found this gem and watched in full, great talk, great pace, concise. You can feel this guy wants to make a difference, thanks for developing tor
@martinfrost37036 жыл бұрын
Thanks for this presentation, Roger. As a long-time user of Tor, I've grown used to its features (and nuances!) though was never one to run a relay. This is changing as of today.
@apophis52136 жыл бұрын
17 feds disliked this .
@geoffreypotts59625 жыл бұрын
20 feds*
@bobbarker51025 жыл бұрын
@@geoffreypotts5962 27 feds*
@Ниодин-ж1е4 жыл бұрын
@@bobbarker5102 28 feds*
@austinstevens77364 жыл бұрын
Code Zero back to 27
@RuffianSoldier3 жыл бұрын
@@austinstevens7736 still at 27! nice!
@dabay2006 жыл бұрын
Dingledine is not only a genius but he is really funny too.
@CoasterMan13Official2 жыл бұрын
I love Tor so much.
@MikeTrieu7 жыл бұрын
Thank you, torproject, for finally moving away from the horrible legacy mess that used to be onion services to ed25519 addresses! Fuck the NIST curves and their "nothing up our sleeves" bullshit!
@0xstev37 жыл бұрын
finally! I've been waiting to watch this forever...
@BigHonkinGoose5 жыл бұрын
What an amazing speaker. I love the passion.
@nineh97397 жыл бұрын
did someone video and upload the question and answer time?
@daddyfiverrankz90975 жыл бұрын
This was really interesting. Just waiting for the postman cheers!
@Master_Ed4 жыл бұрын
Oh when I first saw the DEFCON bit I thought this was going to be about war or something, never mind
@FusionDeveloper7 жыл бұрын
It would be really cool, if somehow, you could split all traffic between different paths of nodes (meaning, the nodes would only see half of all batches of the encrypted data). Imagine if the first half of a message was sent through 1 path and the second half of a message was sent on an entirely separate path, so neither path would ever see the full message encrypted and neither path would be aware of the other path. Of course you would have to send the full URL to both groups (which defeats most of the purpose), but maybe group 1 could send back the first half of a website and the second group could send back only the second half (with a little overlap for error correction), that way, someone watching nodes, would have to watch more than 1 path, otherwise, they wouldn't be able to know everything. A more secure way, would be every other bit, but that sounds like a messy disaster. The more I think about this, the more problems and uselessness the idea seems, but I'm going to post this comment anyway, because someone might understand this better than me and see an opportunity for routing traffic through split routes in a way that would be feasible and beneficial. I'm a Windows Developer, I will check out that website and see if I have anything I can contribute (There is a 0.000000000000000000000000000001% chance I will understand any of it, but security is one of my favorite topics).
@verymuchgoodgaming1327 жыл бұрын
Jay H Isn’t this already the case with all packet-based protocols (which would include TOR afaik)?
@austinstevens77364 жыл бұрын
packet loss would fuck you
@recklessroges6 жыл бұрын
If TOR is King does that make i2p the queen?
@AssWhole-u6d6 жыл бұрын
I would be in prison if it wasnt for this technology!
@pward176 жыл бұрын
Your channel has no content... you'll be fine.
@AssWhole-u6d6 жыл бұрын
That has nothing to do with it
@jaykingston21716 жыл бұрын
Ass Whole Do u boot tails?
@AssWhole-u6d6 жыл бұрын
Whonix my man! Loving the new version!
@unfa006 жыл бұрын
If you're serious, I think it's very inconsiderate of you to share that information publicly.
@bibibibi94576 жыл бұрын
WOW, YOU'RE THE COOL EMPEROR! THANK YOU
@epiphany30216 жыл бұрын
thats so rude of that guy at the end to walk up and grab the mic like that. Like have some respect.
@nohupt36416 жыл бұрын
these talks are scheduled, and I've noticed a lot are 40 minutes long, so when they go over 40 min someone's gotta cut them off
@erilgaz6 жыл бұрын
He probably had an announcement of his own to make. Right before the video cuts, you can see him take the microphone to his mouth.
@Gunth0r6 жыл бұрын
"I know the people who run two third of the relays" wait, wut? So essentially, we're still just trusting you?
