• ZeroOne
    link
    fedilink
    English
    44
    edit-2
    13 hours ago

    At this point Dark-web tech needs an upgrade, we might just need a “2nd internet”

    • tarknassus
      link
      fedilink
      English
      919 hours ago

      How about Gemini? https://geminiprotocol.net/

      Gemini is a group of technologies similar to the ones that lie behind your familiar web browser. Using Gemini, you can explore an online collection of written documents which can link to other written documents. The main difference is that Gemini approaches this task with a strong philosophy of “keep it simple” and “less is enough”. This allows Gemini to simply sidestep, rather than try and probably fail to solve, many of the problems plaguing the modern web, which just seem to get worse and worse no matter how many browser add-ons or well meaning regulations get thrown at them.

      How it applies to geolocation and server hosting in light of the OSA I really have no clue. But it’s an interesting underground hacker/tinker type alternative.

        • @[email protected]
          link
          fedilink
          English
          314 hours ago

          This says it started in 2019, Google Gemini was 2023. It seems like these big companies pick a name first and then figure out who they’ll have to sue after.

      • @[email protected]
        link
        fedilink
        English
        920 hours ago

        That moment when you decide to use i2p because its more sustainable for every user to be a node just for your server’s location to get leaked in a vulnerability. This is why most deep web migration to i2p ended

        • @[email protected]
          link
          fedilink
          English
          114 hours ago

          I must have missed that. When did that happen? I used i2p a long time ago and it seemed very promising. I imagine it has got better since.

          • @[email protected]
            link
            fedilink
            English
            112 hours ago

            i2p before 2.3.0 (Java) allows de-anonymizing the public IPv4 and IPv6 addresses of i2p hidden services (aka eepsites) via a correlation attack across the IPv4 and IPv6 addresses that occurs when a tunneled, replayed message has a behavior discrepancy (it may be dropped, or may result in a Wrong Destination response). https://nvd.nist.gov/vuln/detail/CVE-2023-36325

          • @[email protected]
            link
            fedilink
            English
            114 hours ago

            I don’t really have a link, but you might be able to find something talking about game server protocols. Outside of LAN, usually you’re either connecting to a central server, or a peer relay. With a relay server it’s just a proxy between you and the other players to hide your IP from others.
            There’s plenty of cases in games that didn’t do this where malicious actors could find the IPs of the people they’re playing with and DDoS them to give themselves an advantage. Knowing someone’s IP will also probably tell you extra info about them like what city they’re in, and open them up for further hacking.