lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

70
active users

#Tor

11 posts8 participants0 posts today
Replied in thread

@JessTheUnstill @bohwaz @punkfairie @ajsadauskas @tomiahonen @fuchsiii Exactly...

Coincidentially, that's why #Android (and #iOS) doesn't let users have #root access because billions of devices owned by mostly "#TechIlluterates" thathardly get #SecurityUpdates would be an even bigger risk if they didn't boot a locked-down #ROM image, thus only allowing for #malware in user-privilegued userspace!

Cuz having a mobile OS that shoves everything through #Tor and only allows #userspace-Apps in the form modern web technologies would be a big #security and #privacy gain.

  • Not to mention #amd64 is on it's way out and inevitably they gotta have to transition to supporting #arm64 and eventually #RISCv-#64bit at some point.
#amd64#arm64#riscv
Continued thread

This is undoubtedly the most promising Post-Quantum TLS deployment situation I have seen for #Tor since we started discussing it more actively in the team. Very exciting!

I hope that OpenSSL 3.5, when released, will make it into #Debian Trixie. That would make deployment of this so much more snappy and easy for the Tor network to upgrade, but that may be dreaming. The timelines here look quite difficult for that to happen, but let's hope.

Continued thread

OpenSSL, unlike BoringSSL, did not require us to make any additions to our codebase (BoringSSL required the PQ-KEM to be enabled explicitly via a function call): the ML-KEM is enabled by default, which will do wonders for adoption as OpenSSL 3.5 gets bundled in more and more OS distributions over time.

However, we did need to modify #Tor slightly to be less conservative with which TLS cipher suites it is willing to use. I will talk with the team about what we do here to get this fixed soon.

Trying out the Post-Quantum TLS feature (called ML-KEM) in #OpenSSL 3.5-beta1 and #Tor was a success! 🥳

The experiment is using the same setup as we did with #BoringSSL back when they enabled the Kyber768/x25519 TLS 1.3 group: we use a Tor binary, compiled against a PQC-enabled lib(ssl|crypto), to run a Bridge Server locally and connect a local Bridge Client to the server.

The branch used for this experiment is available from gitlab.torproject.org/ahf/tor/

Continued thread

Lo and behold, #OpenSSL 3.5 (their upcoming LTS release) will come out here at the beginning of April, and it does indeed support some of these hybrid PQC schemes. Their recent beta2 announcement can be read here: openssl-library.org/post/2025- and their roadmap is at openssl-library.org/roadmap/in

Very excited by this work. Big kudos to the OpenSSL Team here! 🥳🎉 Already planning on giving this a spin with the C implementation of #Tor later this week to see how it goes!

OpenSSL Library · OpenSSL 3.5 Beta Release AnnouncementThe OpenSSL Project is pleased to announce that OpenSSL 3.5 Beta1 pre-release is released and adding significant new functionality to the OpenSSL Library.

It is the year two thousand and twenty five CE and these basic-ass chumps are still out here equipping governments to target journalists and human rights defenders and immigrants and abortion seekers, and then patting themselves on the back for helping law enforcement (the... good... guys??) catch "bad guys" and kidnap them and lock them in torture dungeons. Congrats, assholes, great job, the Führer will be very proud of you. CHRIST.

"Identifying IP addresses is central to thwarting attacks and helping law enforcement put the bad guys out of business and in jail."

scworld.com/feature/novel-tech

<p>Adobe Stock</p>
SC Media · Novel technique can unmask up to 70% of crooks hiding behind VPNs, proxies, TorTechnique claims it can unmask crooks hiding behind VPNs, proxy servers and Tor browsers with up to 70% reliability.

The #CIA "Found" The #Ark Of The #Covenant... (not really)#sog #yt

youtu.be/GVJkcSEpDBw

Check out this interesting documents on the CIA's website! 🕵️‍♀️➡️cia.gov/readingroom/docs/CIA-R As it's a .gov site, some may prefer using a VPN or Tor. Just a thought! 🤔 #CIA #GovDocs #VPN #Tor #PrivacyMatters

cia.gov/readingroom/docs/CIA-R
#someordinarygamers

Dude, just cite your sources so that folks can follow your presentation. :/

#HELP

I just received a concerning email from the OTF (@opentechfund.bsky.social) stating that a major source of their funding is in jeopardy.

If you care about open-source, anti-censorship, or the open internet, please consider supporting one of the projects they fund.

#FOSS #OpenSource #TechNews
#USPol #Politics #News #PoliticalNews
#NetNeutrality #EFF
#Wikimedia #Signal #SignalApp
#TOR #TAILs #OpenVPN #VPN #LetsEncrypt #HTTPS #SSL
#Censorship #AntiCensorship

opentech.fund/projects-we-supp

Replied in thread

@signalapp It's not #disinfo when one points out that you demand #PII aka. #PhoneNumbers from Users and that is literally a architectural vulnerability, alongside your #proprietary & #Centralized #Infrastructure.

Not to mention the lack of @torproject / #Tor support with an #OnionService or the willingness to fulfill #cyberfacist "Embargoes" or shilling a #Shitcoin #Scam named #MobileCoin!

  • #KYC is the illicit activity!!!

And don't get me started on the #cyberfacism that is #CloudAct.

  • If you were secure, criminals would've used your platform so hard, it would've been shutdown like #EncroChat and #SkyECC.

I may nit have allvthe.evidence yet, but #Signal stenches like #ANØM: #Honeypot-esque!

Kann die #EU oder wenigstens #Deutschland bitte jetzt einspringen? Wenn der #OTF (Open Technology Fund) in Schwierigkeiten ist, wird das für viele Menschen weltweit zum Problem.

#Tor ist essenziell für digitale #Freiheit – für #Journalistinnen, Aktivistinnen, Bewegungen für #Demokratie, z. B. gerade wieder in der #Türkei.
#Signal wurde (mit)gefördert.
#LetsEncrypt ist aus dem sicheren #Internet nicht mehr wegzudenken.
#FDroid, #VPN-Dienste und viele weitere freie Tools hängen da mit dran.

Stellt euch vor, all das wird wegen ein paar lumpiger Dollar kaputtgespart – aus ideologischer Laune heraus.

Wir sollten jetzt handeln:
• Diese Projekte fördern.
#OTF retten.
• Und fordern, dass zentrale Dienste, Entwicklung und Infrastruktur verstärkt in die #EU verlagert werden – so wie sie bisher oft in den #USA konzentriert waren.

Zeigen wir ihnen, wie sich #Trump gerade selbst rücklings ins Knie schießt.

https://www.heise.de/news/Nach-Trump-Dekret-Kampf-um-US-Foerdermittel-fuer-Tor-F-Droid-und-Let-s-Encrypt-10328226.html
heise online · US-Behörde stoppt Gelder für Let's Encrypt und Tor ‒ Open Tech Fund wehrt sichBy Sven Festag

Por aquí les dejo mi dirección SimpleX Chat, para darle movimiento a este tan buen mensajero. Que se une a otro que vengo probando.

Por si no lo conoces @simplex protege la privacidad de tu perfil, contactos y metadatos, ocultándolos de los servidores de la plataforma SimpleX y de cualquier observador. No tiene identificadores así que el resto puedes revisar simplex.chat/es/

Dirección: simplex.chat/contact#/?v=2-7&s

uuuh der Talk zu #tor -nodes von @senf auf den #clt2025 ist sogar schon online :)

media.ccc.de/v/clt25-135-tor-n

Und der Talk von Constanze zum #Rechenwerk und dem #Relaiscomputer ist auch schon online!

media.ccc.de/v/clt25-120-bau-e

Danke an alle Helferinnen und Helfer, die diese schöne Veranstaltung möglich gemacht haben.

Wir bauen jetzt so langsam den @c3d2 Stand ab und danken für die beiden schönen Tage mit vielen Lieben Menschen und tollen Gesprächen!