• 0 Posts
  • 41 Comments
Joined 11 months ago
cake
Cake day: February 17th, 2025

help-circle



  • So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence

    Asking for evidence wasn’t the issue, believing that the truth relies solely upon a discussion providing such evidence is.

    I think you are confusing having an option with something being mandatory.

    You misunderstood. Some of your own statements say it matters and is used. Mandatory wasn’t mentioned nor implied.

    And Tor nodes are not the same thing as VPN multi-hop.

    I just realized you think that Tor is built using multi-hop.

    I didn’t state they were the same. Tor uses “multiple hops” (you can find that string the the link I posted earlier). It is critical to the limiting of information seen by any single entity.

    And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?

    All that state can be removed. And the server might not be tracking that. Situations vary, adversaries vary. If you cannot imagine a scenario in which hops or IP address would matter, I would suggest doing some research.

    Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.

    Personal swipes mark the end of this discussion. I would suggest you to leave those out next time as It detracts focus from constructive learning.

    This will be my last reply. You can also reply if you want (but I won’t see it).








  • Yeah, multi-hop is pointless for tracking.

    The logic to it is crazy too. People think VPNs make them anonymous (they don’t), but they also think multi-hop makes them MORE anonymous.

    Whether multi-hop matters to tracking is far and away a different discussion than whether multi-hop “makes you anonymous”.

    I too disagree with the original comment, but also believe the pendulum swung too far the other direction in your replies.

    Situations differ. Threat models differ. More hops can, from direct personal experience, make the difference in tracking. Your claim of “…multi-hop is pointless for tracking.” has too broad of a scope to be correct.







  • Most entry points are through various other ways…

    With encryption, the data is changed so that only the key could decrypt it. If there are no encryption backdoors, then the key is the only end goal of attack. Compared to a physical lock, where, even if the lock was perfect, you still need to secure the structure it locks.

    Most entry points are through various other ways, which is also why i find GrapheneOS for the average user stupid.

    I still appreciate defense against the less common. Easier to focus on the more common.

    Just because stuff is sandboxed and you have some Ad-Blockers on, doesn’t mean shit these days.

    Sandboxing and Ad-blockers are quite different. One gives restricted permissions, so a program has less tools to be able to cause harm, and less visibility into the system to violate privacy. Ad blockers need only to stop an ad from displaying. The security and privacy gain would likely only come from stopping you from clicking them (since they’re blocked), or stopping the resources from being networked to in the first place.

    Sandboxing I would consider much better for security and privacy. That’s why its a valuable tool for security researchers.