I_Byte | 2 years ago | on: Tell HN: Reddit now blocks VPN access via browser, 'old' subdomain included
I_Byte's comments
I_Byte | 2 years ago | on: Tell HN: Reddit now blocks VPN access via browser, 'old' subdomain included
I_Byte | 2 years ago | on: VeraCrypt: Free open-source disk encryption for Windows, Mac OS X, Linux
I_Byte | 2 years ago | on: Decimal to fraction
I_Byte | 2 years ago | on: A Grumman F11 Tiger Shot Itself Down (2021)
I_Byte | 2 years ago | on: I am dying of squamous cell carcinoma, and potential treatments are out of reach
From this I derive the motivation to work hard at what I do and ultimately try to contribute to the problems we face as a species before I pass. It also makes me appreciate the raw human connection that we can all experience: love, passion, friendship.
I may not be the one to light the altar of discovery that allows us to say, cure cancer or become a spacefaring species, but I will proudly carry the torch and pass it on.
I_Byte | 3 years ago | on: JWST Solid State Recorder
I_Byte | 4 years ago | on: Why offer an Onion Address rather than just encourage browsing-over-Tor?
However, that issue was only present in v2 hidden services. v2 has been depreciated in favor of the new v3 hidden service protocol (56 character long onion addresses) which is not vulnerable to this issue. This new protocol contains a full ed2559 elliptic curve public key in the onion address. The key in the onion address is used to derive what are called "blind keys". These "blinded keys" are then announced to the Tor network in such a way that nobody can recover the original public key without prior knowledge of the it, leaving them unable to establish a connection with the hidden service.
I have only briefly elaborated on how v3 hidden services work. If you are interested in a more in depth and technical explanation I encourage you to read:
[0] - https://gitweb.torproject.org/torspec.git/tree/rend-spec-v3.... [1] - https://gitlab.torproject.org/legacy/trac/-/wikis/doc/NextGe...
I_Byte | 4 years ago | on: Why offer an Onion Address rather than just encourage browsing-over-Tor?
You can scan the entire internet for open ports, you can't scan the Tor network for hidden services to connect to unless you already have the hidden services onion addresses.
I_Byte | 4 years ago | on: Why offer an Onion Address rather than just encourage browsing-over-Tor?
If you keep your onion address private then nobody can connect to your hidden service or even know that it exists. Simple as that.
I_Byte | 4 years ago | on: Twitter's new Tor onion service
I like your initial explanation sp332, I thought it was good so I elaborated on it.
I_Byte | 4 years ago | on: Twitter's new Tor onion service
Tor works by ensuring that there is three Tor relays between the Tor client (the software that connects to the Tor network) and the destination the Tor client is connecting to.
However, what happens when you want to establish a connection between two hosts who are both using Tor through the Tor network? Well, in that case both Tor programs establish a path through three Tor relays and link the last Tor relays in each of their separate chains together (if you are interested in learning about how each Tor program knows the others end point look up "Tor hidden service directory"). Now with both ends of their Tor relay chains linked, both hosts can communicate with each other securely and anonymously over the Tor network. (For example: you are using Tor browser to connect to a hidden service. Both Tor browser and the hidden service make a chain of three Tor relays each and connect the chains together through the last node of each chain. The Tor browser only knows the relays that it uses for its chain + the end of the hidden services chain. The hidden service only knows the relays in its chain + the last relay in your chain. Thus keeping you both anonymous.)
I hope this helps!
I_Byte | 4 years ago | on: Reverse-engineering a tiny 1980s chip that plays Christmas tunes
I_Byte | 4 years ago | on: Tor Browser 11.0
Also, Tor Project has had v2 address depreciation on it's roadmap for 2 years now, they have given hidden service operators plenty of time to prime their community for the v2 --> v3 switch. This gradual change is way better than scrambling to depreciate v2 addresses in response to some state actor publicly breaking the RSA keys of v2 hidden services.
> I thought I owned my tor domain
You may now, but if v2 is kept around soon you won't be the only one with the domains private key.
I_Byte | 4 years ago | on: It‘s been 9 years since Valve rolled out the Steam Linux beta
I_Byte | 4 years ago | on: “Every time there is discussion on Real AI enhance images I remember this image”
I feel as though the general message that the tweet threads author is trying to convey isn’t very clear. I wish they would clarify what they mean.
I_Byte | 4 years ago | on: Receiving FLEXlm Error -88,309: System Clock Has Been Set Back (2020)
https://web.archive.org/web/20210829234321/https://community...
I_Byte | 4 years ago | on: Windows 11 on Raspberry Pi 4
I_Byte | 4 years ago | on: Sarah Walker: “I'm done. This isn't fun anymore.”
I_Byte | 4 years ago | on: RFC for 700 HTTP Status Codes (2012)