Oh, I’m not talking just the roms. I mean everything. The emulation projects should be hosted on Tor and taking monero for donations. Etc. Apply that shit across the board. We need an alternative structure to their infrastructure where they get to pull the plug on anything that’s a threat to their profits, hegemony, or sensibilities. Parallel institutions, if you will.
oh… yeah, i guess… but TOR was created by ONI and you can be sure the US government runs most of the exit nodes… and I wouldn’t be the slightest bit surprised if they had the ability to turn up enough machines on the TOR network to do end-to-end connection tracing if there were things of interest
That’s the timing attacks I was talking about. Again, you keep everything in network on hidden services. Afaik, the onion routing’s layers keep everything moving and untrackable within that space. They would have to directly infiltrate the host they want or have a backdoor that still hasn’t been found… After what, 20 years now?
Plus, the more people that do use it, the less possible the timing attacks become on data that does leave the network.
Its probably decently expensive running those nodes, and so why do that, when you can just let someone else do it and then tap into German and French and US ISPs and get all the data anyways.
Oh, I’m not talking just the roms. I mean everything. The emulation projects should be hosted on Tor and taking monero for donations. Etc. Apply that shit across the board. We need an alternative structure to their infrastructure where they get to pull the plug on anything that’s a threat to their profits, hegemony, or sensibilities. Parallel institutions, if you will.
oh… yeah, i guess… but TOR was created by ONI and you can be sure the US government runs most of the exit nodes… and I wouldn’t be the slightest bit surprised if they had the ability to turn up enough machines on the TOR network to do end-to-end connection tracing if there were things of interest
That’s the timing attacks I was talking about. Again, you keep everything in network on hidden services. Afaik, the onion routing’s layers keep everything moving and untrackable within that space. They would have to directly infiltrate the host they want or have a backdoor that still hasn’t been found… After what, 20 years now?
Plus, the more people that do use it, the less possible the timing attacks become on data that does leave the network.
Its probably decently expensive running those nodes, and so why do that, when you can just let someone else do it and then tap into German and French and US ISPs and get all the data anyways.