Posting from Tor megathread

I can hear the Bitcoin Assassins and the CIA coming to kick my door in for using the darkweb, they know I'm on a dangerous hacker website posting vile jam recipes and reading hot takes about bad movies. I just want to say before they get me that I have information that will lead to the arrest of Lucas John Ro-
 
  • Feels
Reactions: TurdFondler
Also, someone suggested I2P, and Jersh seemed to be worried about CSAM (CP) spam.

I must say, there is no more CSAM spam on I2P than on Tor or the clear web. In fact the worst site for CSAM spam is a chan on the clearweb run by furfags. It gets spammed with that shit daily.

While Tor is a great network, I2P is faster and more decentralized. (Tor can go down if the Tor indexing servers died. Whereas I2P cannot go down like this becuase all users act as indexing servers) Also, I2P allows for better DDoS protection as it has many different bandwidth/post/get/established-connection limits that the admin can set.

I would love to see an I2P address for KF.

And do not trust Yggdrasil for anonymity; Yggdrasil provides absolutely no anonymity. All data is sent directly from source to destination with no onion-routing, which reveals the source and destination IP addresses of all data on the network.

Are there any smart people here that can settle the VPN+tor debate?
https://matt.traudt.xyz/posts/2019-10-17-you-want-tor-browser-not-a-vpn/

All VPNs keep logs, even the ones that claim they don't.
All VPNs share metadata and IPs with feds upon receiving a subpoena or being paid enough.
 
Last edited:
Are there any smart people here that can settle the VPN+tor debate? Everyone on the darkweb says using a VPN and Tor makes you less private, but they're also mentally disabled drug addicts.
The theory is that no one holds onto your data with TOR, whereas with a VPN you're gambling on whether they actually don't store data like they promise. TBH it really doesn't matter for Kiwi Farms, only if you're doing shit the govt is interested in. VPN providers aren't going to give their data to Keffals even if they are illegally storing it.
 
Styling is completely fucked on .ru at the moment and the official .onion URL says my account is locked for multiple failed login attempts. (I can still post from .ru just fine) Will probably take a few hours for things to stabilise and return to normal
 
  • Like
Reactions: Narr Then
The theory is that no one holds onto your data with TOR, whereas with a VPN you're gambling on whether they actually don't store data like they promise. TBH it really doesn't matter for Kiwi Farms, only if you're doing shit the govt is interested in. VPN providers aren't going to give their data to Keffals even if they are illegally storing it.
Thanks. Do you know why anyone in their right minds would run a Tor node when anyone could be running illegal narcotics or child porn through it?
 
Tor locked me out on my first attempt to log in, but .ru is up.

In b4 'they're all Russian stooges'

Who was the fed poster? A reg or one of keffals toadies?
 
  • Agree
Reactions: Great Dane
At least there was less downtime compared to last weekend.
1662250778236.png
 
Thanks. Do you know why anyone in their right minds would run a Tor node when anyone could be running illegal narcotics or child porn through it?
There's a lot of free speech activists, anti surveillance activists, govt dissidents, etc. Plus you can only really get in trouble if you're an exit node. Also the conspiracy theory is that most nodes are ran by the govt now anyways.
 
  • Informative
Reactions: Dan Abrams
Are there any smart people here that can settle the VPN+tor debate? Everyone on the darkweb says using a VPN and Tor makes you less private, but they're also mentally disabled drug addicts.
The Tor Project has a FAQ and a wiki page specifically about this. TL;DR, don't use Tor over VPN. There's no reason to do so that would make it worthwhile. You could in theory do it the other way around and use a VPN like Mullvad over Tor assuming you paid for it anonymously, but that has it's own problems and it would be largely redundant anyways.

As for why people host, you're only going to get in trouble when traffic leaves the Tor network. Which is to say only exit node operators are at risk, and there's a lot of crazy people willing to stick their neck out for freedom. That and Feds. But as long as the other two nodes, the relay and the guard (which are never exposed to unencrypted traffic and are relatively easy to set up), remain out of the hands of whoever is operating the exit node you're connected to at the time then there's no way to identify who or what is accessing or being accessed.
 
Back