169
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 10 Jun 2025
169 points (98.8% liked)
Technology
39151 readers
162 users here now
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
founded 3 years ago
MODERATORS
I hate it when I don't know an acronym, but this one is particularly hurtful to my brain since everyone is saying "yeah, that link to the FSB was obvious glad someone demonstrated it." So... I will just assume FSB=KGB and be done.
Anyway, most of our privacy "war fronts" are honeypots in one way or another. Take for example Tor network (high number of exit nodes are controlled). Except those apps or protocols that are truly decentralized (e.g. OMEMO in XMPP), these are good. But then again, they lag behind to our standards of "normal" Internet that connects us to the world, outside of our tiny circles of nerds.
Now, the thing with honeypots, is that they are there to catch some specific type of fly. If you were to use their network to take advantage of the features for anything that the "predator" behind doesn't care, you're fine. So, I will keep using Telegram for the memes and piracy channels...
From an OPSec perspective this is important news nonetheless and I will keep it in mind.
Russian FSB is the successor of the Soviet KGB, so yeah, that works.
I substantiated my claims about Telegram by a pretty deep technical analysis. Mind at least providing a link for your pretty strong claim about Tor?
Nope. Decentralization is important from power dynamics standpoint, but can actually be detrimental to information security due to (among others) metadata and complexity.
I don't have one. Thanks for asking, you made me actually reconsider the truthfulness of my own statement... I was just parroting back what I heard many times, years ago, among the people that attended a hacklab from the city I was living in back then.
Same goes with the 'tip' that said that Tor was initially funded by the US Military (which apparently is true, but then the project turn out to be independent.) These two "facts" were presented, and parroted back and forth in that space a lot.
It would be great to have real analysis knowing which data centers or actors have the biggest control of exit nodes. If there's really a way to de-anonimyze any traffic from there.
PS. Since we are on the topic, another concern regarding Tor network is the possibility of correlation attacks. It always strikes me how ISP stops providing connection at 'random' if you were a frequent user. Pretty sure there's legal forces behind it... but that's my paranoia. Now those minutes or hours offline sprinkled here and there to my router were a fact. Anyway, the dark web is really full of a lot sick places. I'd rather just stay away from it entirely and use a VPN for my privacy when searching media and stuff. That's a lesson I learned.
Thank you, it is refreshing to see someone honestly and earnestly engaging in a conversation about this. The "Tor is a honeypot" thing is very often an all but religiously held belief.
To truly and reliably de-anonymize Tor traffic, one would need to run over 51% of all Tor nodes. Since the US is not the only entity potentially interested in that (Russia and China might be as well), unless these entities coordinate and share data, they will thwart one another from reaching that kind of saturation.
It might be possible to somewhat fuzzily reason about Tor users by observing traffic on both sides of the tunnel, using timing and packet sizes for analysis. But a). it is going to be very fuzzy; b). it requires global network observation capability. NSA might or might not have that to some extent, but they would not risk exposing that for anything but the most valuable targets.
VPNs are a specific tool for a specific thing, they don't "preserve privacy" in the general sense. You are basically trading ISP's or local spooks' ability to observe your traffic for VPN's operator's and the local spooks' there ability to do so. In some cases it makes sense, in some – not so much.
Depends on your threat model.™
But what will the predator care about tomorrow? Or next year? And how confident are you that aggregate data is not what they want, for whatever reason?