There is just no controlling the internet, it's a war you simply can't win. Why even bother? I think given time people will start being their own ISPs and everything will be unmonitored.
Won't people just switch to TOR if this ridiculous censorship continues?
Other urls found in this thread:
change.org
panopticlick.eff.org
blog.cloudflare.com
blog.cloudflare.com
mesh.gentoo.today
git.gternet.me
twitter.com
Tell that to tech illiterates at EU
Because it’s incredibly slow. Granted, a bigger crowd could make it faster, but at the point it is now, no Chad or Stacy would find it convenient.
Yeah, sure, everyone will switch to Tor
>95% of clearnet requires JS to even work and enabling JS means instant deanonymization
>cloudflare websites decrypt SSL (in essence it becomes fake SSL) and cloudflare basically infected half the web by now
>lots of sites, Jow Forums included, block Tor traffic
No way anybody's going to use this shit in any serious manner
>enabling JS means instant deanonymization
Please explain.
interested in this as well
>There is just no controlling the internet
>what are undersea cables
>what are explosives
web trackers and other spooky shit use javascript
search for "browser fingerprint", we're fucked
Id say the freenet is a better avenue for censorship resistance.
Everyone do this test and post your results.
panopticlick.eff.org
I got yall frens.
People won't switch to shit when all your services hosted in Europe die because of this.
Until they physically cut the undersea cables with hardly anyone protesting
it's even slower than Tor, it's also too much of a legal nightmare to be widely adopted.
Duckduckgo btfo
>>cloudflare websites decrypt SSL (in essence it becomes fake SSL) and cloudflare basically infected half the web by now
can you explain this?
Ho man, that is just awful.
I would have thought phone browsers would fare better against fingerprinting, since phone users are the most common browsers these days.
how am I doing g
Well, you're not getting fingerprinted.
But the fact that some trackers get you still kinda defeats the point.
>TOR
Not everyone is a neckbeard like you.
But TOR is a US Army honeypot which is obviously compromised.
See: fbi let 200 pedos walk because they didn't want to admit to TOR being a compromised swiss cheese honeypot
How do I protect against browser fingerprinting?
Use IE6
But I don't want AIDS.
>There is just no controlling the internet
you're either naive or just too young. in the real world most people aren't nerds who spend most of their time in front of a computer working on technical stuff. they don't care about censorship or privacy. they don't care about whatever niche gnu/linux setup people meme about here for "muh freedom". you have no idea how irrelevant this board is for that matter.
I want to wacko my wanko over dot
js can expose your real IP, unless you're using a properly configured VPN.
you'd have to use TOR with a VPN.
Tor is a Navy project intended to conceal covert submarine communications under mountains of cheese pizza. If there are backdoors, they're almost certainly not intentional.
Cloudflare is a man in the middle attack
Now, right click your green padlock
What do you see?
>cloudflaressl.com
Everything you do on Jow Forums
Even on https
Is decrypted and analyzed *before* it reaches Jow Forums
Same with every other website behind cloudflare
Once they have enough control
Cloudflare will begin filtering the web you see
if they haven't already
>not intentional
Wrong. Otherwise the fbi would give them up so it could be patched
> in essence it becomes fake SSL
> infected half the web
you have absolutely no fucking idea what you are talking about
>No way anybody's going to use this shit in any serious manner
obviously not you, mr. LEA/FBI.
that user is a retard and can't explain it.
>you'd have to use TOR with a VPN.
what shitty advice is this. fucking hilarious.
Can confirm
Cloudflare shadowbanned me on Jow Forums before
Nobody was responding to my posts
So I checked the thread on my phone using mobile network
None of my posts were present on mobile network
I could only see them on my wifi network
> compulsive lying this hard
>assuming lots of exit nodes aren't run by deep state/big brother/(((them)))
Staying hidden on TOR is like Russian roulette.
>Cloudflare is a man in the middle attack
which is why you use TLS-SNI
Thanks for the (you)
At least I know I'm not shadowbanned by Cloudflare today, yet
I don't think that does what you think it does
How is identifying the domain you are requesting in the clear going to help you against cloudflare MITM?
it does literally exactly what I think it does. it sends in the clear the necessary to let the rev proxy route the traffic to the correct backends without terminating TLS.
>a GUI interface in Visual Basic to track the killer's IP
Yes, yes exactly. Why didn't I think of that. It will surely work user.
