Paper money is slow and has a reputation of being used by pedophiles and drug traffickers.
A lot of inert things are used in bad ways.
Korne127@lemmy.world 1 day ago
Tor is slow and has a reputation of being used by pedophiles and drug traffickers.
It sucks that literally using something that should be the default, truly protecting privacy, has such a bad reputation because… well it protects privacy.
Paper money is slow and has a reputation of being used by pedophiles and drug traffickers.
A lot of inert things are used in bad ways.
That reputation has entirely been created by the media frenzy over busting the worst kinds of criminals.
Oh they’re all using the same technology? Yeah of course they are, because that’s the technology that works the best. It has so many fucking use cases.
Funny that the media frenzy is hitting a fever pitch just as we most desperately need powerful tools for opposing fascism. Almost like that’s not really a coincidence.
This is honestly the best reputation a technology like this could have imo, because it very clearly shows that it does work
PhilipTheBucket@quokk.au 1 day ago
Seriously. The reason CSAM merchants and drug dealers use Tor is because it actually protects their privacy successfully. Whereas, if you're using a VPN or whatever cobbled-together solution, the feds just have a hearty laugh about it, send a subpoena by email or use some automated system that's even more streamlined, and then come and find you.
Tor is not bulletproof; they regularly run operations where they take down some big illegal thing on the dark web. But they have to do an operation for it, and if there were any solution that was any better, that thing would be even more infested with illegal material than "the dark web" is. That's just how it works. And listening to the newspapers when they tell you that it's a sign you need to stay away from those actually-effective solutions because "terrorism!" or whatever is a pretty foolish idea.
Auth@lemmy.world 7 hours ago
I dont think most people need a security model that is fed proof. Thats a pretty extreme level of privacy and most people would break it by yappign about their life to much.
PhilipTheBucket@quokk.au 6 hours ago
Well, but we're talking about how to prepare for the future where it does need to be fed proof. At some point, I think pretty soon from now in some places, it's going to become necessary to either break the rules of the internet in ways that can actually get you in trouble, or accept that you have to do things like upload your ID to all these places, agree not to access certain types of content the government doesn't want you looking at, not say certain political things on social media or else you're going on a list, things like that.
I think option A is probably better and it probably makes sense to start to think about, how are we going to do that and not have the expanded-and-mission-creeped version of ICE showing up at your door for it to give you a citation or worse, a year from now.
0x0@lemmy.zip 13 hours ago
That tends to be more due to bad opsec than Tor itself, though.
PhilipTheBucket@quokk.au 13 hours ago
Yeah. As far as I know, there are some theoretical state-actor attacks, but nothing that anyone's ever been able to make work in practice. Compromising something else is just always easier.
It was literally designed by professional spies to be resistant against state intelligence agencies. It was originally made by US intelligence for secret communication with their assets, and only released to the public when they realized they needed a bunch of additional traffic on the network that the US intelligence traffic can blend in with. At least as of the Snowden leaks (which showed NSA compromise of huge amounts of the internet including most HTTPS traffic), they hadn't figured out a way to undo it for their own spying purposes, either.
tatterdemalion@programming.dev 12 hours ago
Not all VPNs store enough user info for feds to be able to find anything useful on their servers.
PhilipTheBucket@quokk.au 12 hours ago
I've literally never in my life heard of "this person was doing (whatever), but they were behind a VPN, so we had to do (whatever elaborate sting operation) instead of compromising the VPN." I've heard that many times about Tor.
It's possible that no one's ever done something significant enough to make the feds interested from behind a VPN, just always used Tor, but I feel like it is unlikely. I feel like it's more likely that they either have the ability to force the VPN companies to comply with some legal structures that give them the info they need, or else just wiretap the pipes going in and out of the VPN servers and can sort things out pretty straightforwardly if they really start to care about it.