Because of that, all the setting should be encrypted (and also somehow protected from damage by redundancy). That's because they serve as an evidence, but if the settings are encrypted then forensic analysis is more difficult. One hop tunnel should be enough for some minimal anonymity and even plausible deniability.Īnother important feature that should the application for filesharing have is an encryption of settings, mainly locations shared directories. If someone wanted to download say a video from a someone who is in the same country, then this would be proxified through few other guys in different countries. It might be a good idea to create RetroShare opennet mode, where anyone could simply with few clicks connect to any other as long as their IPs were not located in the same country. Many people thing that they can stand police interrogation, but actually fail even with stupid refusal to answer any question, so don't depend on them and rather share your music and series with gyus from other side of planet. When they caught him they asked him where he obtained the grabbed video and he told him about this guy. Regarding filesharing, it MIGHT be better to not connect to your friend or even people in you country, it happened in my country that a guy had his home searched and computer seized because some other guy downloaded some video through DC++ (direct connect, it is still sometimes used in some places, mainly college networks) and then he burned it to many dvds and started selling them. I don't see a reason why would anyone wanted to use retroshare through tor, because it is already hiding your ass by being connected only to friends. So we don't have a central controlling institution like states but circles of friends that "watch" each other. (Like in real life, you won't use another persons restaurant to distribute your flyer for illegal content, if you get me ) I came to the conclusion that people watching each other seems to work out better. I cannot control exactly what is sent over my line in RS either but i can carefully add friends. I assume most people do not want to help distribute that kind of contentįor me cp was the reason to leave Tor, stealthnet, because my bandwidth won't be used for this. If someone starts to share childporn he will most probably be blocked by his friends. social control: users "control" there friends in a social way. TOR has to hide direct IPs because you connect to everyone. ![]() RS is f2f "friend to friend" TOR is more like p2p "peer2peer". TOR is a very different approach compared to RS. cyberagorist Posts: 5 Joined: Sat 9:52 amĪFAIK there is no known way to do a MITM with SSl while private certificates are still safe. ![]() There are also the attempts of the Iran to censor Tor, with the result that Iran is on the second place in the world among Tor users. There are, in particular, illegal activities, punishable in the US with arbitrary high sentences (distribution of child porn), which have survived over many years despite being known to US LEA. Nobody knows my IP address, it can change, nobody will even note it.Īnd about security - sorry, but Tor has already survived very serious practical security tests. But once it has been transferred, everything else works automatically, without any MITM attack danger. Of course, not a nice string, not easy to remember. All I have to tell other people is my Torchat id. I would not name this really safe.Ĭompare with Torchat. īut it seems to me that in comparison with Tor RetroShare is unsafe. I'm new to RetroShare, so my impression about it may be quite wrong.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |