this post was submitted on 26 Jul 2023
1091 points (91.5% liked)

Programmer Humor

32572 readers
199 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 year ago (1 children)

Can anyone confirm this for me?

[–] [email protected] 12 points 1 year ago* (last edited 1 year ago) (1 children)

Isn’t tor like compromised?

Most people who got caught on Tor were caught by undercover operatives or one of their friends on there got busted. Just general recklessness on there. I have heard that CIA tries to run a bunch of tor nodes to deanonymize tor but I've also heard that tor checks if those nodes are legit before allowing them on. I don't see strong evidence for tor being compromised.

And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.

Privacy based solutions is kind of vague, the main privacy and security services I use are Signal, Protonmail, Protonvpn, and Bitwarden. All of these are open source, you can view the source code yourself and see if there's spyware, strangers look at the code all the time so online strangers can see if there's spyware in there, they also are all checked and audited by third parties. So the code you see is what you get and there are no backdoors or spyware running in there. You can build it all from source if you're extra cautious but it's probably done right.

So I have no idea what this guy is saying but it is not true at all.

[–] [email protected] 1 points 1 year ago