this post was submitted on 05 Mar 2026
27 points (100.0% liked)

Privacy

4156 readers
261 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
 

Based on the bash varient terminalphone. Will be fully open source once development is complete.

Edit, now out https://gitlab.com/here_forawhile/onionphone

Find release page for v1.

you are viewing a single comment's thread
view the rest of the comments
[–] FatherPeanut@pawb.social 5 points 2 days ago* (last edited 2 days ago) (1 children)

So, I wanna support the Onion network, but it seems hosting a middle node is the most likely way, and thus have the largest base. In looking into it, exit nodes seem very dangerous to those who're uneducated on the risks of having them, and thus are a big bottleneck.

Not to say this is a bad problem to have, as it's a growing pain and that indicates an increase in popularity, but wouldn't wide-scale adoption of this disproportionately limit the usability of the Onion network?

[–] Used_Gate@piefed.social 1 points 2 days ago (1 children)

Middle node seems best to me as well, then your supporting services like this. This doesn't use any exit nodes at all.

The bandwidth on this is so tiny. Tor can handle this. Unless everyone uses it which i doubt will happen. I didn't include files and images for a reason. That takes a lot of bandwidth away from the network.

[–] IceFoxX@lemmy.world 1 points 1 day ago* (last edited 1 day ago)

Now just find out who has the most entry and exit nodes.... Maybe think about why more and more has been taken off the darknet in recent years. Users are automatically more interesting because they seem to want to hide something, which is why they stand out from the crowd and feel safe in a compromised network.

1 De-anonymization has long been possible for states. It's not that fast, but there's no rush.

2 Privacy while you're on a silver platter with a few other Tor youngsters?!? The other way around is likely to be more effective... Clearnet, but you have to provide tons of entropy..

3 The entry and exit points will log every connection. This means that it can be evaluated over a longer period of time and used to investigate individuals. Then you have to ask yourself... whether you can prove that you were always acting legally before it comes to the burden of proof (as this has now become standard in the first instance).