/g/ - Technology

install openbsd

[Make a Post]
[X]





Nanonymous No.8325 [D][U][F][S][L][A][C] >>8327
File: 2c28505ca2467b66301169b7da111c6d5850910913061827640a0232dc8116f7.png (dl) (70.42 KiB)
A thread for discussing all matters decentralized and privacy-friendly networks. Filesharing, websites, services, anything going through them.
We're already browsing this website through tor. I'm certain all of you have at least touched torrents.

What else is out there? What else do you use?
Personally, in addition to browsing tor websites and torrenting regularly, I'm also on I2p, IPFS, and GNUnet

Nanonymous No.8326 [D] >>8330
i2p is java shit

Nanonymous No.8327 [D] >>8328 >>8329 >>8333
>>8325
I've been using only TOR, but i used to browse I2p a lot, dead as fuck. Also tried 0net, it has many places to visit but nothing interesting at all.
I'm struggling to find a way to anonymize torrent, i don't believe VPNs, and torrent over TOR is autism, and no, i won't buy a VPS.

Nanonymous No.8328 [D] >>8360
>>8327
>and torrent over TOR is autism
what the fuck?

Nanonymous No.8329 [D] >>8360
>>8327
>I'm struggling to find a way to anonymize torrent
>torrent over TOR is autism
The normalfag mind sleeping on the job as always.

Nanonymous No.8330 [D] >>8375
>>8326
Install i2pd, that one is C++ shit.

Nanonymous No.8333 [D] >>8334 >>8335 >>8375
>>8327
>i don't believe VPNs
VPNs work, but you have to setup the server yourself and that's a pain in the ass.
>torrent over TOR is autism
Not just autism, you'll also flood the network and slowdown everyones traffic. Don't torrent over Tor (unless you limit the connection to only one peer - in this case it will work closely to a normal http download).

Nanonymous No.8334 [D][U][F] >>8335
File: 6da5411c7a89956043dadb02a444f18b5085871e3ad14383c510960d0b905df6.jpg (dl) (36.53 KiB)
>>8333
We already discussed this, torrenting through tor is putting the network to proper use.

Nanonymous No.8335 [D] >>8337 >>8375
>>8333
trips of truth
>>8334
https://nanochanqwrwtmamtnhkfwbbcducc4i62ciss4byo6f3an5qdkhjngid.onion/g/7260.html#post8056
>"everyone else" on TOR are either selling weed or trannies who shout oppression every time someone says they're sick fucks. The more torrenters on the network the better it is being put to use.
Yeah sure very convincing arguments last time, stop rationalizing your nigger behaviors, admit that you're a cheap nigger that prefers to slow everybody else down instead of spending money or effort to setup things properly.

Nanonymous No.8337 [D]
>>8335
kek imagine being this triggered, are you a tor tranny?
You should crack down on websites made with pooindaloo tech that are literally throwing tor's bandwidth away instead of the people using the network for what it's supposed to do.

Nanonymous No.8360 [D] >>8375 >>8686
>>8328
>>8329
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea
The article is pretty old but still relevant.

Nanonymous No.8362 [D] >>8375 >>8379
>Torrents
Stop using that shit. It's not anonymous, and piracy is a major way of spreading malware, and most of the stuff which is spread by piracy is massmedia bullshit. Stop watching TV, stop watching hollywood bullshit, stop wasting your life by playing videogames. Everyone wins. You won't pay into the system by being sued, you'll get mentally better, you'll use your energy to make yourself a better life, and the massmedia bullshit reaches fewer of its targets.


>IPFS
It can't be anonymized by tor, so stop using it, until it can be anonymized via tor.


>P2P piracy via tor
I hope the day never comes. I don't want the tor network be flooded by you little shitters. If you want anonymous filesharing, then pool money to someone who sets up a server, from which you can download your shit. But you're too greedy for that. Wasting money for every stupid kind of fancy consumer shit is okay, but paying money to people who provide you with something you value would just be stupid, right? You greedy niggers.

Nanonymous No.8375 [D] >>8379 >>8390 >>8503
>>8330
is it as stable and working as i2p?

