ZeroNet - Because Tor is honeypot

  • 🔧 Actively working on site again.

PetrifiedTom

Po_0petrator
kiwifarms.net
Joined
Mar 13, 2019
Good evening lads!
I have great news for y'all! We all know at this very moment that most website available on Tor are either scams or honeypots. CP is certainly a honeypots. Scams are just scams... anyway! Someone smarter, brighter, prettier come to an idea of making new, better Internet where normies will be unable to join. Chad free zone. Are you aware that even the classiest, most cunning haXXors on Tor are vulnerable just by using Tor network? I didn't knew either but no worries! Something better is behind the curve. Decentralised, based on Bitcoin (Josh, you hear that?!), federalized internet.

This meme can become true!
1585704519665.jpg


I present You - ZeroNet!
^More inside

I merely understand IT stuff related things. I am normie jerking to hentai.
 
That's where 8chan went ...I think?
What's it like? can you post screenies?

I think we're gonna have to go there one day :(
 
OP is cringe, but ZeroNet is a legitimate protocol. I've never used it because no content and the complexity of the protocol is a security concern. Don't reply unless you have interesting ZeroNet sites to talk about, or have something technical to add.
 
Tor is kinda sus (funny word hehe) but people actually use it. Doesn't matter how le epic your "protocol" is if I can't actually use it to buy methamphetamine
I use tor all the time for totally legitimate, legal, things. I always use KF's hidden service to login. I run hidden services on computers so I can SSH to them even if they're behind NAT. I use tor to browse the clearnet sites, just because. I get/send email via a hidden service, just because. It's way better than using a VPN.
 
What about I2P, though? Is it compromised already?
 
I decided to touch the UH OH STINKY!
Here's my retard safari:

ZEROTALK:
It's like reddit but weird. Some fun to be had.
ZeroTalk1.pngZeroTalk2.pngZeroTalk3.pngZeroTalk4.pngZeroTalk5.pngZeroTalk6.pngZeroTalk7.png
ZEROBLOG:
Just the official blog but has a cool tutorial on how to make your own blog by cloning the site ...you can also clone ANY site! Very cool.
ZEROMAIL:
Email but zeronet. No friends so no testing :(
You also might not want to click this unless you're fine seeding everyone's private communication.
ZEROSITES:
Where you'll find the millions of 8chan successors, cool stuff and the occasional (:_( bad content site name
There's like a million 8chan successors although 0chan and millchan seem to be the most popular.
It's worth noting that if anyone posts bad content you can block them and you'll no longer download anything from them as well as deleting all their content from your PC.
And seriously, stick to specific fetish sections if you're using this to browse for porn. "General" porn areas are more likely to have bad content posted.

MillChan.pngZerochan.png

I also found an islamic state website but it's all in durka durka so no funnies.


OVERALL:
Ok but kind of a ghost town. Just like the regular darknet but even more so.
If you decide to become an uh oh stinky baby too make sure you turn on TOR always mode.
 
I hate to be that guy, but all these new 'Net' things use distributed hash tables. Short story is that DHT is the reason you shouldn't use Torrent downloads over Tor. There is a central server used to spawn the network. IPFS, BitCoin, ZeroNet and others all use DHT. I think GNUNET uses it too, but I'd double check. Urbit might have the same problem, but I can't see switching operating systems really ever at this point and especially to something seems to be re-inventing Bell Labs' Plan9.

DHT is not a good solution because it create a central point of failure. Say I'm Mr. Bad Guy and I Mr. Guy want to fuck your network. All I have to do is find the server creating your DHT and start downloading everyone's IP addresses stored in the table. Nodes have copies of the DHT, but the fact that you need a seed DHT server creates a really easy attach vector for de-anonymising things. Depending on your jurisdiction using sites like KF might become illegal. On a P2P network if you have a copy of this illegal website that's great news for the feds. Even if it's encrypted, many jurisdictions require you to decrypt your data on request from law enforcement. Most of these solutions don't cut it on all counts.

Instead of DHT I would be looking out for a system that requires users to white-list servers you want to communicate with to form the network. This could be like tor hidden services that you have to unlock in order to use. An easy incomplete example would be how you have to add peers to SyncThing with a code that new devices will offer to allow the network to include that device. You wouldn't want to use SyncThing for this kind of networking, but this part of how it works is worth preserving. Essentially, creating networks needs to be pushed out of existing trust systems that use existing network infrastructure in terms of software. It very inconvenient and very secure to share a single PGP key pair in-person instead of doing the key-server each user's key pair thing. The challenge is not just to have built-in local copies of things, like IPFS and ZeroNet try to do, you also want a layer of only allowing the intended user to have access to the data. It's hard to think about hardening things this way, but that's where the focus needs to be.
 
Remember when 8chan decided to use ZeroNet as a backup after it went down only for it to be instantly flooded with CP that - because it's distributed - was downloaded onto everyone's computers and publicly seeded?
 
  • Islamic Content
Reactions: MasonSaysMason
What about I2P, though? Is it compromised already?
I2P:
  • + Has better redundancy and resilliency than Tor. Even Tor connects to a central server with a database of peers at startup, I2P does not; all systems on I2P maintain their own database of known peers.
  • + Has better bandwidth controls, fine tuning of tunnels, and overall configuration options.
  • + Was not created and funded by glowies. Whereas Tor was.
  • - Takes longer to start than Tor.
  • - Is slower because there are less users.
  • -/+ Takes more configuration to get it to work smoothly. (This keeps newfags out, so also a plus)
  • -/+ Is written in Java.
  • -/+ Is full of Russians.
There are a few exploits that have been found in Tor. Tor was knocked offline almost entirely on Jan 6 and stayed unusable for about a day. I won't touch ZeroNet at all because it saves every site you visit to your hard drive. This is the exact opposiite of what one should be doing if on the "dark web". As was mentioned by the previous poster; if a site on ZeroNet gets flooded with CP, all the users end up with CP on their hard drive.
 
Remember when 8chan decided to use ZeroNet as a backup after it went down only for it to be instantly flooded with CP that - because it's distributed - was downloaded onto everyone's computers and publicly seeded?
Great, potential years in prison for sharing cheese pizza. Tor seems okay, and all I do with it is boring cringe.
 
So is this supposed to be a giant 'clone every site you visit and then become a slave for the network'? So essentially just a way for glowies to load up websites you've visited with material and then raid your arse? Ain't touching that shit
 
Back