Here’s the link to the docker docs

  • WeirdGoesPro@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    8 hours ago

    So you read some articles but don’t have an understanding of what the weaknesses are? That doesn’t seem like a solid foundation to form an opinion on.

    • atlien51@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 hours ago

      Several years ago when I was a little interested in the whole concept I read into the articles but I haven’t looked into these things since. It’s just what I remember from reading them years ago (around 2016) - that vulnerabilities in the tor browser have been exploited by feds, that they’ve managed to infiltrate nodes or some such, things like that. But the articles are probably still up there for anyone who’s genuinely interested in this

      • WeirdGoesPro@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        You are correct, they have infiltrated exit nodes, but it is still one of the most secure privacy tools available. If you are Al Quaeda, don’t use tor. If you are an average person preserving their privacy or subverting censorship, use tor.