@jherazob @leberschnitzel they already exist...

I think it's bad #TechPopulism to think that #Anubis will fix all the issues.

Just block all the #GAFAMs ASNs & #hosters that host #Scrapers so the industry cracks down harder on them than on #IRC, #Tor #ExitNodes, #CSAM & #BitTorrent combined!

Kevin Karhan :verified: (@kkarhan@infosec.space)

@nixCraft@mastodon.social what we should do is *literally* [block](https://github.com/greyhat-academy/lists.d/blob/main/scrapers.ipv4.block.list.tsv) all the #scapers network-wide (as per IP block allocation) and #DROP all traffic to/from them, because #Anubis requiring #JavaScript makes it #ableist and bricking #TUI browsers like #LynxBrowser... - #OnionServices on #Tor / @torproject@mastodon.social show [how it's done…](https://infosec.space/@kkarhan/114437837120770551)

Infosec.Space

@clubchonky personally, I disagree to an extent.

@torproject / #Tor is well battle-tested and combat-hardened and using #OnionServices works just fine, as none of the traffic leaves through #ExitNodes...

@gameplayer @atomicpoet it's not that simple.

  • Shure the average cybercriminal can use some hijacked routers and desktops as a proxy for their carding fraud but that doesn't scale with huge amounts of traffic and ISPs do combat proxy use by explicitly checking traffic for it and banning such setups as per ToS.

In fact, many ISPs will forcibly disconnect customers if they detect they run an open proxy or tor exit node.

@tasket I don't say @tor#Tor is perfect - far from it.

BUT an #OnionService is way easier to conceal, shield and secure than a #SurfaceWeb site.

  • Also the main disadvantage of Tor is speed and the fact that @torproject publishes their #ExitNodes, so blocking Tor users is too easy.

Needless to say that there may be different scenarios and it takes individual assessment of needs, capabilities and #ITsec, #InfoSec, #OpSec & #ComSec to the point that I think it's important to teach people to make that decision instead of blanket VPN shilling...

#DontBlockTor

Q: Is there any Hoster that doesn't block or ban @torproject ?

I could understand it if they don't want #ExitNodes and subsequent traffic to taint their rep, but they literally #ban #Tor entirely regardless if #OnionService, #Relay or a private #Bridge.

#DontBlockTor #Bridges

Terms & Conditions | Legal | Contabo

View Contabo's terms & conditions and other legal pages

@landley I just use #Tor and since they all treat @torproject users as #Torrorist|s, that makes things easy...

I've not yet taken a look at Kaizushi's #ExitKit for private #ExitNodes cuz that'll basically be a better option to a #VPN...

Otherwise, I'd consider working to get something like a #pfSense on a #VPS at like Hetzner...

BridgeDB's get-tor-exits script doesn't account for IPv6 (#19997) · Issues · The Tor Project / Anti-censorship / BridgeDB · GitLab

As Arlo pointed out on the tor-dev mailing list, the exit-addresses script running on check.torproject.org doesn't include IPv6 exit addresses, making anything that...

GitLab

@kobayashi90 @signalapp @tfunken depends...

Again: #MonoclesChat + #Orbot and one of many #XMPP servers and you get #secure comms and even if the provider/admins are held and gunpoint and forced to log everything, all they see are #Tor #ExitNodes and/or other @torproject Tor nodes and only scrambled stuff...

https://github.com/greyhat-academy/lists.d/blob/main/xmpp.servers.list.tsv

lists.d/xmpp.servers.list.tsv at main · greyhat-academy/lists.d

List of useful things. Contribute to greyhat-academy/lists.d development by creating an account on GitHub.

GitHub
lists.d/blocklists.list.tsv at main · greyhat-academy/lists.d

List of useful things. Contribute to greyhat-academy/lists.d development by creating an account on GitHub.

GitHub

@icedquinn
Tor has #deanonymising elements inherant to it, as #exitNodes can be setup to limit traffic speeds, which can then be used at the #TorGuard node and/or #ISP to track users.

That's just one of the many reasons why #i2p and #garlicRouting is better.

@cowanon