>>8333
>VPNs work, but you have to setup the server yourself and that's a pain in the ass.
that's even worse for privacy than commercial VPN paid with your credit card
you will be the only user of your shit VPN, so all traffic out of it will be assumed to be yours
you do something with your VPN. police checks IP. turns out to be your VPN on VPS. they check who connected to it. it's yours IP

>you'll also flood the network and slowdown everyones traffic.
you don't slow anything as Tor is fast as light

>Don't torrent over Tor (unless you limit the connection to only one peer - in this case it will work closely to a normal http download).
wrong. do torrent over Tor and don't limit connection to one peer

>>8335
>that prefers to slow everybody else down instead of spending money or effort to setup things properly.
there is no other way to torrent anonymously than to use Tor. no money will give you

>>8360
>The article is pretty old but still relevant.
no, it's shit. years ago Tor was slower so torrenting would be abusing other users, but not today

>>8362
>It's not anonymous
it is, with Tor

>and most of the stuff which is spread by piracy is massmedia bullshit. Stop watching TV, stop watching hollywood bullshit, stop wasting your life by playing videogames. Everyone wins.
here I can agree, most of shit on Torrent is just jewish brainwashing and propaganda, that is not worth watching even for free. can't believe normies pay for this shit and Jewflix
but you can find other stuff on torrents, like professional software, especially older versions, before botnet
you can also get pre-jewish music

>I don't want the tor network be flooded by you little shitters.
too late, we already do it

>If you want anonymous filesharing, then pool money to someone who sets up a server, from which you can download your shit.
that's dumb and not anonymous
instead, if you feel bad about torrenting over Tor, host Tor nodes or donate to someone that hosts Tor nodes

Nanonymous No.8379 [D] >>8425
>>8362
While you are correct in that it's all kike massmedia bullshit I must say that I only torrent golden age anime and books, so I'm making very good use of the network.
As for malware, yeah torrent is a really shitty way to get software because it's either proprietary or has no package management. The only way to avoid malware is to be wary of what you download from your distro's repos because distros love to distribute malware like "firefox" for instance, you can't trust anybody nowadays.
>>8375
Unlike the official implementation, it can be described as stable and working, yeah.
i2pd daemon consumes 11MBs res 6MBs shr memory on my computer, it's stuck on 0.0% CPU with spikes to 1% or so every few seconds on my haswell CPU, and it only has 1 CVE that I know of (botnetweb link) https://www.cvedetails.com/product/42076/I2pd-I2pd.html?vendor_id=17310 .
I've had the daemon running for most of this year and it never crashed on me, and my configuration is almost all defaults.

I don't know C++ to review the actual programming, but the results I can infer from using it is that it's fast/stable/easy to use and it has only had one security flaw reported so far.

Nanonymous No.8380 [D] >>8382
>It can't be anonymized by tor, so stop using it, until it can be anonymized via tor.
It can be though. Openbazaar, which uses IPFS since v2 does it. It's not recommended because nobody has audited it. Maybe OSTIF will eventually take a look.

Nanonymous No.8382 [D]
>>8380
Written in: Go, python, javascript
Doesn't matter, it's unusable.

Nanonymous No.8390 [D] >>8426
>>8375
Dude, stop spreading shit that would ruin the tor network, if people take you seriously.

>you don't slow anything as Tor is fast as light
the tor network may be "fast", but it has a certain amount of bandwidth, e.g. a certain amount of data that can be transmittes per time unit. Filesharing transmits lots of data per time unit, so having lots of filesharers would slow the network down for literally everyone else.

Making bittorrent functional unter tor would be like a large DDOS attack against the tor network committed by cheap shits too niggardly for paying for their worthless entertainment bullshit, while ruining every little rest of security their idiot-OS may provide by randomly executing pirated executables, while ruining the little rest of privacy still left to everyone else.

Stop pirating shit. Consume less, and pay for what you consume. Cheap entertainment fucks you up, and free entertainment fucks you up even more.


>it is anonymous with Tor

No, it isn't. It is actually very hard to prevent data leakage of programs not specifically written with privacy in mind. Many things you can do via tor would deanonymize you instantly. You have no idea, how much identifyable metadata is transmitted by most programs, let alone BT. And since you're pirating stuff, you're nothing but a kid who wants free shit, which means, that you basically don't have any technical knowledge other than how to click on an UI, so you don't have an idea how to prevent data leakage.

