Hey thanks for your time. So I didn't realize this, but some of the self hosted simpleX servers need a code to enter if the person set it to require that. So a bunch of the URLs I had, turned out to reject off this code. We will be posting a self-hosted SMP server with the code shortly, I'll ping you here when it does
ShadowRebel
your argument is essentially you don't like me. so therefore I shouldn't be posting videos
Yeah I suppose. But how's a website ever start then? Monero.town was once unknown to both of us
Yeah I'm promoting a website. What are you doing of value other than shit posting anonymously from one of the socialist lemmy instances?
the point was UDP is more easily trackable, especially under censorship conditions. And keeping the IP in memory is not so awesome for a Tor changing entrances when there's no benefit of speed.
Maybe the people who are upvoting this comment should actually watch the video before just being retarded
It was compared with OpenVPN which by default does not store it in memory. And the obfiscation issue an alternative of UDP->TCP tunnel was linked in the video's description. And the alternatives of ShadowSocks and SagerNet were given. What's your problem that you gotta smear the video and encourage people to not even watch it?
Thanks for links
lol thanks
The issue with WireGuard depends on your situation. So for low risk activities such as watching a Netflix video, it’s fine. It’s faster and convenience. However, people should be aware of the trade-offs associated with this:
There’s logging of IPs built into the identity of the users, such that it stores it in memory after the connection is closed. This is NOT an issue for low risk activity like video games, but IS an issue for Tor users as they change circuits every 10 minutes. Frequently VPN companies outsource their servers to the same third party servers as Tor VPS hosts and as other VPNs. For example, some well known VPNs, Mullvad and IVPN do share some of the same third party providers. And other providers don't have dedicated servers and use cloud VMs. Keeping your IP in memory from one Tor circuit to another with the same servers providers is a huge risk especially if it involves cloud hosting as it’s shared memory. Depending on the VPS or provider, it could overlap. The video further explains that there is no speed benefit to using WireGuard over OpenVPN with Tor. So you get no bonus for the risk.
There was other stuff covered in the video regarding UDP packets being more obvious to the ISP for a VPN useage, and the potential to put that through a UDP→TCP tunnel with a link to where to find that.
Future videos will have me in a smaller box in the corner, and larger graphics