• chicken@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    22 hours ago

    In this scenario it wouldn’t matter because the idea is to use it as a way to access a website that would otherwise be accessed over clearnet but has become inaccessible. But if they made an onion site endpoints wouldn’t be used anyway afaik since the traffic doesn’t leave the network. Now that I’m thinking about it there might be some issues with practicality doing it this way if they have a big volume of traffic, but there are options for routing around censorship that don’t involve DNS.

    • emeralddawn45@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      22 hours ago

      I don’t understand this comment, can you elaborate? Why wouldn’t the endpoints be used? This is probably my ignorance but I thought all traffic was routed through the onion network and then eventually to the end device, but all that extra routing can’t help you if the Feds control the last stop before whatever server you’re trying to contact… are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

      • chicken@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        21 hours ago

        are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

        Basically yeah. My understanding is that exit nodes are special and using them is a vulnerability, but you only use exit nodes to access clearnet sites from Tor, and you are less vulnerable if you aren’t doing that and rather going to sites with .onion urls. Which, unfortunately I can’t find one for this website, but I’m thinking they’d probably consider making one if they can’t maintain any clearnet domains anymore.

        • emeralddawn45@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          3
          ·
          21 hours ago

          I don’t think that’s true and a very cursory google suggests (to me at least) that im right and I don’t have time to parse a bunch of sources right now. So idk if anyone else could chime in with specific technical details or a source id appreciate it.

            • emeralddawn45@lemmy.dbzer0.com
              link
              fedilink
              English
              arrow-up
              2
              ·
              20 hours ago

              I guess I was holding onto some fearmongering from the silk road days when i swear everyone was saying not to use TOR because it was all owned. It’s good to know that onion addresses can be accessed without revealing any info. If you accidentally navigate from a Tor site to a clearweb site how much is potentially given away, assuming the exit node is compromised?

              • chicken@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                2
                ·
                19 hours ago

                I wouldn’t go as far as claiming it doesn’t reveal any info, all I’m saying here is that there are more security guarantees, and demonstrated security failures of Tor related to adversarial exit nodes don’t necessarily apply to onion services. I don’t really know much beyond that.

          • pkjqpg1h@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            ·
            20 hours ago

            Tor is used by many countries, both users and governments. The reason for Tor is that it’s not searchable: you need an exact, password-like URL to reach, for example, login pages. This ensures there is no chance another country can spy on or access those communications.