![]() That's because they serve as an evidence, but if the settings are encrypted then forensic analysis is more difficult. One hop tunnel should be enough for some minimal anonymity and even plausible deniability.Īnother important feature that should the application for filesharing have is an encryption of settings, mainly locations shared directories. If someone wanted to download say a video from a someone who is in the same country, then this would be proxified through few other guys in different countries. It might be a good idea to create RetroShare opennet mode, where anyone could simply with few clicks connect to any other as long as their IPs were not located in the same country. Many people thing that they can stand police interrogation, but actually fail even with stupid refusal to answer any question, so don't depend on them and rather share your music and series with gyus from other side of planet. ![]() When they caught him they asked him where he obtained the grabbed video and he told him about this guy. Regarding filesharing, it MIGHT be better to not connect to your friend or even people in you country, it happened in my country that a guy had his home searched and computer seized because some other guy downloaded some video through DC++ (direct connect, it is still sometimes used in some places, mainly college networks) and then he burned it to many dvds and started selling them. I don't see a reason why would anyone wanted to use retroshare through tor, because it is already hiding your ass by being connected only to friends. So we don't have a central controlling institution like states but circles of friends that "watch" each other. (Like in real life, you won't use another persons restaurant to distribute your flyer for illegal content, if you get me ) I came to the conclusion that people watching each other seems to work out better. I cannot control exactly what is sent over my line in RS either but i can carefully add friends. I assume most people do not want to help distribute that kind of contentįor me cp was the reason to leave Tor, stealthnet, because my bandwidth won't be used for this. If someone starts to share childporn he will most probably be blocked by his friends. social control: users "control" there friends in a social way. TOR has to hide direct IPs because you connect to everyone. RS is f2f "friend to friend" TOR is more like p2p "peer2peer". ![]() TOR is a very different approach compared to RS. cyberagorist Posts: 5 Joined: Sat 9:52 amĪFAIK there is no known way to do a MITM with SSl while private certificates are still safe. There are also the attempts of the Iran to censor Tor, with the result that Iran is on the second place in the world among Tor users. There are, in particular, illegal activities, punishable in the US with arbitrary high sentences (distribution of child porn), which have survived over many years despite being known to US LEA. Nobody knows my IP address, it can change, nobody will even note it.Īnd about security - sorry, but Tor has already survived very serious practical security tests. But once it has been transferred, everything else works automatically, without any MITM attack danger. Of course, not a nice string, not easy to remember. All I have to tell other people is my Torchat id. I would not name this really safe.Ĭompare with Torchat. īut it seems to me that in comparison with Tor RetroShare is unsafe. What a dummy.I'm new to RetroShare, so my impression about it may be quite wrong. In the future maybe people like payedpals with reconsider frauding criminals. Now mr payed pals gets to remember his family being raped an tortured over 100 dollars. So yes I agree with all of you it is wrong to buy stolen data but in the real world outside of this forum are people who could careless about your moral standards an if you decide to rip people off for whatever reason you also deserve the repercussions of stealing money from very dangerous an violent entities. Regardless of your moral an ethical foundation DO NOT FUCK PEOPLE OVER ESPECIALLY NOT GANG MEMBERS. After we entered his home my comrades commenced to torturing his family and children. Around 3am in the morning we invaded payedpals home thru an unobstructed ventilation system in the attic. Mr payedpals is smart he does most of his work from a remote location so we decided to follow him back to his house where he resided with his family and children. Payedpals a visit which I am sure he will remember. Unbeknownst to payedpals I am part of a very violent gang called gangsta disciples (GD) so my comrades and I paid mr. I was really upset consequently I traced the exit node an unfortunately for payedpals he did not proxy his exit node which allowed me to determine his ip from JavaScript which he forgot to disable in his browser. I tried to buy paypal accounts from payedpals and he scammed me for 100 dollars.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |