- cross-posted to:
- [email protected]
- technology
- cross-posted to:
- [email protected]
- technology
All the recent dark net arrests seem to be pretty vague on how the big bad was caught (except the IM admin’s silly opsec errors) In the article they say he clicked on a honeypot link, but how was his ip or any other identifier identified, why didnt tor protect him.
Obviously this guy in question was a pedophile and an active danger, but recently in my country a state passed a law that can get you arrested if you post anything the government doesnt like, so these tools are important and need to be bulletproof.
No
Any even if it were what else would you use? There is no other software that comes close
I2P?
I2p has some weaknesses
everything has some weaknesses
In this case it is worse than Tor can be. In the future it is likely to get better but for now it is vulnerable to De-Anonymization attacks. Also it is very easy to see if someone is using i2p and that alone can get you into trouble.
the same can be said for tor
Tor isn’t perfect. Nothing is
The problem with i2p is that it could put people in serious danger if you live in a country with aggressive anti free speech and privacy laws