toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

218
active users

#exitnodes

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@jherazob" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jherazob</span></a></span> <span class="h-card" translate="no"><a href="https://existiert.ch/@leberschnitzel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>leberschnitzel</span></a></span> they <a href="https://infosec.space/@kkarhan/114437851069942896" rel="nofollow noopener" target="_blank">already exist</a>...</p><ul><li>Worst case fork <a href="https://infosec.space/tags/PoWshield" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoWshield</span></a> as used by the fmr. admin of <a href="https://infosec.space/tags/IncognitoMarket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncognitoMarket</span></a> if you don't want to work with your hoster/upstream to block <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attacks through <a href="https://infosec.space/tags/blackholing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackholing</span></a> and having a proper <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> setup!</li></ul><p>I think it's bad <a href="https://infosec.space/tags/TechPopulism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechPopulism</span></a> to think that <a href="https://infosec.space/tags/Anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anubis</span></a> will fix all the issues.</p><ul><li>It's like <a href="https://infosec.space/tags/KernelLevelAnticheat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KernelLevelAnticheat</span></a>, <a href="https://infosec.space/tags/Antivirus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Antivirus</span></a> and <a href="https://infosec.space/tags/DRM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DRM</span></a>: A hamfisted approach that harms legitimate users more than the bad actors!</li></ul><p>Just block all the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAFAMs</span></a> ASNs &amp; <a href="https://infosec.space/tags/hosters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hosters</span></a> that host <a href="https://infosec.space/tags/Scrapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scrapers</span></a> so the industry cracks down harder on them than on <a href="https://infosec.space/tags/IRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRC</span></a>, <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>, <a href="https://infosec.space/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> &amp; <a href="https://infosec.space/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitTorrent</span></a> combined!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://toot.wales/@clubchonky" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>clubchonky</span></a></span> personally, I disagree to an extent.</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> is well battle-tested and combat-hardened and using <a href="https://infosec.space/tags/OnionServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionServices</span></a> works just fine, as none of the traffic leaves through <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://fearness.org/@gameplayer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gameplayer</span></a></span> <span class="h-card" translate="no"><a href="https://atomicpoet.org/users/atomicpoet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>atomicpoet</span></a></span> it's not that simple.</p><ul><li>Shure the average cybercriminal can use some hijacked routers and desktops as a proxy for their carding fraud but that doesn't scale with huge amounts of traffic and ISPs do combat proxy use by explicitly checking traffic for it and banning such setups as per ToS.</li></ul><p>In fact, many ISPs will forcibly disconnect customers if they detect they run an open proxy or tor exit node.</p><ul><li>Speaking of <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span>, the bandwith of <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> is way too low for any industrial-scale <a href="https://infosec.space/tags/scraping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scraping</span></a> operation needed.</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tasket" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tasket</span></a></span> I don't say @tor#Tor is perfect - far from it.</p><p><em>BUT</em> an <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionService</span></a> is way easier to conceal, shield and secure than a <a href="https://infosec.space/tags/SurfaceWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SurfaceWeb</span></a> site.</p><ul><li>Also the main disadvantage of Tor is speed and the fact that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> publishes their <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>, so blocking Tor users is too easy.</li></ul><p>Needless to say that there may be different scenarios and it takes individual assessment of needs, capabilities and <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> &amp; <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> to the point that I think it's important to teach people to make that decision instead of blanket VPN shilling...</p><p><a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DontBlockTor</span></a></p>
Kevin Karhan :verified:<p>Q: Is there any Hoster that doesn't block or ban <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> ? </p><ul><li>Cuz <a href="https://infosec.space/tags/Contabo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Contabo</span></a> <a href="https://contabo.com/en/legal/terms-and-conditions/" rel="nofollow noopener" target="_blank">does per their ToS</a>...</li></ul><p>I could understand it if they don't want <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> and subsequent traffic to <em>taint</em> their rep, but they literally <a href="https://infosec.space/tags/ban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ban</span></a> <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> entirely regardless if <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionService</span></a>, <a href="https://infosec.space/tags/Relay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Relay</span></a> or a private <a href="https://infosec.space/tags/Bridge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bridge</span></a>.</p><p><a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DontBlockTor</span></a> <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bridges</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.jp/@landley" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>landley</span></a></span> I just use <a href="https://mstdn.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> and since they all treat <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> users as <a href="https://mstdn.social/tags/Torrorist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Torrorist</span></a>|s, that makes things easy...</p><p>I've not yet taken a look at Kaizushi's <a href="https://mstdn.social/tags/ExitKit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitKit</span></a> for private <a href="https://mstdn.social/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> cuz that'll basically be a better option to a <a href="https://mstdn.social/tags/VPN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPN</span></a>...</p><p>Otherwise, I'd consider working to get something like a <a href="https://mstdn.social/tags/pfSense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pfSense</span></a> on a <a href="https://mstdn.social/tags/VPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPS</span></a> at like Hetzner...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> not to mention it's kinda sad that <a href="https://mstdn.social/tags/TorBulkExitList" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBulkExitList</span></a> still doesn't list <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mstdn.social/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> to this day.</p><p>That issue is 7 years (!!!) old.<br><a href="https://gitlab.torproject.org/tpo/anti-censorship/bridgedb/-/issues/19997" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.torproject.org/tpo/anti</span><span class="invisible">-censorship/bridgedb/-/issues/19997</span></a> via <span class="h-card" translate="no"><a href="https://mastodon.social/@isis" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>isis</span></a></span> </p><p><a href="https://check.torproject.org/torbulkexitlist" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">check.torproject.org/torbulkex</span><span class="invisible">itlist</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mstdn.social/@kobayashi90" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kobayashi90</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.world/@signalapp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>signalapp</span></a></span> <span class="h-card" translate="no"><a href="https://social.as200950.com/@tfunken" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tfunken</span></a></span> depends...</p><p>Again: <a href="https://mstdn.social/tags/MonoclesChat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MonoclesChat</span></a> + <a href="https://mstdn.social/tags/Orbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Orbot</span></a> and one of many <a href="https://mstdn.social/tags/XMPP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XMPP</span></a> servers and you get <a href="https://mstdn.social/tags/secure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>secure</span></a> comms and even if the provider/admins are held and gunpoint and forced to log everything, all they see are <a href="https://mstdn.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://mstdn.social/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> and/or other <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> Tor nodes and only scrambled stuff...</p><p><a href="https://github.com/greyhat-academy/lists.d/blob/main/xmpp.servers.list.tsv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/greyhat-academy/lis</span><span class="invisible">ts.d/blob/main/xmpp.servers.list.tsv</span></a></p>
Kevin Karhan :verified:<p><span class="h-card"><a href="https://social.arclight.pro/@stanford" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>stanford</span></a></span> <span class="h-card"><a href="https://chaos.social/@fluepke" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>fluepke</span></a></span> EXAKT!</p><p>Weil für <a href="https://mstdn.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://mstdn.social/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> gibt's ne <a href="https://mstdn.social/tags/blocklist" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocklist</span></a>: <br><a href="https://github.com/greyhat-academy/lists.d/blob/main/blocklists.list.tsv#L15" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/greyhat-academy/lis</span><span class="invisible">ts.d/blob/main/blocklists.list.tsv#L15</span></a></p>