Hacker Newsnew | past | comments | ask | show | jobs | submit | ldehaan's commentslogin

Fail2ban would have been all they needed. It's what I have, works great.


Thanks, that helped, my kids just used our house LLM to understand the game :D


The Coming of Neo-Feudalism - Joel Kotkin (its a brainful)

Algorithns to live by - Brian Christian

Thinking Fast and Slow - Daniel khaneman

The Machiavellians: Defenders of Freedom - James Burnham


> Algorithms to live by - Brian Christian [and Tom Griffiths]

I think it would have been very difficult for Brian Christian alone to produce Algorithms to Live by: Tom Griffiths must have had a very strong presence in it.

It was Tom to give the "appetizer" presentation at TED: https://www.ted.com/talks/tom_griffiths_3_ways_to_make_bette...

--

By the way, I see that Brian Christian has published a The Alignment Problem - Machine Learning and Human Values, https://brianchristian.org/the-alignment-problem/

Has anyone read it?


Could you provide a summary of The Coming of Neo-Feudalism?


Austria is So lucky,these corporate fascist leftists need to get their asses beat.


The waves rise and fall, somehow individual yet a part of a whole. They fall back to the whole after they rise. You always were and will always be.


Thich Hanh wrote something very similar. He also compared death to the transformation of a cloud into rain: it is not an end but a transformation.


You are a real time experience machine, the stick holding up the tent, the force behind the wave. Eventually it collapses.


I didn't graduate high school and I can program in multiple programming languages, and picking up a new one is pretty easy. I had to convert "math functions" into code before I could understand what the symbols meant when I was learning how to write ML software.

Imo you learn the academic lingo, and it can make it easier to communicate with other programmers, but you can just pick it up. School is for chumps.


Wikipedia is trash, always has been. A small group of fanatics run that site and only allow information they deem acceptable. Using their information has always been a bad idea.


Haha "Anonymous" to your neighbor maybe, if they don't work for 5Is or a 3 letter agency, or Google, or Facebook, or the ccp or ... tor is compromised, you didn't Not get caught, you're not a target yet.


You're the second person in this thread to claim that Tor is compromised, without giving any explanation. This isn't productive discussion. Care to elaborate in what exact manner is Tor compromised? Bonus points for not hitting anything from the known list of speculative attacks. [1]

[1] https://www.whonix.org/wiki/Speculative_Tor_Attacks


It is just common sense.

Traffic correlation: All the large state actors are well capable of recording every single IP transaction between devices. You can create detailed correlation maps from these transactions. Considering that this wouldn't cost much for state actors to implement, one has to assume such traffic correlation systems currently exists.

Node compromise: It costs less than 5 dollars a month to create a TOR node. There are currently ~8000 TOR nodes/relays in existence. That is 40k USD per month (at most). Do you really believe state actors can't afford 40k USD per month to compromise the vast majority of TOR nodes? Even a single millionaire can compromise the vast majority of TOR nodes.

Another problem is that TOR is an outdated privacy tech. considering modern state actor capabilities. Mixer networks + network jitter is necessary to protect privacy at this stage, yet no such project exists yet.

TOR is not a good option for privacy. Currently only valid option for privacy is external Wi-Fi jacking and ensuring you don't send any private info like CPUID.

Or alternatively, you can hack routers/computers and put your own TOR nodes in them, then you can only use these known nodes.


Just more FUD being spewed from someone who knows nothing about Tor.

It's Tor not TOR FYI.

https://support.torproject.org/about/why-is-it-called-tor/

> Note: even though it originally came from an acronym, Tor is not spelled "TOR". Only the first letter is capitalized. In fact, we can usually spot people who haven't read any of our website (and have instead learned everything they know about Tor from news articles) by the fact that they spell it wrong.

We all know which one you fall under.

> Node compromise: It costs less than 5 dollars a month to create a TOR node. There are currently ~8000 TOR nodes/relays in existence. That is 40k USD per month (at most). Do you really believe state actors can't afford 40k USD per month to compromise the vast majority of TOR nodes? Even a single millionaire can compromise the vast majority of TOR nodes.

As someone who has ran a Tor exit node for 5+ years, lolol at this statement. Pure ignorance.


Thank you for trying to defend Tor. Can you share some of what the parent was ignorant to?

Does it cost less than 5 dollars a month to create a Tor node?


Common sense is not the same as actual understanding. Tor is not limited to exit nodes, the most valuable thing is the onion network with millions of users. Both are being actively monitored for anomalies by the devs, with multiple thwarted attempts to subvert it in the past.

> TOR is not a good option for privacy. Currently only valid option for privacy is external Wi-Fi jacking and ensuring you don't send any private info like CPUID.

What is known for sure is that high profile drug dealers are using it without being caught for years. All known cases are related to either poor OPSEC, client/server 0-days, classic real-life investigations, or known attacks Tor can't protect from (correlation of the large amounts of onion server traffic, for example, which is not that easy as you make it sound). It is entirely possible that somebody was caught using unknown or unavoidable attacks, but no such case is known for sure at this time.

> Mixer networks + network jitter is necessary to protect privacy at this stage, yet no such project exists yet.

Tor does use packet shuffling and delays to protect from timing attacks to an extent. It's less advanced than I2P which also mixes the traffic, but has a much larger client pool and a unified browser used by nearly everyone, which provides users with huge buckets to blend into. There are also several delayed onion message services available.

Of course it is susceptible to certain kinds of attacks you have to be aware about. This isn't the same as "Tor doesn't provide anonymity" or "Tor is compromised".


People who have used Tor who have been deanonymized in every single case that we are aware of made other mistakes ("altoid", "pimp_alex_91@hotmail.com", etc) or the vulnerability was in an outdated version of Tor Browser (basically Firefox). Of course you can say there was parallel construction, maybe there was in some cases, but if they didn't make those other mistakes there would be no case that could be brought against them because no one is going to be convicted on the basis of some probabilistic attack against Tor that the government doesn't want to reveal to begin with.


We don't know that these other op sec issues weren't cases of "parallel construction"


Yeah of course it is. And your phone mic is always listening.


How do you think Siri works? I have a hint to you: it does not scan your brain waves.


> tor is compromised

Is it?



These are just 0-days in the Tor Browser/Firefox, not Tor. While in practice Tor Browser cannot be decoupled from the network (it provides users with large enough crowd to blend into), it can be surrounded with additional security layers. If you're a high-value target worthy of wasting a 0-day on you, running Tor Browser on a general-purpose system might be a bad idea; there are distros like Whonix specifically tailored for secure communication - they are far less vulnerable to this kind of attack.


None of those have to do with vulns in Tor. Try again.


Dude why do you guys keep reading this trash company's articles? These corporatists are pay to print. They'll print anything you pay them to.

Stop reading this garbage.

I strongly suggest checking out your weekly media assassination, tune in to the best pod in the universe: No Agenda

https://podcastaddict.com/podcast/4175796


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: