In this scenario it wouldn’t matter because the idea is to use it as a way to access a website that would otherwise be accessed over clearnet but has become inaccessible. But if they made an onion site endpoints wouldn’t be used anyway afaik since the traffic doesn’t leave the network. Now that I’m thinking about it there might be some issues with practicality doing it this way if they have a big volume of traffic, but there are options for routing around censorship that don’t involve DNS.
I don’t understand this comment, can you elaborate? Why wouldn’t the endpoints be used? This is probably my ignorance but I thought all traffic was routed through the onion network and then eventually to the end device, but all that extra routing can’t help you if the Feds control the last stop before whatever server you’re trying to contact… are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?
are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?
Basically yeah. My understanding is that exit nodes are special and using them is a vulnerability, but you only use exit nodes to access clearnet sites from Tor, and you are less vulnerable if you aren’t doing that and rather going to sites with .onion urls. Which, unfortunately I can’t find one for this website, but I’m thinking they’d probably consider making one if they can’t maintain any clearnet domains anymore.
I don’t think that’s true and a very cursory google suggests (to me at least) that im right and I don’t have time to parse a bunch of sources right now. So idk if anyone else could chime in with specific technical details or a source id appreciate it.
I guess I was holding onto some fearmongering from the silk road days when i swear everyone was saying not to use TOR because it was all owned. It’s good to know that onion addresses can be accessed without revealing any info. If you accidentally navigate from a Tor site to a clearweb site how much is potentially given away, assuming the exit node is compromised?
I wouldn’t go as far as claiming it doesn’t reveal any info, all I’m saying here is that there are more security guarantees, and demonstrated security failures of Tor related to adversarial exit nodes don’t necessarily apply to onion services. I don’t really know much beyond that.
Tor is used by many countries, both users and governments. The reason for Tor is that it’s not searchable: you need an exact, password-like URL to reach, for example, login pages. This ensures there is no chance another country can spy on or access those communications.
In this scenario it wouldn’t matter because the idea is to use it as a way to access a website that would otherwise be accessed over clearnet but has become inaccessible. But if they made an onion site endpoints wouldn’t be used anyway afaik since the traffic doesn’t leave the network. Now that I’m thinking about it there might be some issues with practicality doing it this way if they have a big volume of traffic, but there are options for routing around censorship that don’t involve DNS.
I don’t understand this comment, can you elaborate? Why wouldn’t the endpoints be used? This is probably my ignorance but I thought all traffic was routed through the onion network and then eventually to the end device, but all that extra routing can’t help you if the Feds control the last stop before whatever server you’re trying to contact… are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?
Basically yeah. My understanding is that exit nodes are special and using them is a vulnerability, but you only use exit nodes to access clearnet sites from Tor, and you are less vulnerable if you aren’t doing that and rather going to sites with .onion urls. Which, unfortunately I can’t find one for this website, but I’m thinking they’d probably consider making one if they can’t maintain any clearnet domains anymore.
I don’t think that’s true and a very cursory google suggests (to me at least) that im right and I don’t have time to parse a bunch of sources right now. So idk if anyone else could chime in with specific technical details or a source id appreciate it.
https://onionservices.torproject.org/technology/properties/
I guess I was holding onto some fearmongering from the silk road days when i swear everyone was saying not to use TOR because it was all owned. It’s good to know that onion addresses can be accessed without revealing any info. If you accidentally navigate from a Tor site to a clearweb site how much is potentially given away, assuming the exit node is compromised?
I wouldn’t go as far as claiming it doesn’t reveal any info, all I’m saying here is that there are more security guarantees, and demonstrated security failures of Tor related to adversarial exit nodes don’t necessarily apply to onion services. I don’t really know much beyond that.
Tor is used by many countries, both users and governments. The reason for Tor is that it’s not searchable: you need an exact, password-like URL to reach, for example, login pages. This ensures there is no chance another country can spy on or access those communications.