pull down to refresh
0 sats \ 1 reply \ @justin_shocknet 10h \ parent \ on: Poorman's Coinjoin Using Non-Custodial Lightning Swaps (No Node Required) bitcoin
You didn't base your decision to use it on data that refutes it
You mean operatives and front organization "NGOs"... you don't know who any of these people actually are or who's funding they work for.
SIGINT stops at the border? Client states, intelligence sharing, proxies, fields ops. etc... demonstratively naive to intentionally misleading this is ever mentioned.
Sure about that? you're implying now that it's centralized/censored, and such whitelisting is its own vulnerability.
Literally anything, or nothing in most common LARPy cases.
SSH jumps and SSL tunnels are common for hiding in plain sight in Enterprise/Gov Info/Op Sec.
Blackhats have been known to distribute backdoor tunneling malware.
VPN's are turnkey examples of the former, slightly better incentives with paid services, but ultimately just as likely to be pwned. Really only good for soft-threats like geo-fencing.
Nesting VPNs is doable to resemble Tor with the better incentives, some Bitcoiner actually made Obscura which specializes in that... not an endorsement, I still think its silly.
Good old fashioned wardriving? Burner sims? Whatever street degens do these days.
All that left for Tor is midcurves that think downloading a browser fork or TAILS makes them elite. It's where ego meets laziness.
The reality is that true privacy requires threat modeling - what you're protecting against determines the appropriate tools and trade-offs.
For the case presented in this post, it's pretty important to have two different IPs for each exchange. And people are definitely better off using Tor than not.
reply