• emeralddawn45@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    2 hours ago

    I don’t understand this comment, can you elaborate? Why wouldn’t the endpoints be used? This is probably my ignorance but I thought all traffic was routed through the onion network and then eventually to the end device, but all that extra routing can’t help you if the Feds control the last stop before whatever server you’re trying to contact… are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

    • chicken@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      1 hour ago

      are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

      Basically yeah. My understanding is that exit nodes are special and using them is a vulnerability, but you only use exit nodes to access clearnet sites from Tor, and you are less vulnerable if you aren’t doing that and rather going to sites with .onion urls. Which, unfortunately I can’t find one for this website, but I’m thinking they’d probably consider making one if they can’t maintain any clearnet domains anymore.

      • emeralddawn45@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        53 minutes ago

        I don’t think that’s true and a very cursory google suggests (to me at least) that im right and I don’t have time to parse a bunch of sources right now. So idk if anyone else could chime in with specific technical details or a source id appreciate it.

        • pkjqpg1h@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          11 minutes ago

          Tor is used by many countries, both users and governments. The reason for Tor is that it’s not searchable: you need an exact, password-like URL to reach, for example, login pages. This ensures there is no chance another country can spy on or access those communications.