I made Tor posts when the Tor domain was down.
Zig Forums Tor Onion is FUCKED
IIRC sometimes one post gets through, maybe when the server didn't see the IP from that exit node before. Try to make a second post and you'll be faced by that picture.
If you made two or more consecutive posts and that message didn't show up then your Tor install probably isn't working and you're just sending over the clearnet.
Or maybe you're just a fed trying to plant disinfo. They're running a shilling campaign where they try to pretend Tor posting isn't fucked.
What's the point when you can literally check in less than 2 minutes? Anyways, I posted over clearnet last week because the onion domain was shut down for some reason and they probably temporarily allowed Tor over clearnet because of that.
No, it was just blind luck. Occasionally you exit from a node that isn't in the Tor exit node blocklist, allowing you to post. A year or two ago you could post from Tor semi-reliably just by changing your circuit, and within five attempts you'd hit an exit node that would allow you to post. That technique is next to useless now, because the blocklist coverage is almost total.
It does when your guard node also belongs to (((them)))
their use on Zig Forums is to evade bans
what's the point of that? both leak your location, and public WiFi will record your MAC, SIM network will record your IMEI and phone number
if it was, you wouldn't be able to access it at all. but we can access it every time, it's just rate limited to very low throughput, just like if CIA niggers were doing time and packet correlation attacks
another solution is to use Tor + proxy, but it has many drawbacks
It's trivial to change MAC. OpenBSD's ifconfig even lets you set it to a random value.
>It does when your guard node also belongs to (((them)))
Yeah, good point. It's actually possible to use more relays than default but I've heard it might break anonymity.
I guess. I don't use other boards so I don't get banned.
It might leak your city but not necessarily your identity, depending on how many users there are on it and what confidence in the ID you consider deanonymization.
This. Tails does it by default.
IMEI might depend on the modem.
Depends on the intensity of the attack.
Good point. Slowing down packets in a given pattern might make correlation attacks much easier.
Is that the narrative shills are pushing now? That picture I posted is obviously after the hidden service went down, or do you think I keep screenshots of random error messages?
Most people don't use Tor and wont download it just to check this.