Can someone please explain? #179
Labels
No Label
🔍🤖 Search Engines
approved
dependencies
duplicate
feedback wanted
high priority
I2P
iOS
low priority
OS
Self-contained networks
Social media
stale
streaming
todo
Tor
WIP
wontfix
XMPP
[m]
₿ cryptocurrency
ℹ️ help wanted
↔️ file sharing
⚙️ web extensions
✨ enhancement
❌ software removal
💬 discussion
🤖 Android
🐛 bug
💢 conflicting
📝 correction
🆘 critical
📧 email
🔒 file encryption
📁 file storage
🦊 Firefox
💻 hardware
🌐 hosting
🏠 housekeeping
🔐 password managers
🧰 productivity tools
🔎 research required
🌐 Social News Aggregators
🆕 software suggestion
👥 team chat
🔒 VPN
🌐 website issue
🚫 Windows
👁️ browsers
🖊️ digital notebooks
🗄️ DNS
🗨️ instant messaging (im)
🇦🇶 translations
No Milestone
No Assignees
1 Participants
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: privacyguides/privacytools.io#179
Loading…
Reference in New Issue
No description provided.
Delete Branch "%!s(<nil>)"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I installed DuckDuckGo when this article use to recommend it. What happened to DDG and should I get a different search engine? Also, since the FBI hacked Tor, and since Brave injects ads (like Adblock Plus); why are these browsers included in the list?
DuckDuckGo: https://github.com/privacytoolsIO/privacytools.io/issues/84
Brave: https://github.com/privacytoolsIO/privacytools.io/issues/161
So both DuckDuckGo and StartPage have servers around the world (in and out of the US). DDG depends on Yahoo and Amazon whereas SP depends on google. Both claim to be private. What's the difference?
@chazzcarp I think it's best to keep this topic in the already mentioned thread #84 🙂
@michaelstandeven when you say the FBI hacked Tor, what do you mean exactly? I heard of several cases where the federal agencies were in control of Tor servers and could track people who were accessing these servers. Could you provide e.g. a link to an article, I would like to read about this, thanks !
FBI hacked Tor
is nonsense. @chazzcarp SP uses Google for better results, whereas DDG uses Amazon for hosting.Tor is a decentralized network based on open-source software which is partially funded by the US government, because they need Tor just as much as we do. You can't hack a network like that, you can compromise the nodes, you can compromise hidden services, but you can't compromise the network. Also, @michaelstandeven, I'd prefer real arguments and not just links to articles which don't support the claim
FBI hacked Tor
at all.Quotes a New York Times article which doesn't mention Tor once. Then it quotes a blog post from 2013 which says
Recent reports in the media? A good journalist would at least add a link to the source(s).
https://cointelegraph.com/news/tor-developer-flees-us-to-avoid-fbi
A core Tor developer avoided a subpoena. Tor is in theory unbackdoorable by its nature, many people (core developers, other contributors) are presumably checking the source for backdoors. Backdooring the source would be easy to spot in git. Other core devs would notice this, and even if they would all be subpoenaed, other contributors would notice.
http://www.idigitaltimes.com/best-alternatives-tor-12-programs-use-nsa-hackers-compromised-tor-project-376976
Tor has been compromised
as an assumption and their only argument is that a Black Hat 2014 talk was cancelled.Best Alternatives to Tor: 12 Programs to Use Since NSA, Hackers Compromised Tor Project
:How is that an alternative to Tor?
If Tor is
Compromised by the NSA and Hackers
, how does an OS that routes everything through Tor an alternative?A full replacement? How is that a replacement at all? Since when is Tor an IM service?
(basically everything they suggest apart from I2P and Freenet is nonsense in the context of alternatives to Tor, so I won't quote the rest, this should be enough to show how bad this article is)
Tor != TBB. That was a flaw in Firefox. And it targetted TBB users, not Tor.
Same as the previous article.
Also,
And yet the title is still
https://news.bitcoin.com/fbi-tor-developer-torsploit-malware/
Again, the same as the previous article.
https://www.linkedin.com/pulse/former-tor-developer-created-malware-fbi-unmask-users-m-shaffer
Yet again, the same as the previous article.
Also, further explaination of his contributions:
(This is said in the previous article as well, with ~2 words different. The articles are basically the same, and some parts practically the same.)