/g/ - Technology
install openbsd
[Make a Post]>>3620
It's okay, they don't want give you data because of your culture. You too can make website, where you give data only to tor users or even only for yourself.
>>3620
It's open project and all exit nodes and relays are listed in the public list, only bridges are hidden. What you're proposing would be against their philosophy to keep things transparent.
I want to add to what already was said in the thread that sites sometimes don't have exactly up-to-date Tor block, so by changing your exit node (restarting the Tor client) you may find one that has not been blocked. It's unreliable though.
Some sites are stupid enough to block your IP or annoy you even when you're just running a normal (non-exit) relay. They just import some random IP blacklist without checking if the selection criteria is relevant.
Tor browser itself is also pretty easy to detect even without using IP lists.
File: dae496bdd6206821798afeecfc3bf37d907820435c664597945be598bd5b2808.webm (dl) (2.37 MiB)
Psst!
VPN over Tor (Tor-to-VPN), not the other way around. Simplest method is to use a VPN client installed on a Whonix workstation, not the gateway. VPN won't have your details but will be a legit non-Tor exit for websites.
>>3619
it's already fixed with content-addressable storage such as Freenet. serving static content the way the web does is fucking retarded and as a result you get retarded shit like IP blocks
>>3655
The vpn will be able to link all your tor activity to a single user, and if you do something to deanonymize yourself even once all previous tor usage is now known to be from you
No, it's not because of that, pajeet. 9 times out of 10 it's because they're using cloudflare which blocks tor by default.
>>3655
That's pretty dangerous if you don't know what you're doing. You send out a Tor packet from your ISP, it bounces around, is decrypted, then a packet from a Tor exit node with your key is recieved by your VPN. The VPN gets what you want and sends it back. The VPN knows everything you did.
If you're smart you can send a packet to a VPN, who then sends it through Tor and then after the exit node you route through a proxy or anonymous VPN. But that last step is decrypted tor traffic so if they're tracking your session then they can link all of that tor traffic together. A single slipup and they know everything you did.
So yeah if you're this level of paranoid you should probably be using a hacked access point or botnet instead.
[Catalog][Overboard][Update]
[Reply]11 replies
Is there a master list of Tor exit nodes somewhere? And how can the Tor project fix this?