• Cybersteel@lemmy.ml
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    3
    ·
    1 year ago

    Isn’t tor like compromised? And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.

      • /home/pineapplelover@lemm.ee
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        Isn’t tor like compromised?

        Most people who got caught on Tor were caught by undercover operatives or one of their friends on there got busted. Just general recklessness on there. I have heard that CIA tries to run a bunch of tor nodes to deanonymize tor but I’ve also heard that tor checks if those nodes are legit before allowing them on. I don’t see strong evidence for tor being compromised.

        And most privacy based solutions are usually run by shell organizations that have ties with Five Eyes. Stuff like VPN services, proxies or some of those password managers.

        Privacy based solutions is kind of vague, I the main privacy and security services I use are Signal, Protonmail, Protonvpn, and Bitwarden. All of these are open source, you can view the source code yourself and see if there’s spyware, strangers look at the code all the time so online strangers can see if there’s spyware in there, they also are all checked and audited by third parties. So the code you see is what you get and there are no backdoors or spyware running in there. You can build it all from source if you’re extra cautious but it’s probably done right.

        So I have no idea what this guy is saying but it is not true at all.