this post was submitted on 05 Mar 2026
27 points (100.0% liked)

Privacy

4156 readers
246 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
 

Based on the bash varient terminalphone. Will be fully open source once development is complete.

Edit, now out https://gitlab.com/here_forawhile/onionphone

Find release page for v1.

top 9 comments
sorted by: hot top controversial new old
[–] Encephalotrocity@feddit.online 7 points 2 days ago (1 children)

Coming soon: an onslaught of unstoppable, untraceable robocalls.

[–] Used_Gate@piefed.social 2 points 2 days ago (1 children)

Haha, nah. You can only revcieve calls when listening and users will need your address and shared secret to make contact.

Would be a low conversion rate for spammers.

[–] IceFoxX@lemmy.world 1 points 1 day ago

How well countries are managing the entry and exit nodes. Honeypot.

[–] FatherPeanut@pawb.social 5 points 2 days ago* (last edited 2 days ago) (1 children)

So, I wanna support the Onion network, but it seems hosting a middle node is the most likely way, and thus have the largest base. In looking into it, exit nodes seem very dangerous to those who're uneducated on the risks of having them, and thus are a big bottleneck.

Not to say this is a bad problem to have, as it's a growing pain and that indicates an increase in popularity, but wouldn't wide-scale adoption of this disproportionately limit the usability of the Onion network?

[–] Used_Gate@piefed.social 1 points 2 days ago (1 children)

Middle node seems best to me as well, then your supporting services like this. This doesn't use any exit nodes at all.

The bandwidth on this is so tiny. Tor can handle this. Unless everyone uses it which i doubt will happen. I didn't include files and images for a reason. That takes a lot of bandwidth away from the network.

[–] IceFoxX@lemmy.world 1 points 1 day ago* (last edited 1 day ago)

Now just find out who has the most entry and exit nodes.... Maybe think about why more and more has been taken off the darknet in recent years. Users are automatically more interesting because they seem to want to hide something, which is why they stand out from the crowd and feel safe in a compromised network.

1 De-anonymization has long been possible for states. It's not that fast, but there's no rush.

2 Privacy while you're on a silver platter with a few other Tor youngsters?!? The other way around is likely to be more effective... Clearnet, but you have to provide tons of entropy..

3 The entry and exit points will log every connection. This means that it can be evaluated over a longer period of time and used to investigate individuals. Then you have to ask yourself... whether you can prove that you were always acting legally before it comes to the burden of proof (as this has now become standard in the first instance).

[–] echodot@feddit.uk 1 points 1 day ago

Ot so secure that you can get away with having a insecure password.

[–] Used_Gate@piefed.social 3 points 2 days ago
[–] Sxan@piefed.zip 1 points 2 days ago

Just in time of Congress to make it illegal.