Just a plebeian noob here, but can't a bit a proof of work be added to any protocol in order to solve DDOS attack ? Is it difficult to implement and what are the downsides ?
reply
A lot of times these are botnets. Think your grandma’s old Dell with a ton of malware - times 100. Proof of Work helps if you’re the one on the hook for bill, but if you’re a malicious actor you don’t care about power costs for me-ma.
reply
We need more people willing to run tor nodes, even if only relays. I understand that running an exit node is not for everybody, especially in countries with tight internet laws; it can be a pain in the ass. But if you have the means and the disposition, please do.
reply
Exit nodes are not needed for anything bitcoin related.
reply
Not explicitly, but as you have more traffic, it becomes exponentially harder to track any given user. If Tor becomes unusable, we all loose something.
reply
I ran a relay node for a long time and found a couple sites that would block traffic from me.
Yes running a relay node had traffic blocked.
Unfortunately now my upload speed is no longer symmetric.
reply
Wait, what? That's very odd. Are you sure it is a causal relationship? Because only guard and exit node ip's are published and public.
reply
Yup, it was the osu! website. Here’s a historical thread on it: https://osu.ppy.sh/community/forums/topics/249550?n=7
reply
Wouldn't I2P be a good alternative to TOR?
reply
reply
Who is attacking Tor?
Btw I want to see the positive side: if someone is interested in block Tor this means that the service works and it is precious to keep someone privacy secure.
So let's use, help and promote it!
reply
+100 sats There is also an active fundraiser to launch more Tor nodes here: https://savetor.network/ (More info: https://twitter.com/RiccardoMasutti/status/1579530120288927750) And a concept for a decentralized Tor node fund here: https://agorism.blog/anarkio/second-realm-ideas
reply
It is time for a new anonymity network. Source routed. https://github.com/Indra-Labs/indra
Tor and i2p are literally 2 decades old.
Bitcoin and lightning need modern tech to stop surveillance.
reply
Can you provide quick summary how is Indra better than Tor?
reply
I forgot the most important
  • Scales because users can pay the routers. Tor network has stagnated at 6000 nodes for almost a decade.
reply
  • Pure source routing, no latency negotiating onion layers, all done via session purchase.
  • Because of source routing, there can be embedded onions inside packets that follow arbitrary paths back to the sender, like traceroute for tcp/ip, meaning there can be strong latency minimisation guarantees and long living connections, two things that are painful with Tor's telescoping model.
reply
Now this is a worthy cause. Does anyone know of a way to donate to Tor using lightning network?
Tor is a joke and so many resources have been wasted by Bitcon/Lightning projects pretending it's not.
Just let it die as it rightfully should, and start using nested Lightning VPNs
reply
We need a decentralized version of Tor because centralized systems can easily be shutdown.
reply
Tor is centralized and thus doomed to fail or be state controlled. There is already suspicions it might just be a honeypot.
Alternatives are needed. I don't know if I2P is the way to go, we'll have to see.
reply