Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Mister M. T. Sack (thatbrickster@shitposter.club)'s status on Friday, 16-Feb-2018 02:24:00 EST Mister M. T. Sack Mister M. T. Sack
    A VPN is also useful on unencrypted public WiFi. I have seen nothing suggesting Tor would suffice there so far.
    In conversation Friday, 16-Feb-2018 02:24:00 EST from shitposter.club permalink
    1. ay (ayy@gs.smuglo.li)'s status on Friday, 16-Feb-2018 02:28:12 EST ay ay
      in reply to
      @thatbrickster I'm fairly certain Tor would handle that correctly (the traffic goin through Tor anyway, obviously if you have some program sending shit in the clear that wouldn't be protected).
      In conversation Friday, 16-Feb-2018 02:28:12 EST from gs.smuglo.li permalink
      1. Mister M. T. Sack (thatbrickster@shitposter.club)'s status on Friday, 16-Feb-2018 02:31:36 EST Mister M. T. Sack Mister M. T. Sack
        in reply to
        @ayy I've not seen any documentation, etc. that suggests that. SSL/TLS traffic is a must but the part before all of that is important too.
        In conversation Friday, 16-Feb-2018 02:31:36 EST from shitposter.club permalink
        1. ay (ayy@gs.smuglo.li)'s status on Friday, 16-Feb-2018 02:36:18 EST ay ay
          in reply to
          @thatbrickster Tor operates like this (when accessing clearnet):
          user - first tor node - middle tor node - exit node - server.
          Tor assumes that any single tor node, or any single path between computers on the path can be compromised (but not more than one). In the event of such an attack, the attacker can learn of the traffic, or of the users identity. But not both of those things.
          In conversation Friday, 16-Feb-2018 02:36:18 EST from gs.smuglo.li permalink
          1. Mister M. T. Sack (thatbrickster@shitposter.club)'s status on Friday, 16-Feb-2018 02:41:09 EST Mister M. T. Sack Mister M. T. Sack
            in reply to
            @ayy The important bit is the part between user and AP. Tor can only protect the data once it reaches the entry node.
            In conversation Friday, 16-Feb-2018 02:41:09 EST from shitposter.club permalink
            1. ay (ayy@gs.smuglo.li)'s status on Friday, 16-Feb-2018 02:42:47 EST ay ay
              in reply to
              @thatbrickster nah it's encrypted
              In conversation Friday, 16-Feb-2018 02:42:47 EST from gs.smuglo.li permalink
              1. Mister M. T. Sack (thatbrickster@shitposter.club)'s status on Friday, 16-Feb-2018 02:50:10 EST Mister M. T. Sack Mister M. T. Sack
                in reply to
                @ayy [citation needed]
                In conversation Friday, 16-Feb-2018 02:50:10 EST from shitposter.club permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.