this post was submitted on 05 Mar 2026
27 points (100.0% liked)

Privacy

4156 readers
261 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
 

Based on the bash varient terminalphone. Will be fully open source once development is complete.

Edit, now out https://gitlab.com/here_forawhile/onionphone

Find release page for v1.

you are viewing a single comment's thread
view the rest of the comments
[–] IceFoxX@lemmy.world 1 points 1 day ago* (last edited 1 day ago)

Now just find out who has the most entry and exit nodes.... Maybe think about why more and more has been taken off the darknet in recent years. Users are automatically more interesting because they seem to want to hide something, which is why they stand out from the crowd and feel safe in a compromised network.

1 De-anonymization has long been possible for states. It's not that fast, but there's no rush.

2 Privacy while you're on a silver platter with a few other Tor youngsters?!? The other way around is likely to be more effective... Clearnet, but you have to provide tons of entropy..

3 The entry and exit points will log every connection. This means that it can be evaluated over a longer period of time and used to investigate individuals. Then you have to ask yourself... whether you can prove that you were always acting legally before it comes to the burden of proof (as this has now become standard in the first instance).