![]() ![]() ![]() |
|
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
freitasm: It's very different "sharing"... The road sharing is the use of that resource at the same time as others, but you still use your own car.
With TOR you allow others to use your network connection, the one you are responsible for, to connect to other resources.
It's like you leave your car keys in the ignition. People can take the car for a ride on the road. They can even use it for a bank heist. You don't know though, until it comes back to bite you.
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
freitasm: To be fair, Onion nodes are used to forward connections and anonymize it under different layers (the "onion" part of it). Mostly your connection is used to erase the track that leads back to the user with the original request. Exit points are dedicated routers.
I wouldn't be comfortable with that kind of use of my connection anyway. The approach Zero Knowledge had was perfect: they ran their own hardware on partner ISPs, basically forwarding requests from node to node until it was anonymos.
Leave those things to the ISPs. While it can be used for good, the potential for bad is just too big.
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
nate:freitasm: It's very different "sharing"... The road sharing is the use of that resource at the same time as others, but you still use your own car.
With TOR you allow others to use your network connection, the one you are responsible for, to connect to other resources.
It's like you leave your car keys in the ignition. People can take the car for a ride on the road. They can even use it for a bank heist. You don't know though, until it comes back to bite you.
freitasm has got it in a nutshell. My viewpoint is that your internet connection is just that - yours. Should someone use it for something illegal, and your IP address is logged, would you not be liable, since it was done through your connection?
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
Linuxluver:
My connection is my shovel. Not a gun.
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
Linuxluver: The person doing evil is the one responsible. Sharing is not the crime here. If you make sharing the crime, you have just banned the Internet and ANY other thing we share. Think about it.
Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync | Backblaze backup
freitasm:Linuxluver: The person doing evil is the one responsible. Sharing is not the crime here. If you make sharing the crime, you have just banned the Internet and ANY other thing we share. Think about it.
I am not saying sharing is a crime. I'd love to share. I'd love to actually make money from sharing - perhaps running a Tomizone or FON hotspot. The problem is that I have no idea of who is using my shared connection, and if they do something wrong, the investigation will stop on me, and I'd have no way to prove that wasn't me doing something wrong. So I rather not be in the position of having to explain this to an investigator that may or may not be tech savvy.
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
_____________________________________________________________________
I've been on Geekzone over 16 years..... Time flies....
I've installed TOR on my Linux system and been playing with it. Firefox is the only app I've enable for TOR so far, but it certainly seems to work as claimed. Geekzone thinks I'm posting this from a PC in Germany.
|
![]() ![]() ![]() |