this post was submitted on 14 Jan 2025
482 points (98.8% liked)

Technology

60450 readers
4335 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 17 hours ago (1 children)

Could always use a vpn or tor

[–] [email protected] 5 points 17 hours ago* (last edited 17 hours ago) (1 children)

https://www.malwarebytes.com/blog/news/2021/12/was-threat-actor-kax17-de-anonymizing-the-tor-network

Given the number of servers run by KAX17 the calculated probability of a Tor user connecting to the Tor network through one of KAX17’s servers was 16%, there was a 35% chance they would pass through one of its middle relays, and up to 5% chance to exit through one.

This would give the threat actor ample opportunity to perform a Sybil attack. A Sybil attack is a type of attack on a computer network service where an attacker subverts the service’s reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. This could lead to the deanonymization of Tor users and/or onion services.

Given the cost and effort put into this and the fact that actors performing attacks in non-exit positions are considered more advanced adversaries because these attacks require a higher sophistication level and are less trivial to pull off, it is highly likely this is the work of a high-level (state-sponsored?) threat actor. As for who is behind this group, neither Nusenu nor the Tor Project wanted to speculate.

A spokesperson for the Tor Project confirmed Nusenu’s latest findings and said it had also removed a batch of KAX17 malicious relays.

“Once we got contacted, we looked through all the relays in the network and identified several hundred relays that are very likely belonging to the same group and removed them on November 8.”

VPN's also by definition still use the same corporate pipes as anything else.

[–] [email protected] 7 points 16 hours ago (1 children)

Nothing in this world is ever 100% complete, but decentralization and protocols are extremely good combat measures. It is possible to poke holes in almost anything. But that does not mean it's not worth trying.

[–] [email protected] 2 points 16 hours ago* (last edited 16 hours ago) (1 children)

Woosh. We're decentralizing everything except the hardware and everyone's like bUt iTs dEcEnTrALiZeD!

[–] [email protected] 4 points 16 hours ago (1 children)
[–] [email protected] 2 points 16 hours ago (1 children)

Now that's an answer I can get behind.

[–] [email protected] 2 points 16 hours ago

I love the idea, but it's definitely nowhere near ready yet for prime time. And the data speeds are incredibly slow. Using it definitely is possible, but it would be absolutely nothing like the internet we are currently used to.