>but you can find other stuff on torrents, like professional software, especially older versions, before botnet you can also get pre-jewish music
There really should be a hidden service, from which you can download such stuff.
Even though I'd suggest using open source software instead of old "professional" software. You need to do a little more research, but usually there are open source solutions for nearly everything.

>that's dumb and not anonymous instead, if you feel bad about torrenting over Tor, host Tor nodes or donate to someone that hosts Tor nodes
How would it not be anonymous, if you pay me a certain amount of moneros for setting up a server, which will be accessible as a tor hidden service, to which you can upload your pirated shit, and let others download it? That would be far better than using a bittorrent client which is not meant to be anonymous.

Nanonymous No.8425 [D] >>8430
>>8379
>The only way to avoid malware is to be wary of what you download from your distro's repos because distros love to distribute malware like "firefox" for instance, you can't trust anybody nowadays.
>on my haswell CPU
<pretends to care about malware
<uses Intel CPU with Meltdown and Intel Management Engine

Nanonymous No.8426 [D] >>8428
>>8390
>stop spreading shit that would ruin the tor network
no

>the tor network may be "fast", but it has a certain amount of bandwidth, e.g. a certain amount of data that can be transmittes per time unit.
that bandwidth is huge, 10 times bigger than what is needed for web browsing, there is a lot of room for file sharing

>Filesharing transmits lots of data per time unit, so having lots of filesharers would slow the network down for literally everyone else.
you don't need to fileshare 24/7, you wouldn't be able to consume it

>Making bittorrent functional unter tor
it is functional

>for their worthless entertainment bullshit
<he thinks torrents are only for entertainment

>Consume less, and pay for what you consume.
no jew, we won't pay you a penny for your shit brainwashing shit

>No, it isn't.
it is

>It is actually very hard to prevent data leakage of programs not specifically written with privacy in mind.
run inside torified virtual machine that doesn't know your IP address. what is leaked? what data?

>Even though I'd suggest using open source software instead of old "professional" software. You need to do a little more research, but usually there are open source solutions for nearly everything.
have you ever used open source?
20 year old professional software is superior to 2019 open source shit. what is even funnier, often it's the open source shit that is more botnet, malware, spyware.

>How would it not be anonymous, if you pay me a certain amount of moneros for setting up a server, which will be accessible as a tor hidden service, to which you can upload your pirated shit, and let others download it?
every action on that server will be linked to single identity. it will be pseudonymous, not anonymous.
also it's insecure, since feds or someone could modify stuff on the server so when you get files from it with onion, you will get malwared version. if you run your own bittorrent client locally, that wouldn't happen, as file hashes would protect you
you also send money to server company and use the VPS only for yourself, instead of hosting Tor node for everyone

Nanonymous No.8428 [D] >>8539
>>8426
>what is leaked? what data?
Cliet metadata and possibly correlation attacks because of torrent parallelism with multiple peers at the same time.
<when you get files from it with onion, you will get malwared version.
>What is SHA256?

Nanonymous No.8430 [D] >>8539
>>8425
I'm sorry anon but it's what I have. I ran me_cleaner, externally flashed and everything if that makes you feel better.
If you're willing to mail me a talos you're free to.

Nanonymous No.8431 [D][U][F]
File: 460c52faaa3d9f6df6f2557bd9073289ee81821cd2e6ae7070332444061a08c7.jpg (dl) (192.40 KiB)
>Stop pirating shit. Consume less, and pay for what you consume. Cheap entertainment fucks you up, and free entertainment fucks you up even more.

Nanonymous No.8460 [D] >>8464 >>8539
>that bandwidth is huge, 10 times bigger than what is needed for web browsing, there is a lot of room for file sharing
Filesharing uses a lot more bandwidth than browsing. If everyone who browses would also run a torrent client, tor would be dead. Filesharing wouldn't be a problem, if filesharers would add enough bandwidth to the network by adding nodes to the tor network, but we all know, that filesharers are cheap freeloading shits, who don't want to pay for anything.

If filesharers would run tor nodes, I wouldn't mind, but as long as they don't, they're like locusts.


>you don't need to fileshare 24/7, you wouldn't be able to consume it
You can run the BT client 24/7 in the background while watching shitty movies all day.


>it is functional
It's not. Not specially hardened apps do leak information, which makes you identifyable. Maybe you can get a BT client to use port 9050 or 9150 on 127.0.0.1 as a socks5 proxy, but almost all not especially hardened applications, which run on a not especially hardened server, leak like shit. Trust me on that one. It takes a considerable amount of skill to secure a simple webservice on a linux server in such a way, that its IP cant be determined by an attacker who knows what he's doing. Even most professionals don't have this level of skill. Securing a desktop OS, which is much more complex than a server, and needs to do lots and lots of different things, is nearly impossible.


>for their worthless entertainment bullshit
<he thinks torrents are only for entertainment
Most piratebay torrents with a large number of leechers are entertainment bullshit of the worst kind. So I'd assume, that the largest part of the bandwidth eaten by torrents is consumed by the worst kind of bullshit.

>run inside torified virtual machine that doesn't know your IP address. what is leaked? what data?
Did you ever write a iptables firewall, so applications, which can access the network, have to be whitelisted? In several machines - at least the host and the container - because you'd have to use a completely virtualized network, if you want to control the traffic. That's where network security would begin. An additional requirement would be to analyze the traffic with something like wireshark, so you at least have the chance to spot any leakage.

Most IT-professionals wouldn't be able to do something like that, let alone, all those little 16yo shitheads, which probably make up the majority of all BT users.

>have you ever used open source?
>20 year old professional software is superior to 2019 open source shit. what is even funnier, often it's the open source shit that is more botnet, malware, spyware.

Bullshit. I'm using nothing but open source software, and I count as an IT professional since the late 1990s. gimp today is better than photoshop from 20 years ago. Also, the biggest factor is not the software, but the ability of the user, when it comes to productivity. I'd probably outperform a 16yo shitter with nothing but a keyboard, a TV, and an old raspberry pi 3, when it comes to IT work.

Open source software is often better and faster, than the closed source counterparts, but it's uglyer and harder to learn. Software companies spend huge amounts of resources into the design of the user interface, which open source developers simply don't have. So you have to learn more. But when it comes to functionality, open source stuff tends to be better and faster.


>every action on that server will be linked to single identity. it will be pseudonymous, not anonymous.
Software can be designed in such a way, that it works without user identification. See imageboards, for example. When I click on "New Identity", I'm a new person.


>also it's insecure, since feds or someone could modify stuff on the server so when you get files from it with onion, you will get malwared version.
Same is true on BitTorrent, but without the additional step of hacking a (in my case very well hardened) server. With BT I could simply share my new HD version of the joker movie, which looks like a .mp4 file, but in reality is an executable with a huge installer with every malware I could ever find. I'd just have to add it to the pirate bay listing. And so could the feds.


>you also send money to server company and use the VPS only for yourself,
That wasn't what I've been talking about. I could setup a hidden service, which everyone can use. Creating something like http://goggamespc7v6z5e.onion or http://xfmro77i3lixucja.onion/ wouldn't be a problem for me.

The problem with creating such shit is, that it takes considerable amounts of skill and work, to create such things, but it doesn't pay to do it. And that's because of the freeloader mentality. Everything has to be easy and free of charge, and someone else has to foot the bill, no matter how small the actual cost per person would be. That's what locusts do. And at the moment the locusts swarm around BT, and they'll eat up tor, should the ever use it en masse.

Nanonymous No.8464 [D]
>>8460
>Filesharing uses a lot more bandwidth than browsing
This argument is completely disassociated from the protocol. What if I use http to download movies? This uses the same bandwidth, but now it isn't scary torrent boogieman. The bandwidth exists, and anons actions don't beget other's actions, so use it.

>Did you ever write a iptables firewall
Jesus christ, are you a fucking nigger
He's talking about a virtual machine. He doesn't need to touch firewall bullshit, he just jumps into the VM settings and configure what it can do on the network can do there.

Nanonymous No.8465 [D] >>8466
>This argument is completely disassociated from the protocol. What if I use http to download movies? This uses the same bandwidth, but now it isn't scary torrent boogieman.
True.

>The bandwidth exists, and anons actions don't beget other's actions, so use it.
If everyone does this, there will be no more tor. That's the freeloader problem.

>Jesus christ, are you a fucking nigger
Am I?

>He's talking about a virtual machine. He doesn't need to touch firewall bullshit, he just jumps into the VM settings and configure what it can do on the network can do there.
Maybe you're the nigger, and don't know what you're talking about.

