding they work for.
jurisdictions
SIGINT stops at the border? Client states, intelligence sharing, proxies, fields ops. etc... demonstratively naive to intentionally misleading this is ever mentioned.
sybil resistance is in getting the node approved
Sure about that? you're implying now that it's centralized/censored, and such whitelisting is its own vulnerability.
alternatives
Literally anything, or nothing in most common LARPy cases.
SSH jumps and SSL tunnels are common for hiding in plain sight in Enterprise/Gov Info/Op Sec.
Blackhats have been known to distribute backdoor tunneling malware.
VPN's are turnkey examples of the former, slightly better incentives with paid services, but ultimately just as likely to be pwned. Really only good for soft-threats like geo-fencing.
Nesting VPNs is doable to resemble Tor with the better incentives, some Bitcoiner actually made Obscura which specializes in that... not an endorsement, I still think its silly.
Good old fashioned wardriving? Burner sims? Whatever street degens do these days.
All that left for Tor is midcurves that think downloading a browser fork or TAILS makes them elite. It's where ego meets laziness.
reply
0 sats \ 0 replies \ @klk OP 3h
The reality is that true privacy requires threat modeling - what you're protecting against determines the appropriate tools and trade-offs.
For the case presented in this post, it's pretty important to have two different IPs for each exchange. And people are definitely better off using Tor than not.
reply