@SoraKing116 жыл бұрын
Sophrosynicle you're trusting he and *everyone he knows* aren't aggregating literally all the data they pass with the intent of subverting the effort they put a lot of money and work into
@percyblakeney37435 жыл бұрын
@Mr Maestro 87505 maybe he meant paid and fed.
@tjij-mbai4 жыл бұрын
Lolest 😂
@leendert11002 жыл бұрын
Can't find RT , censorship ?
@johnhammer86684 жыл бұрын
Dingledine is cool dude
@andrewkamoha4666 Жыл бұрын
21:02 Tor Traffic: "3% is onion services. 97% is ordinary sites like CNN, Wikileaks, cat pics ..." How does he know? Shouldn't Tor traffic be anonymous ???
@maximela-x568 Жыл бұрын
The thing is you dont know who is contacting the website but with an exit node you can tell what is being contacted + he said that he know 3/4 of the owners of tor relays and he mentioned that they got the stats in a secure way
@Dragiux4 жыл бұрын
Remove javascript.
@t3mpl3guardian6 жыл бұрын
Myth #4 is true. Then it's not a myth.
@MichaelBerthelsen6 жыл бұрын
T3MPL3GU4RD14N Myths can also be understood as 'things a majority of people think they know, but don't necessarily know', I think that's the meaning he's going for.
@paaao6 жыл бұрын
The problem with TOR, is it relies on private computers (users) joining in droves to pass traffic. The more users it has, the more secure. Here’s the catch... the NSA knows this, and has unlimited resources. They join the network too. They purposefully add relays in massive amounts in order to do their own traffic analysis. When %10 of the relays are legitimate users, and %90 are intelligence agencies, primarily NSA, sniffing traffic, piecing meta-data back together is trivial. It doesn’t fucking work kids. Nice idea, back to the drawing board. TOR (at least the over-all concept) was invented by the US govt. It works, until the intel agencies want to find something, and then, they CAN. They can and do, piece the in/out metadata back together to make sense of who’s who, and who’s where.
@haveaniceday79504 жыл бұрын
Exactly. And there are more reasons too. If they wanna know who you are they will find you. But the question is, does tor thwart the massive bulk surveillance?
@paaao4 жыл бұрын
Kyle A, I highly doubt it. For one, the massive surveillance runs on algorithms to capture and flag key words, thoughts, metadata connections, etc... TOR is just another zone to process, and the agencies have nodes all over it to allow them to capture and hold data if they ever have a need to follow up and pinpoint something. Most of the stupid shit people do, doesn’t even make the bottom of their priority list.
@justsomedude46604 жыл бұрын
You don't know how these agencies work do you? To start a server they have to be approved etc and have to paperwork and stuff. They don't have the resources to create 90% of the nodes.
@paaao4 жыл бұрын
@@justsomedude4660, It might not be %90, but it's damn close. You have more than just the USA agencies doing this, and they all have the resources. There are more fake nodes than real out there.
@paullees66874 жыл бұрын
@@paaao if by damn close you mean nowhere near that number then yeah. Maybe back in 2008 there were a ton of fake nodes. But the network was also tiny as hell back then. You must be one of them "I don't use encryption to keep safe" types
@amandamate91177 жыл бұрын
i have heard that Tor is "broken" but still alright to use. And Ricochet is old
@DxBlack7 жыл бұрын
Your mom is old...bet you still buy her gifts and show her respect when she gets better with age though. >_>
@LightningSnake7 жыл бұрын
Google is old, Microsoft is old, still, they are relevant
@amandamate91177 жыл бұрын
but he missed to give arguments againts the "tor is broken" for example real technical data why it is NOT BROKEN. he just skipped quickly that part.... and ricochet is not updated that often as Google or Microsoft
@amandamate91177 жыл бұрын
dueldu, what about the 1 million dollar payed to the Carnegie Mellon to unmask Tor users?
@KucheKlizma7 жыл бұрын
I mean business software has security holes too. Pretty hard to defend against 0day exploits. It's why vulnerability management is important. Like the guy said, it's a never-ending battle. Just cuz a software had a hole at some point in time, doesn't make it "broken".
@18iser5 жыл бұрын
Not really a technical talk but whatever.
@JT-zv2ff6 жыл бұрын
( ( WARNING WARNING ) ) Tor has been compromised do not use
@PassFissn6 жыл бұрын
bunch of what in this comment section i find it hard to believe