Tor is a process, which needs connectivity, while the BM client also is a process on the machine, which must not have network connectivity, besides being able to connect to socks5h://localhost:9050, if you want it to be effectively isolated from the network. In order to isolate process A, but not process B, you either need to write a iptables firewall, which differentiates via -m owner --uid-owner, or you need to use a MAC like SELinux or GRSecurity, which is even harder to setup.

If you don't know what I'm talking about, your security scheme doesn't work. As I mentioned earlier, achieving security and anonymity is HARD, and 16yo shitheads don't have a chance of achieving that goal.

I should stay away from nano. Too many little kids.

Nanonymous No.8466 [D] >>8467
>>8465
>If everyone does this, there will be no more tor.
Everyone doesn't do it
>If you don't know what you're talking about, your security scheme doesn't work
Thank fuck he doesn't have you designing it then
>achieving security and anonymity is HARD
for niggers like yourself, maybe
>I should stay away from nano. Too many little kids.
Please do, we'd appreciate you reducing the number

Nanonymous No.8467 [D] >>8468 >>8538
>>8466
Kid, you're not acting defiant, you're acting stupid.
A few years ago you were still playing with toys, and people do you a disservice, if they treat you as an equal. You're simply not, and if doesn't matter what your parents or all your little friends tell you. You should be aware of this fact, if you don't want to fail miserably in the real world.

sage sage No.8468 [D] >>8470
>>8467
Don't feed the troll.

Nanonymous No.8470 [D]
>>8468
>telling trolls not to feed trolls

Nanonymous No.8503 [D] >>8513 >>8686
>>8375
https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea
Read this time.

Nanonymous No.8513 [D]
>>8503
>shitty proprietary clients are shitty
>you must be using one of them!
>muh trackers
Most (literally all except homebaked private tracker tracker software) trackers ignore the IP they're told, you can just send some unreachable IP.

Nanonymous No.8538 [D] >>8572
>>8467
>MUH I AM SO SMART BECAUSE I AM OLD
it's a logical fallacy to claim you are better and smarter because you are old. you aren't, you are just old smelly ugly piece of shit

also, it is against Code of Conduct to discriminate people based on their age

Nanonymous No.8539 [D] >>8572
>>8428
>Cliet metadata
what kind of metadata? if torrent client is good or bad but in virtual machine, it won't be able to leak any useful info

>and possibly correlation attacks because of torrent parallelism with multiple peers at the same time.
correlation attacks are hard to succeed and expensive, unlikely to be used against torrent users. also I think that multiple peers at the same time are actually making correlation attacks harder

>>8430
>If you're willing to mail me a talos you're free to.
you don't need 10000$ Talos to be free from ME. there is 50+ models of x86 CPUs free from ME, why won't you use them?

>>8460
>Filesharing uses a lot more bandwidth than browsing.
depends how much someone downloads. not everybody saves porn and movies all day

>If everyone who browses would also run a torrent client, tor would be dead.
no it wouldn't. Tor has such high bandwidth that even if it got 3-5 times smaller, Tor would still be fast and comfortable for web browsing

>If filesharers would run tor nodes, I wouldn't mind, but as long as they don't, they're like locusts.
say what you want about them, but filesharers don't need to ask you for consent to use Tor for filesharing

>You can run the BT client 24/7 in the background while watching shitty movies all day.
only possible in theory, but pointless and almost nobody does that

>It's not. Not specially hardened apps do leak information, which makes you identifyable. Maybe you can get a BT client to use port 9050 or 9150 on 127.0.0.1 as a socks5 proxy, but almost all not especially hardened applications, which run on a not especially hardened server, leak like shit.
run it inside torified virtual machine and it won't leak shit

>It takes a considerable amount of skill to secure a simple webservice on a linux server in such a way, that its IP cant be determined by an attacker who knows what he's doing.
or just double click on virtual machine

>Most piratebay torrents with a large number of leechers are entertainment bullshit of the worst kind.
most torrents are shit because most people are dumb niggers. same as most http traffic is shit (facebook, cat videos, porn). do you want to ban http?
I am sure Tor users who use torrents are downloading something more valuable than what normal niggers download

>Did you ever write a iptables firewall, so applications, which can access the network, have to be whitelisted? In several machines - at least the host and the container - because you'd have to use a completely virtualized network, if you want to control the traffic. That's where network security would begin.
you don't need any of this, it's already done by someone else. all you need it so to download Whonix and double click to install and run
everything you run inside it will go through Tor (catch all circuit), but you can configure it to disable catch-all circuit and only allow network connection if software will use specific socks proxy ports
https://whonix.org

>I'm using nothing but open source software
then you don't know how your shit software is inferior to professional products

>gimp today is better than photoshop from 20 years ago.
gimp has the worst interface and usability of graphic editing software, so it's the worst

>Also, the biggest factor is not the software, but the ability of the user, when it comes to productivity.
the same user will achieve better productivity with superior tool

>Open source software is often better and faster, than the closed source counterparts, but it's uglyer and harder to learn.
if it's uglier and harder to learn, it's worse, inferior

>Software companies spend huge amounts of resources into the design of the user interface, which open source developers simply don't have.
that means they are dumb. they should focus more on usability than stupid obscure features that nobody uses
it's not about lack of resources, it's about priorities. open source developers don't give a fuck about user interface

>But when it comes to functionality, open source stuff tends to be better and faster.
it doesn't. back it with examples, I will show counter examples

>Software can be designed in such a way, that it works without user identification. See imageboards, for example. When I click on "New Identity", I'm a new person.
if your server will be without authentication, then hackers and feds will hack into it. they will know it's address from exit nodes
if it's with authentication, you will be the only user, so a single identity

>Same is true on BitTorrent
it has hashes, which are automatically checked by the torrent client. but if they hack your server they can replace the downloaded file. you could verify hash if you have the original one, but you have to do it manually and not forget about it ever

>With BT I could simply share my new HD version of the joker movie, which looks like a .mp4 file, but in reality is an executable with a huge installer with every malware I could ever find. I'd just have to add it to the pirate bay listing. And so could the feds.
no you can't, you don't know how torrents work. you will add your malwared torrent but almost nobody will download and share it, so it will never become popular. also, mods will soon delete it from torrent sites after someone reports it

>The problem with creating such shit is, that it takes considerable amounts of skill and work, to create such things, but it doesn't pay to do it. And that's because of the freeloader mentality.
why do it, when you can click virtual machine and torrent over Tor?

Nanonymous No.8572 [D] >>8616 >>8686
>>8538
I'm working in the IT sector for 20 years now, which correlates with me being old, but also points towards a very large difference in abilities and experience between me and the shithead whose post I've answered.

>muh logical fallacy
Stop projecting. By representing the context of my post you're the one who's commiting a logical fallacy. It's calles the strawman-fallacy.


>>8539
>what kind of metadata? if torrent client is good or bad but in virtual machine, it won't be able to leak any useful info
First, of course it can. It can simply contact fbi.gov, if it can access the internet. Preventing it from accessing the internet is not easy, while being able to work, and you probably don't know how to do this. Second the interface between the virtual machine and the host is far from perfect, or even meant to be useful for anonymization purposes. If the application can read MACs or serial numbers of your machine, it can relay those to the outside world. So you'd at the very least have to make sure, that the process is unable to read from stuff like /proc/ and /sys/, and have to be very selective about system calls and system bus interfaces, if you're using linux. You wouldn't be able to prevent this at all, while using windows. There you'd come into contact with something like AppArmor, SELinux, or GRSecurity, and would probably have to recompile your kernel with your own configuration. The kernel config I'm using for critical machinery in my work environment took months to develop, and I actually had to read some kernel code to get answers. You're not able to do all of this. If you were, you wouldn't be filesharing.

And since you aren't you're basically open for every attack there is against BT. Plus, read this: https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea

BT clients in the past literally published the IP of the machine it's running on. By this I don't mean the local IP of your virtual network interface, but the IP of your home connection. That's easily possible, as long as the process can access the network. And, as I said, you're not able to prevent it from doing so.


>>no it wouldn't. Tor has such high bandwidth that even if it got 3-5 times smaller, Tor would still be fast and comfortable for web browsing
BT puts out more than 3-5 times the traffic of simple browsing. You also have no understanding about peaks in transmissions. Networks need lots of free bandwith, if you don't want them to break down at peaktime.


