Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Let’s keep iterating on the takedown evasion strategies until they’re impenetrable. It’s the only hope the People have of actually being in control of anything important.


TOR version of Z-Library was up and running all that time, including auth. So what we should evaluate is easir-to-access takedown evasion strategies.


TOR is already pretty easy to access via TOR browser so anything else that requires additional client software is probably not going to have better adoption.


if you use the brave browser, TOR is always a keyboard shortcut away


> It’s the only hope the People have of actually being in control of anything important.

Well I wouldn't go that far. There are more $5 wrenches than there are people.

https://xkcd.com/538/


Yep, aka rubber-hose cryptanalysis.

The real test here was Assange who embarrassed the U.S. military by publishing drone footage of them killing civilians not to mention everything else.

They got him on an individual level (IMHO by blatantly discarding any remaining vestigial pretense of abiding by the law) but-- the site is up.


The site is up but it's no longer what it once was. It's disappeared from news reports. Nor has another one taken its place.

After the prosecution of Assange and Manning and with Snowden in exile, they've mandated to basically stop the whole whistleblower phenomenon in its tracks. Which was probably a bigger goal than one easily-replaced website.

It feels a bit like the Arab spring, a lot of hope in the beginning and then it all fizzled out.


> Nor has another one taken its place.

Yes it has, the spook-friendly Bellingcat. It filled a Wikileaks-shaped hole.


that comic did a huge disservice to computer security and still being thrown around after years.

there's a huge difference in knowing that your data has been compromised (you hand out the keys to avoid torture) and not knowing, that alone justifies every hoop you have to jump around to have your data encrypted.

besides, it doesn't apply here since onion services were created specifically to host content anonimously, they don't know who to torture.


You can make systems that even the creator cannot take down.


That only works if you can track down who the people are.


It works if you can track down and wrench a tiny % of them, causing the rest to wonder if they're next.

See: Belarus, 2020 or Iran, 2022 for recent examples




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: