• chicken@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 hour ago

    In this scenario it wouldn’t matter because the idea is to use it as a way to access a website that would otherwise be accessed over clearnet but has become inaccessible. But if they made an onion site endpoints wouldn’t be used anyway afaik since the traffic doesn’t leave the network. Now that I’m thinking about it there might be some issues with practicality doing it this way if they have a big volume of traffic, but there are options for routing around censorship that don’t involve DNS.

    • emeralddawn45@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      I don’t understand this comment, can you elaborate? Why wouldn’t the endpoints be used? This is probably my ignorance but I thought all traffic was routed through the onion network and then eventually to the end device, but all that extra routing can’t help you if the Feds control the last stop before whatever server you’re trying to contact… are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

      • chicken@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        14 minutes ago

        are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

        Basically yeah. My understanding is that exit nodes are special and using them is a vulnerability, but you only use exit nodes to access clearnet sites from Tor, and you are less vulnerable if you aren’t doing that and rather going to sites with .onion urls. Which, unfortunately I can’t find one for this website, but I’m thinking they’d probably consider making one if they can’t maintain any clearnet domains anymore.