>Server Name Indication (SNI) is an extension to the TLS computer networking protocol[1] by which a client indicates which hostname it is attempting to connect to at the start of the handshaking process. This allows a server to present multiple certificates on the same IP address and TCP port number and hence allows multiple secure (HTTPS) websites (or any other service over TLS) to be served by the same IP address without requiring all those sites to use the same certificate. It is the conceptual equivalent to HTTP/1.1 name-based virtual hosting, but for HTTPS. The desired hostname is not encrypted,[2] so an eavesdropper can see which site is being requested.
how does it feel to be a literal retard and get btfo'd as a retarded faggot OP? it must really suck ass.
You literally have no idea what any of that means
Jow Forums routes traffic through Cloudflare *intentionally*
Because some of you tards decided it would be a great idea to DDoS the thing every other day
Cloudflare is their 'protection'
It does that by sniffing all traffic to and from Jow Forums servers
in clear text
Because that's how it blocks multiple other forms of attacks
I mean, you don't even realize cloudflare uses SNI themselves
That's why you don't get a single X509 certificate with hundreds of domains attached to it
From your copypasta, it's like SSL's version of virtual hosting
That's all SNI can do
ok kid. just stop being buttblasted for being wrong. SNI enabled non tls terminating HTTPS reverse proxying. this is a fact. however retards use cloudflare is not relevant.
>Won't people just switch to TOR if this ridiculous censorship continues?
99% won't.
This WILL be effective and if it isn't then TOR will get shut down.
Samsung internet + adblock plus
throughput is a piece of shit so probably not
Are you just ignorant or trying to cover up the truth with insults
what about this then? They specifically mention the nsa in their image.
Tor is an alternative, so are mesh networks.
Look at pic related, there's an ongoing project to give people back control over the network: the gternet project.
>Wiki: mesh.gentoo.today
>Git: git.gternet.me
>Irc : irc.jollo.org +9999 #gternet (ssl only, accept self signed certs)
if you're interested, join our irc, discuss, contribute,
>TOR
>TOR
>TOR
>TOR
>TOR
It's Tor, not TOR.
Most amazing browser ever brave is
Waterfox + Blokada
Forgot my screenshot
LARP - The Project.
Did they design a logo already?
>LARP
Nah, we're getting shit done mate, development is slow because people here have jobs and life, but we're still active.
>logo
sure
But you can't post on Jow Forums through Tor.
I am in Croatia and I have no idea what you people are so worked up about.I neither care about nor do I abide by gay eu laws and nothing ever happened.
Does tor only properly anonymise when you browse onions and not when using the clearnet?
>properly anonymise when you browse onions
AND using proper browser hardening (remove js, canvas, WebRTC, etc..)
AND opsec (not using your email, nicknames or passwords you use elsewhere, use on a different machine or boot from usb)
AND common sense (don't open pdf, doc, exe .. you get off Tor)
>using the clearnet
exit nodes have the ability to manipulate your traffic, inject malware, steal your data..
So yes, onions clicks are more anonymous than clearnet clicks, provided you know what you're doing.
>Won't people just switch to TOR if this ridiculous censorship continues?
Because you can barely use Google with Tor, and people want to use Google.
Is it worth my time try and convince people on campus to setup a local mini-mesh to hook up to the rest of the network?
For the record I'm in Israel, specifically studying at the Technion in Haifa.
I'm gonna just buy VPN with exit node somewhere in the free world like Russia.
>Is it worth my time
Sure, a campus is the perfect place to test this. Lot of young people interested in technology, all concentrated in one place would make the perfect ground for testing this technology.
Well, I'll be testing some simple small-scale setups at a local hardware hackathon, if I manage to get a core team after that, I'll go berserk the idea.
>setup mesh network
>Goverment outlaws them
>Send field agents looking for them
Nice, if you need (or want to provide) support for this, join our irc.
>Goverment outlaws them
who knows, maybe one day they'll pull an IBSS tax.
I'll check it when I have some free time, maybe on the weekend or next week.
VPN merchants be like
I must allow scripts for this shit to work?
>somewhere in the free world
>like Russia.
>after third pootin reelection
>after crimea annexation
Russian internet is already more censored than any other ex-ussr or middle east country.
Yes, and its not surprising. Most fingerprinting methods rely on JS to work. As does most malware.
Stupid frogposter.
What do I do about fingerprinting?
I'm not getting that error personally with noscript So I don't know what's making it crash like that.
However, you'll probably be safe from all aside from fingerprinting. It's an absolute bitch.
Not much you can do. The best is actually the Tor browser, since it spoofs the user agent to a very common one, and of course the fact that so many people, especially third world, use it, which makes just that specific fingerprint especially common.
Also consider allowing cookies, just make sure to isolate them and delete them when they're done.
Disabling cookies makes your fingerprint more unique, since pretty much everyone has them enabled.