@clubchonky personally, I disagree to an extent.
@torproject / #Tor is well battle-tested and combat-hardened and using #OnionServices works just fine, as none of the traffic leaves through #ExitNodes...
@nay the problem with #IRC bouncers is that hosters hate that even more than @torproject / #Tor *and #Cryptocurrency #mining or any #Cryptojacking & #malware.
As in: Many will literally fire customers just for using Port 6667 and/or 6697…
The same Hosters have no issues with people mining #Shitcoins that'll flood their Network and burn through NVMe-SSDs like #Solana or people running #ExitNodes from their Network!
The only thing that (tho deservedly!) gets them to cancel VPSes is hosting CSAM…
@jherazob @leberschnitzel they already exist...
I think it's bad #TechPopulism to think that #Anubis will fix all the issues.
Just block all the #GAFAMs ASNs & #hosters that host #Scrapers so the industry cracks down harder on them than on #IRC, #Tor #ExitNodes, #CSAM & #BitTorrent combined!
@[email protected] what we should do is *literally* [block](https://github.com/greyhat-academy/lists.d/blob/main/scrapers.ipv4.block.list.tsv) all the #scapers network-wide (as per IP block allocation) and #DROP all traffic to/from them, because #Anubis requiring #JavaScript makes it #ableist and bricking #TUI browsers like #LynxBrowser... - #OnionServices on #Tor / @[email protected] show [how it's done…](https://infosec.space/@kkarhan/114437837120770551)
@clubchonky personally, I disagree to an extent.
@torproject / #Tor is well battle-tested and combat-hardened and using #OnionServices works just fine, as none of the traffic leaves through #ExitNodes...
@gameplayer @atomicpoet it's not that simple.
In fact, many ISPs will forcibly disconnect customers if they detect they run an open proxy or tor exit node.
@tasket I don't say @tor#Tor is perfect - far from it.
BUT an #OnionService is way easier to conceal, shield and secure than a #SurfaceWeb site.
Needless to say that there may be different scenarios and it takes individual assessment of needs, capabilities and #ITsec, #InfoSec, #OpSec & #ComSec to the point that I think it's important to teach people to make that decision instead of blanket VPN shilling...
Q: Is there any Hoster that doesn't block or ban @torproject ?
I could understand it if they don't want #ExitNodes and subsequent traffic to taint their rep, but they literally #ban #Tor entirely regardless if #OnionService, #Relay or a private #Bridge.
@landley I just use #Tor and since they all treat @torproject users as #Torrorist|s, that makes things easy...
I've not yet taken a look at Kaizushi's #ExitKit for private #ExitNodes cuz that'll basically be a better option to a #VPN...
Otherwise, I'd consider working to get something like a #pfSense on a #VPS at like Hetzner...
@torproject not to mention it's kinda sad that #TorBulkExitList still doesn't list #IPv6 #ExitNodes to this day.
That issue is 7 years (!!!) old.
https://gitlab.torproject.org/tpo/anti-censorship/bridgedb/-/issues/19997 via @isis
As Arlo pointed out on the tor-dev mailing list, the exit-addresses script running on check.torproject.org doesn't include IPv6 exit addresses, making anything that...
@kobayashi90 @signalapp @tfunken depends...
Again: #MonoclesChat + #Orbot and one of many #XMPP servers and you get #secure comms and even if the provider/admins are held and gunpoint and forced to log everything, all they see are #Tor #ExitNodes and/or other @torproject Tor nodes and only scrambled stuff...
https://github.com/greyhat-academy/lists.d/blob/main/xmpp.servers.list.tsv