image description:
using the famous inside you three are two wolves template.

the headline says, “inside you there are two wolves”
the text on top of black wolf reads, “tell her the importance of libre software, and how I use services”, while on top of white wolf the text reads, “don’t reveal too much information. she might be a CIA glowie”

  • brbposting@sh.itjust.works
    link
    fedilink
    arrow-up
    3
    ·
    9 months ago

    The devs promise no backdoorsies!

    A reddit thread claims it’s open source & used by the government. I would definitely agree hardcore criminals shouldn’t touch some modern technology, but how’d you ascertain it’s backdoored?

    • MigratingtoLemmy@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      9 months ago

      It’s used by the government because the keys to the backdoors rest with the NSA. I don’t have the source for what I read right now, but TOR devs are known to work with the government. I believe a similar interaction exists between I2P devs and the government but perhaps not to the extent that TOR does. Note that the government has a vested interest in having backdoors to TOR since it is used more by cybercriminals (for what reasons I do not understand since they know just as well that TOR cannot be trusted).

      Read recent research publications about the vulnerabilities of TOR and I2P and you’ll quickly realise how trivial it would be for the government. As with semi-decentralised designs, there are many ways to break such architectures and the government holds such capabilities.

      • ff00ff@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        9 months ago

        I don’t have the source for what I read right now, but TOR devs are known to work with the government.

        bro it was developed by them, for secure communication lmao.
        https://en.wikipedia.org/wiki/Tor_(network)

        The core principle of Tor, onion routing, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, to protect American intelligence communications online