>say what you want about them, but filesharers don't need to ask you for consent to use Tor for filesharing
Locusts also don't need to ask for my permission to fuck up my field. My comparison holds. I also think, that locusts should be killed on the spot, as soon as they enter anyones field.


>run it inside torified virtual machine and it won't leak shit
You don't torify a whole machine. You Isolate the whole machine from the network while allowing nothing but the tor process network access. Then you decide, which applications/processes are allowed to access port 9050 of the tor process, which, ideally, resides on a entirely different machine. You do not use the transparent proxy in any way, because it's a insecure all-or-nothing solution, which can't be monitored.


>or just double click on virtual machine
Yeah. As if the standard config wouldn't be made to maximize compability on the cost of everything else. Including security and anonymity.


>most torrents are shit because most people are dumb niggers. same as most http traffic is shit (facebook, cat videos, porn). do you want to ban http?
Actually, I want to seceed from my own country, and form a new one, within which dumb niggers die like flies as a result of its extremely darwinistic policies. I also want to personally kill dumb niggers in the case of any transgressions against my property. Does that answer your question?

You want to bring more dumb niggers into the tor network.


>I am sure Tor users who use torrents are downloading something more valuable than what normal niggers download
Hopefully it's childporn, so they get taken down quickly, and get raped by actual niggers in prison. Just to prove my point.


>you don't need any of this, it's already done by someone else. all you need it so to download Whonix and double click to install and run
Of yes, you do have to write your own firewall, because you have to customize the whole machine, if you want to have control over what single processes can do. There's no readymade solution for this out there. Have a look in forums, within which people are talking about how to deploy the next silk road. From a technical standpoint, they have the same problem, but theirs is easier to solve, as they're using their own - less complex - software, which has been developed with security in mind.


>everything you run inside it will go through Tor (catch all circuit)
As I said, the transparent proxy isn't secure, as it doesn't isolate data streams


>only allow network connection if software will use specific socks proxy ports
that's socks5h://127.0.0.1:9050, which relies on the software it's using. BT clients didn't honor the proxy settings in the past, and there's no reason to believe, they do now. Anonymity isn't on the priority list of BT developers.


>https://whonix.org
Yeah. I'm one of the whonix contributors. Please write in their forum, that you want to use BT over tor, and look how people are reacting. You may hear voices suggesting to blacklist torrent clients. Even though I don't know, if they'd even work, as you're not reachable via tor without setting up a hidden service, and I believe, that BT relies on that reachability.


>then you don't know how your shit software is inferior to professional products
The final product depends mostly on what's between the ears of the user, and not on the software. Most users don't use a fraction of what's possible with their software.


>gimp has the worst interface and usability of graphic editing software, so it's the worst
What matters is what's between the ears of the user, while the interface only decides how easy someone without any experience can perform simple tasks.


>the same user will achieve better productivity with superior tool
I still outperform many of my fellow coders while using my highly customized version of vim, instead of their high end IDEs.


>they should focus more on usability than stupid obscure features that nobody uses it's not about lack of resources, it's about priorities. open source developers don't give a fuck about user interface
OSS developers want to deliver software, that performs certain tasks, which require experience. They don't want to make it easy for people lacking experience, especially, if that would be detrimental towards all other tasks. RTFM is very common in the OSS world.


>it doesn't. back it with examples, I will show counter examples
- vim after customization is better and faster than Eclipse.
- blender is better and faster than 3dsmax, while it can do much more than just rendering
- LibreOffice is better than MS office.
- Linux is better than windows
- nginx is better than whatever HTTP server windows uses
- python is better than basic
- python is better than this widely used pascal clickcodingtool, that fell out of favour a decade ago
- java is crap, and worse than basically everything the OSS world offers
- rust is better than c#
- GPG is better than PGP
- Firefox is better than Internet Explorer, or how it's called nowadays
- several OSS XMPP apps are better than WhatsApp and discord combined, especially, when it comes to security
- Tor is better than ???
- BitMessage is better than ???
- Tails is better than ???
- Whonix is better than ???
- Qubes is better than ???
- SELinux, Apparmor, GRSecurity is better than ???

Does that suffice?


>if your server will be without authentication, then hackers and feds will hack into it. they will know it's address from exit nodes. if it's with authentication, you will be the only user, so a single identity
You have no idea about how to setup a proper hidden service.


