this post was submitted on 11 Feb 2026
528 points (99.4% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

69162 readers
71 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

We heartily recommend visiting the free port of freemediaheckyeah (aka FMHY) while you sail the high seas, for all the freshest links the ocean has to offer.

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

FUCK ADOBE!

Torrenting/P2P:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] chicken@lemmy.dbzer0.com 11 points 3 months ago (1 children)

Maybe this will prompt some people to learn to use Tor

[–] emeralddawn45@lemmy.dbzer0.com 8 points 3 months ago (3 children)

Is TOR not completely owned by the feds? I remember even back in the silk road days people were saying the FBI owns every endpoint. Is TOR still practical? I truly don't know I'm asking for input.

[–] veniasilente@lemmy.dbzer0.com 7 points 3 months ago* (last edited 3 months ago) (2 children)

If enough people set endpoints, then the feds will own a fewer proportion of the total. AKA: we have to be the change we want to see in the world.

[–] emeralddawn45@lemmy.dbzer0.com 10 points 3 months ago (1 children)

Yeah but even if you could get it down to like 50% why would anyone want to take that risk? Idk I might be misunderstanding something about how TOR works but it seems no more anonymous than the clearweb from what I've heard.

[–] axx@slrpnk.net 6 points 3 months ago

I'm not sure you are fully aware of the Tor threat model. The exit node is not supposed to be specifically trusted.

[–] muusemuuse@sh.itjust.works 1 points 2 months ago (1 children)

TOR is not to be trusted. Everyone else has been working on strengthening their security while TOR has been caught numerous times weakening theirs.

Use i2P and sneakernet. Fuck tor.

[–] veniasilente@lemmy.dbzer0.com 1 points 2 months ago (1 children)

Oh i2P is definitively a better option where you can have it. However, Tor is somewhat more approachable as of current: we have for example Tor Browser for the masses, whereas I at least haven't heard of any sort of "I2P Browser" at least for Firefox. Of the three options, Tor is the only one I know that is "portable" (you don't need to be able to make admin-level network changes to use it).

[–] muusemuuse@sh.itjust.works 1 points 2 months ago

I2p doesn’t have a browser setup extension or something last I checked. TOR browser has been caught lying and degrading security repeatedly. A big part of the problem with tor is the damn browser.

[–] chicken@lemmy.dbzer0.com 5 points 3 months ago* (last edited 3 months ago) (1 children)

In this scenario it wouldn't matter because the idea is to use it as a way to access a website that would otherwise be accessed over clearnet but has become inaccessible. But if they made an onion site endpoints wouldn't be used anyway afaik since the traffic doesn't leave the network. Now that I'm thinking about it there might be some issues with practicality doing it this way if they have a big volume of traffic, but there are options for routing around censorship that don't involve DNS.

[–] emeralddawn45@lemmy.dbzer0.com 1 points 3 months ago (1 children)

I don't understand this comment, can you elaborate? Why wouldn't the endpoints be used? This is probably my ignorance but I thought all traffic was routed through the onion network and then eventually to the end device, but all that extra routing can't help you if the Feds control the last stop before whatever server you're trying to contact.. are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

[–] chicken@lemmy.dbzer0.com 5 points 3 months ago* (last edited 3 months ago) (1 children)

are you saying that if a site is entirely hosted on TOR then no information makes it to an endpoint?

Basically yeah. My understanding is that exit nodes are special and using them is a vulnerability, but you only use exit nodes to access clearnet sites from Tor, and you are less vulnerable if you aren't doing that and rather going to sites with .onion urls. Which, unfortunately I can't find one for this website, but I'm thinking they'd probably consider making one if they can't maintain any clearnet domains anymore.

[–] emeralddawn45@lemmy.dbzer0.com -2 points 3 months ago (2 children)

I don't think that's true and a very cursory google suggests (to me at least) that im right and I don't have time to parse a bunch of sources right now. So idk if anyone else could chime in with specific technical details or a source id appreciate it.

[–] chicken@lemmy.dbzer0.com 4 points 3 months ago (1 children)

https://onionservices.torproject.org/technology/properties/

Usually, whenever a Tor user is surfing around, their connection exits the Tor network at some point to reach a destination on the internet.

But with Onion Services, the communication from one point to another happens entirely inside the Tor network, all the time.

[–] emeralddawn45@lemmy.dbzer0.com 2 points 3 months ago (1 children)

I guess I was holding onto some fearmongering from the silk road days when i swear everyone was saying not to use TOR because it was all owned. It's good to know that onion addresses can be accessed without revealing any info. If you accidentally navigate from a Tor site to a clearweb site how much is potentially given away, assuming the exit node is compromised?

[–] chicken@lemmy.dbzer0.com 2 points 3 months ago

I wouldn't go as far as claiming it doesn't reveal any info, all I'm saying here is that there are more security guarantees, and demonstrated security failures of Tor related to adversarial exit nodes don't necessarily apply to onion services. I don't really know much beyond that.