sequenceDiagram
Computer->>+Nameserver: Where's wikipedia.org
Nameserver-->>-Computer: 185.15.59.224
Computer->>+Wikipedia: GET /
Wikipedia-->>-Computer: return /
Here is the simplified sequence diagram
As you can see the request to wikipedia itself does not go through a nameserver, only the DNS request does. It’s the entire reason Firefox has the option to proxy DNS queries over the proxy: to avoid DNS leaks
Right now, all that should be happening is DNS requests being proxied, not the rest of your traffic.
There’s a huge difference when I enter https://one.one.one.one/help/ normally with
"Use system proxy settings"
in my browser and when I enter it with a"Manual proxy configuration"
with theSOCKS Host set up
and"Proxy DNS when using SOCKS v5"
checked on.
To me that indicates the DNS proxy through TOR isn’t actually working with your dnscrypt setup 🤔 However it’s difficult to debug from here. It’s possible the DNS query is slow, but because the actual HTTP request is going through your standard internet with no proxy it’s fast, and when you do turn on the proxy for HTTP/S requests, you observe actually using TOR for everything and thus the latency.
Could you run these commands please
# Find which process is running the local DNS server
sudo ss -plant | grep ":53 " # alternatively sudo netstat -plant | grep ":53 "
# Check your DNS resolver config
# You can share it or not, but 127.0.0.1 MUST be in it, otherwise your DNS queries aren't being encrypted/proxied
cat /etc/resolv.conf
# Measure how long it takes to query a new domain name
time dig techhub.hpe.com
time dig bash.org
time dig element.io
If you feel comfortable with it, you share the logs of dnscrypt (I don’t know what kind of information is in there, so you might have to clean it).
journalctl -u dnscrypt-proxy2
or just systemctl status dnscrypt-proxy2
. Either here or PMed. Here are encrypted pastebin alternatives.
Unofficial documentation using OpenAPI is here @[email protected] .
Btw, the user interface uses the same API. Just open the web developer tools in your browser and look at the network tab.
I find the article bizarre. Nearly every single guy I know has or had a gaming PC. Some lucky bastards got them when they were 10 years old or younger, while I got mine way in my teens (poor family). As a comp-sci grad it was nigh 100% who had one, and working in tech there were definitely lots of them (and board games + DnD were quite popular).
Either I lived in a bubble or the article is uniquely describing the North American experience. Nobody ever told me to my face they found it weird to leave a party to watch eSports or play a few rounds of whatever MMO was around at the time.
Reading that it’s now “mainstream” just doesn’t fit my experience. It was already popular before my time.
I don’t think that’s a correct assumption. DNS just resolves domain names to IPs. When you access a website, if the IP isn’t in your dns cache, it will look it up and that’s the only part that should be going through dnscrypt. The actual request to the site goes to the IP directly. To use TOR across your entire system, it should either be used as a VPN or as a system-wide proxy. Dunno how to set that up though…
You should be able to at least activate logs for dnscrypt and see which DNS entries are being requested. To have a deeper look into your traffic, the only thing I know of is wireshark, which can sniff all your packets. You should be able to observe your DNS request going to dnscrypt, possibly through TOR (I doubt the packet tracing will work, sequence numbers or something should be disrupted by going through TOR), then a request going out to the IP it found over HTTP (port 80) or HTTPS (port 443).
How do you know it’s not being proxied? How are you reaching that conclusion?
😂 I can’t help you if your reading comprehension is low dude.
Probably a bug in censorship that they now consider a feature. Most likely it can’t find the right sentence to censor, so it just doesn’t try.
Hi, I have a blue screen
OK, what’s the error?
Dunno, it’s just blue
Even with a QR code, it would be better to be able to take a picture of the logs to see what happened all the way until the kernel panic.
It’s built on top of BSD, which is opensource.
Good job on not reading it and understanding absolutely nothing 👏
Believe it or not, I can be concerned about both.
Yes you can, most people aren’t. In real life, by far the most common response I’ve gotten when talking about privacy is 😴 . My colleagues in tech will hotly debate China’s surveillance, but happy use face ID on their iPhone, upload their entire life to Google or iCloud (including recordings of therapy sessions), send their blood into do a heritage check, nearly exclusively use Amazon for shopping, have an Amazon Ring camera at their door, and so much more.
You are the minority.
More about the part about stealing information. Most people barely look at permissions.
A flashlight app needs access to my calls, microphone, clipboard, filesystem, and network? Sure, I’ll install it.
or
Facebook needs access to all permissions? Oh is that what the popup said when I installed it?
All Temu had to do was ask and people would grant it.
Because I find USAian more appropriate. USA isn’t a representative of two entire continents.
Not sure if you’re trolling now 😂 Good meme.
It’s funny that every time someone points out the pot calling the kettle black the training kicks in to shout “whataboutism” and it must be “wumao”. It’s almost a meme. You don’t think an article about Xi Ping’s government warning about USAian surveillance would be mocked and ridiculed due to their Great Firewall? That wouldn’t be “whataboutism” though, right? It would be a “critical opinion”?
So just like the majority of USAian apps out there? I think Temu fits right in. Why are people so concerned about what China is doing with their data, but not the very countries they live in or (more importantly) the dominant online surveillance presence: the USA?
What about the 40k TV series? Thought that was happening; by that dude who played superman.
Just use I2P and share anonymously. No need to do it physically, get identified by a recording on a client’s phone, and have your door busted in by the popo. Anonymous overlay network is where it’s at.
So trying to hack hackthebox is not permitted? Confusion is the name of the game
Anti Commercial-AI license