>Same is true on BitTorrent
>it has hashes, which are automatically checked by the torrent client.
If I can create my own torrent with stuff everyone wants to have, I can create my own torrent with stuff hacks everyones computer while pretending to be stuff everyone wants to have. Hashes don't protect you from that. I've had my own filesharing past. You have no idea about how often I've downloaded porn while trying to download a newly released movie.


>no you can't, you don't know how torrents work.
Actually, I do, even though my knowledge might be a little outdated. I've oversimplified and was hyperbolic, but believe me, that I would find a way to share a worthless LQ version of the actual joker movie, which wouldn't startle any malware detectors, and would deanonymize 90% of its viewers as soon as they doubleclick the file. In that case, a lawyers officeprinter would already print the injunction request, before the movies intro has finished. Try sharing CP, if you want a demonstration of how that's done.


>why do it, when you can click virtual machine and torrent over Tor?
I've already answered that.


Nanonymous No.8616 [D] >>8623
>>8572
passive viewer of this thread. explain this:

>but believe me, that I would find a way to share a worthless LQ version of the actual joker movie, which wouldn't startle any malware detectors, and would deanonymize 90% of its viewers as soon as they doubleclick the file.

how could something like this even theoretically work? if you have malicious code embedded the file would still need to be executed like a program. Double clicking a movie file would presumably open it in a video player which should be harmless.

Nanonymous No.8623 [D]
>>8616
>Double clicking a movie file would presumably open it in a video player which should be harmless.
Just out of the top of my head:

- Many videoplayers like VLC or the windows media player download stuff when playing files. I assume, that they search some kind of online database for metadata. I'd have to look into things, but I assume, that it's either from a place like imdb, or an url can be somehow specified in the metadata of the file. In the latter case, it's likely possible, that the escaping of the string isn't perfect, and one can somehow inject a chosen url, which then would get the IP ofthe user. If injecting the url is not possible, imdb, or whoever, will have a url, which, as soon as it's acessed, relays the IP to the feds. If you don't believe, that packets are sent while playing a file, let tcpdump or wireshark run on the interface, start your favourite movie, and have a look for yourself.

- Due to the fact, that players try to maximize compatibility, players support many old codecs with known exploits. So I could encode my crappy version of the joker movie with such an exploit, and manufacture a dataframe, which either takes over the whole process, or just makes a few systemcalls in order to send a packet to my server, and thereby tell me, that you're watching my movie

- the file could be zipped, and exploit a weakness in the compression library you're using, doing the same thing. Most people use outdated versions of 7zip, which have known weaknesses. I assume from now on, that you understand, that such exploits can enable you to either send data over the network, let the process do something, or let the process spawn a new process.

- There were possible attacks against windows making use of some unicode features, which made it possible to completely hide the file type. I don't know about the present, but in the past it was possible to have a .exe file that looks like a .mp4 according to the naming, and also displayed the .mp4 icon the windows explorer, or how it's called, shows for .mp4s. This .exe could then do that I want, and start your media player afterwards. A few years ago stuff like this worked fine, but this may already have been fixed by either disabling the according unicode feature, or displaying a prompt whenever an executable is executed.

- btw, the linux libraries, which are used to create thumbnails for display in the file manager, are extrememely old and full of exploitable weaknesses. Linux server distributions have known critical weaknesses for imagemagick unfixed at least half the time. Unfortunately, there aren't many alternatives.

- It's possible to let PDFs or other formats load ressources like images from the interwebz. I could encode the video or audio in an exotic or experimental format "to save resources", and add a PDF in which I explain, where you get the appropriate codec from. While opening the PDF, your computer is going to send my server a notice. While downloading my experimental/exploitable codec, you'd contact a server which I can put under surveillance. And while running the file, it would then exploit the holes in my codec, take over cour computer, and burn images of my dick in your bios/cmos, and thereby bricking your machine. Most people are logged in with admin rights, which is incredibly stupid.


Those possibilities really came out of the top of my head, and did not require any research on my side. If I'd do some research, I'd probably find more possible attack vectors. As I said, achieving security and anonymity is HARD. Most people wouldn't know what hit them.

Nanonymous No.8686 [D]
>>8360
>>8503
>>8572

Tribler