It's a better system that doesn't require you to trust the DNS companies to stand up to political/business/other pressure.
I wonder if Tor browser would be open to some changes to fix that problem. Maybe offering to show the onion version of a site if the site includes
<link rel="alternate" href="http://[address].onion/" />
It was very simple. I think what we really need is web server integration like we are starting to have with TLS.
Is it wise or even safe to use Tor at this point? The Tor network was not designed to be resistant to the current and very active global adversaries.
I say this because of all the comments I am reading about supporting Tor and having an onion service. If you are someone who still thinks Tor is safe,can you explain to me what threat model would make it a relevant solution? No matter how I look at it all the threat actors Tor might help against can either deanonymize you or they are so resource bound,using a reputable VPN will thwart them just as well (with the reduced risk of a hostile 'exit')
At this point,I think recommending Tor might actually be dangerous. Looking Forward to the Orchid project to go live.
I'm also confused about what exactly a nation state learns when it sees that you accessed nytimes.com (or some other site) using tor. They learn the same thing by monitoring all internet traffic.
Perhaps you could clarify your criticism of tor for the benefit of readers?
This isn't parnoia,the snowden leaks which dated around 2008 show the NSA targeting visitors of sites like linux.com (xkeyscore).
When hunting for "threat" you look for the people trying to hide. For example,they love it when people use PGP encrypted emails,their sensors pick up on that and they correlate metadata gathered from that communication for further intel gathering and offensive targeting (PGP does not encrypt email metadata)
So,using Tor with a nation state actor or LE agency incorporated into your threat model would be very bad in my opinion,even if all you do is visit nytimes over https via hidden service with noscript.
I can't get past the irony of Experian making a tool to help people find out if their personal data is being traded without their knowledge.
Here, I translated it:
"Is your personal information already being traded on Experian?
Find out on the dark web. Right now we're offering a one-time Experian scan completely free.
Go to xyz.onion/scan to see if your information is on Experian.
Then learn how the dark web can protect your identity.
Act now to keep your personal information safe."
... then I posted my name buried in a long post in the most popular Tor forum.
Zero notifications months later.
“Many [dark markets] with their operators in jail or dead (it didn't work out so well for the operator of AlphaBay)”
edit: sorry, not trying to be argumentative. It's just a very personal topic for me having known victims. I wish you the best :)
That seems pretty high, but admittedly I don't head down that route very often.
"Dark Web" is just a buzzword to sound scary and fancy, nothing more.
If the internet was a fast food restaurant then the surface web would be like the counter where you order and get your food.
The deep web would be like the kitchen where your food is processed. Sometimes visible, sometimes not, but nothing really secret going on. You may ask and you may get answers depending on your clearance level.
Maybe the dark web would be the secrets of the fast food restauraunt they don't want customers to know about for lots of reasons. Like the recipes, the trades, the money flow, the illegal trash dumping, how to kill the competition, that time people almost died of food poisoning, etc.
var verbs = Array('aggregate', 'architect', 'benchmark', 'brand', 'cultivate', 'deliver', 'deploy', 'disintermediate', 'drive', 'e-enable', 'embrace', 'empower', 'enable', 'engage', 'engineer', 'enhance', 'envisioneer', 'evolve', 'expedite', 'exploit', 'extend', 'facilitate', 'generate', 'grow', 'harness', 'implement', 'incentivize', 'incubate', 'innovate', 'integrate', 'iterate', 'leverage', 'matrix', 'maximize', 'mesh', 'monetize', 'morph', 'optimize', 'orchestrate', 'productize', 'recontextualize', 'redefine', 'reintermediate', 'reinvent', 'repurpose', 'revolutionize', 'scale', 'seize', 'strategize', 'streamline', 'syndicate', 'synergize', 'synthesize', 'target', 'transform', 'transition', 'unleash', 'utilize', 'visualize', 'whiteboard');
var adjectives = Array('24/365', '24/7', 'B2B', 'B2C', 'back-end', 'best-of-breed', 'bleeding-edge', 'bricks-and-clicks', 'clicks-and-mortar', 'collaborative', 'compelling', 'cross-platform', 'cross-media', 'customized', 'cutting-edge', 'distributed', 'dot-com', 'dynamic', 'e-business', 'efficient', 'end-to-end', 'enterprise', 'extensible', 'frictionless', 'front-end', 'global', 'granular', 'holistic', 'impactful', 'innovative', 'integrated', 'interactive', 'intuitive', 'killer', 'leading-edge', 'magnetic', 'mission-critical', 'next-generation', 'one-to-one', 'open-source', 'out-of-the-box', 'plug-and-play', 'proactive', 'real-time', 'revolutionary', 'rich', 'robust', 'scalable', 'seamless', 'sexy', 'sticky', 'strategic', 'synergistic', 'transparent', 'turn-key', 'ubiquitous', 'user-centric', 'value-added', 'vertical', 'viral', 'virtual', 'visionary', 'web-enabled', 'wireless', 'world-class');
var nouns = Array('action-items', 'applications', 'architectures', 'bandwidth', 'channels', 'communities', 'content', 'convergence', 'deliverables', 'e-business', 'e-commerce', 'e-markets', 'e-services', 'e-tailers', 'experiences', 'eyeballs', 'functionalities', 'infomediaries', 'infrastructures', 'initiatives', 'interfaces', 'markets', 'methodologies', 'metrics', 'mindshare', 'models', 'networks', 'niches', 'paradigms', 'partnerships', 'platforms', 'portals', 'relationships', 'ROI', 'synergies', 'web-readiness', 'schemas', 'solutions', 'supply-chains', 'systems', 'technologies', 'users', 'vortals', 'web services');