• 0 Posts
  • 73 Comments
Joined 6 months ago
cake
Cake day: February 17th, 2025

help-circle
  • So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence

    Asking for evidence wasn’t the issue, believing that the truth relies solely upon a discussion providing such evidence is.

    I think you are confusing having an option with something being mandatory.

    You misunderstood. Some of your own statements say it matters and is used. Mandatory wasn’t mentioned nor implied.

    And Tor nodes are not the same thing as VPN multi-hop.

    I just realized you think that Tor is built using multi-hop.

    I didn’t state they were the same. Tor uses “multiple hops” (you can find that string the the link I posted earlier). It is critical to the limiting of information seen by any single entity.

    And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?

    All that state can be removed. And the server might not be tracking that. Situations vary, adversaries vary. If you cannot imagine a scenario in which hops or IP address would matter, I would suggest doing some research.

    Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.

    Personal swipes mark the end of this discussion. I would suggest you to leave those out next time as It detracts focus from constructive learning.

    This will be my last reply. You can also reply if you want (but I won’t see it).








  • Yeah, multi-hop is pointless for tracking.

    The logic to it is crazy too. People think VPNs make them anonymous (they don’t), but they also think multi-hop makes them MORE anonymous.

    Whether multi-hop matters to tracking is far and away a different discussion than whether multi-hop “makes you anonymous”.

    I too disagree with the original comment, but also believe the pendulum swung too far the other direction in your replies.

    Situations differ. Threat models differ. More hops can, from direct personal experience, make the difference in tracking. Your claim of “…multi-hop is pointless for tracking.” has too broad of a scope to be correct.













  • There was this recent attack to XZ utils, which shows that more attention is needed on the code being merged and compiled.

    XZ was made possible largely because there was unaudited binary data. One part as test data in the repo, and the other part within the pre-built releases. Bootstrapping everything from source would have required that these binaries had an auditable source, thus allowing public eyes to review the code and likely stopping the attack. Granted, reproducibility almost certainly would have too, unless the malware wasn’t directly present in the code.

    Pulled from here:

    Every unauditable binary also leaves us vulnerable to compiler backdoors as described by Ken Thompson in the 1984 paper Reflections on Trusting Trust and beautifully explained by Carl Dong in his Bitcoin Build System Security talk.

    It is therefore equally important that we continue towards our final goal: A Full Source bootstrap; removing all unauditable binary seeds.

    Sure you might have the code that was input into GCC to create the binary, and sure the code can be absolutely safe, and you can even compile it yourself to see that you arrive at the same bit-for-bit binary as the official release binary. But was GCC safe? Did some other compilation dependency infect the compiled binary? Bootstrapping from an auditable seed can answer this question.