Hacker Newsnew | past | comments | ask | show | jobs | submit | HackerNCoder's commentslogin

A stronger/faster Tor network.


Oh oh I know! 38% the US government, 36% individual donors (people like me), 16% private foundations, 5% other (not US) governments, 9% corporations and 1.5% "other"

https://blog.torproject.org/transparency-openness-and-our-20...


exactly. this isn’t to say that US agencies have backdoors written into TOR per se, but they have had TOR delay the patching of exploits in order to achieve the same end


And where is the proof of that?

Just because someone gives money to the Tor Project doesn't mean they get to tell them exactly what to do.


I'll put it like this: if parts of the US government are using exploits to de-anonymise TOR users, which is hard to dispute, and they're funding the TP, which they are and always have done, and they're the US government, which has never had any qualms about interfering with companies that aren't funded by them, never mind ones that are, why do you think they wouldn't delay patches in order to maintain an exploit?

the US collective funds TOR so that they can exert control over the field of play, or even just keep it in sight. perhaps that control is relatively small and only used in extremely high-profile cases, but that's more useful than nothing at all

it's a parenting paradigm: it's safer for your kids to drink at home than out at a bar or in a park somewhere, because at least at home you can keep an eye on things


> in no small part because running the server space needed usually incurs significant legal risks since congrats, you've now become a target for law enforcement to bust your door down and ask why an IP you own a machine on is being used to upload CP to the clearnet - few people want to deal with this scenario for blatantly obvious reasons

It only does if you set it up as an exit node.



Thank you. My brain is very damp but knew it was somewhere.


I hope that engagement was people telling you that in fact: No don't do that.

https://gitlab.torproject.org/tpo/community/team/-/wikis/Exp...


It's very... problematic. And Yasha clearly displays a lack of knowledge (or is knowingly lying) by making the claim that the Tor Project is tipping of the US government to vulnerabilities. Here is why: https://blog.erratasec.com/2018/03/askrob-does-tor-let-gover...

Some more Yasha stuff: https://micahflee.com/2014/12/fact-checking-pandos-smears-ag...


No, v3 isn't TLS either. TLS is only used as a connector between hops (so the client connect to a node using TLS, and the nodes connect to each other using TLS), but that is it. (I think, if I'm wrong do tell me. I didn't go check the spec)


OK, I checked and it's indeed still not TLS.

https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/r...

I think the main question would be: are there cryptographic attacks that a rendezvous server could do that wouldn't work against TLS?


Yea, there is only about 1000 (actually 1300, I just checked) exits - out of only ~6000 nodes total, the Tor network is actually kinda small.


So I guess the question is, how would one scale the number of nodes? Isn't that really what's needed then?


Yes, and it's needed. Running relays or exits helps the network.


You don't need (outdated) FOIA documents for that... Go to https://www.torproject.org/about/sponsors/ and you will see that they get money from the US government, if you want to know more about how much, go check the IRS 990 forms [1] or check the blog post that explains the 990, it also gives clear percentages on how much comes from where, [2]

[1] https://www.torproject.org/about/reports/ [2] https://blog.torproject.org/transparency-openness-and-our-20...


This part appears to be missing from the Tor website:

> 2,500 pages of correspondence — including strategy and contracts and budgets and status updates — between the Tor Project and its main funder, a Central Intelligence Agency spinoff now known as the Broadcasting Board of Governors (BBG). These files show incredible cooperation between Tor and the regime change wing of the US government.

So the documents acquired via FOIA requests are worth reading, and it's worth discussing why the US Intelligence community has such an active interest in propping up Tor.


It's pretty obvious that TOR is a helpful tool if you're doing spyshit in foreign countries.


That's what _they_ want you to think!

(finally I can say that and it may in fact actually be true for once! hahaha)


There is some C in the gitlab repo? https://gitlab.torproject.org/tpo/core/arti/-/graphs/main/ch...

But the CONTRIBUTING doesn't say you need to install a C compiler, so probably not? https://gitlab.torproject.org/tpo/core/arti/-/blob/main/CONT...


On single C file, 159 lines compared to 83000 lines of Rust. It's used to generate a cert for unittests, not sure why that's not done in Rust.


Rust already depends on LLVM


So ? The fact that rustc compiler uses a component written in C++ doesn't mean that even pure Rust projects have a C++ dependency. Follow any language's bootstrap chain and you'll find C somewhere (or a bootstrapping purists telling you that didn't properly bootstrap the thing), making the "some of the FOOLANG compiler is written in BARLANG" argument pointless.

You don't need a C or C++ compiler (not even Clang) to compile Arti. The rustc packages typically use a vendored version of LLVM.


Does it depend on clang? Because LLVM can't compile C by itself.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: