• bonus_crab@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    9 months ago

    Yeah but you cant really obfuscate your message destination and timing without using onion routing, and really thats just making it more expensive to compromise and run. That said other things here do make it seem like a honeypot…

    Its fully open source though, even the server. Might not be that hard to fork it and let people host their own servers.

    • CameronDev@programming.dev
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      Onion routing isnt a foolproof answer either, if the three letter agency runs the entry/exit nodes. There are lots of rumors of tor being compromised.

      I wasnt clear in my original comment, but I do trust Signal mostly (naively?), its the other Signal forks/clones that i do not trust at all. So if someone forked Signal and made it self-hostable, that would be interesting, but near impossible for me to trust. Being open source doesnt mean its not backdoored, see xz. ;)

      • HelixDab2@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        Lots of rumors, very little evidence.

        There’s a lot of really bad stuff on Tor. Like, really bad; probably worse than you’re imagining. Things that make the old rotten.com stuff look like a child’s birthday party. If Tor was actually compromised, the people creating and uploading that stuff would be grabbed quickly. Instead, LEAs have to cooperate globally and run long-con sting operations in order to identify people in order to bust them. Most of the time, they’re busting people that use Tor due to social engineering or one kind or another, and the remaining times it’s because someone fucked up configuration on a site.