03/26/2019 (Tue) 05:44:04
aww man you're gonna make me look it up?
Okay, I give. It's not on torch and I can't find it on the underdir list. What's the onion address? I hope it's not a V3 address.
I can't seem to get to V3 sites anymore. They used to work. I think the Tor Project is kind of losing its way. There's a proxy bypass that was reported to them awhile back. As far as I know it still exists, and some visitor's real IP addresses can be harvested by signing 32-bit windows exes, hex-editing to replace the cert host with a bogus one that you can tcpdump inbound traffic to, renaming them to a PNG file linked to by a salacious thumbnail, then waiting for a cert host DNS lookup to come directly from the visitor's PC when they click on the thumbnail. What they did instead was "obsolete" 32-bit platforms that it worked on. Now they're pushing V3. Why? Is there something broken with V2? If there's something wrong in previous stuff, fix it or at least disclose it instead of just leaving it out there. Jeez.
Anyone who cares does this anyway, but it never hurts to say it: If you use the TBB in any form, make sure you have Firefox firewalled and unable to send anything at all, not even ICMP or Netbios, to anything other than 127.0.0.1.
Anyway, if someone sets up a hidden site and they're doing a V2 to V3 address redirect, it looks like some people aren't going to be able to connect.
Sorry for the long post. Got off on a bit of a tangent there.