shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

269
active users

#exitnodes

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@jherazob" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jherazob</span></a></span> <span class="h-card" translate="no"><a href="https://existiert.ch/@leberschnitzel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>leberschnitzel</span></a></span> they <a href="https://infosec.space/@kkarhan/114437851069942896" rel="nofollow noopener" target="_blank">already exist</a>...</p><ul><li>Worst case fork <a href="https://infosec.space/tags/PoWshield" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PoWshield</span></a> as used by the fmr. admin of <a href="https://infosec.space/tags/IncognitoMarket" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncognitoMarket</span></a> if you don't want to work with your hoster/upstream to block <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> attacks through <a href="https://infosec.space/tags/blackholing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackholing</span></a> and having a proper <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> setup!</li></ul><p>I think it's bad <a href="https://infosec.space/tags/TechPopulism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechPopulism</span></a> to think that <a href="https://infosec.space/tags/Anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anubis</span></a> will fix all the issues.</p><ul><li>It's like <a href="https://infosec.space/tags/KernelLevelAnticheat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KernelLevelAnticheat</span></a>, <a href="https://infosec.space/tags/Antivirus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Antivirus</span></a> and <a href="https://infosec.space/tags/DRM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DRM</span></a>: A hamfisted approach that harms legitimate users more than the bad actors!</li></ul><p>Just block all the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GAFAMs</span></a> ASNs &amp; <a href="https://infosec.space/tags/hosters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hosters</span></a> that host <a href="https://infosec.space/tags/Scrapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scrapers</span></a> so the industry cracks down harder on them than on <a href="https://infosec.space/tags/IRC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IRC</span></a>, <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>, <a href="https://infosec.space/tags/CSAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSAM</span></a> &amp; <a href="https://infosec.space/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitTorrent</span></a> combined!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://toot.wales/@clubchonky" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>clubchonky</span></a></span> personally, I disagree to an extent.</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> is well battle-tested and combat-hardened and using <a href="https://infosec.space/tags/OnionServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionServices</span></a> works just fine, as none of the traffic leaves through <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://fearness.org/@gameplayer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gameplayer</span></a></span> <span class="h-card" translate="no"><a href="https://atomicpoet.org/users/atomicpoet" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>atomicpoet</span></a></span> it's not that simple.</p><ul><li>Shure the average cybercriminal can use some hijacked routers and desktops as a proxy for their carding fraud but that doesn't scale with huge amounts of traffic and ISPs do combat proxy use by explicitly checking traffic for it and banning such setups as per ToS.</li></ul><p>In fact, many ISPs will forcibly disconnect customers if they detect they run an open proxy or tor exit node.</p><ul><li>Speaking of <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span>, the bandwith of <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> is way too low for any industrial-scale <a href="https://infosec.space/tags/scraping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scraping</span></a> operation needed.</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tasket" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tasket</span></a></span> I don't say @tor#Tor is perfect - far from it.</p><p><em>BUT</em> an <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionService</span></a> is way easier to conceal, shield and secure than a <a href="https://infosec.space/tags/SurfaceWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SurfaceWeb</span></a> site.</p><ul><li>Also the main disadvantage of Tor is speed and the fact that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> publishes their <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a>, so blocking Tor users is too easy.</li></ul><p>Needless to say that there may be different scenarios and it takes individual assessment of needs, capabilities and <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> &amp; <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a> to the point that I think it's important to teach people to make that decision instead of blanket VPN shilling...</p><p><a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DontBlockTor</span></a></p>
Kevin Karhan :verified:<p>Q: Is there any Hoster that doesn't block or ban <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> ? </p><ul><li>Cuz <a href="https://infosec.space/tags/Contabo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Contabo</span></a> <a href="https://contabo.com/en/legal/terms-and-conditions/" rel="nofollow noopener" target="_blank">does per their ToS</a>...</li></ul><p>I could understand it if they don't want <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> and subsequent traffic to <em>taint</em> their rep, but they literally <a href="https://infosec.space/tags/ban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ban</span></a> <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> entirely regardless if <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnionService</span></a>, <a href="https://infosec.space/tags/Relay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Relay</span></a> or a private <a href="https://infosec.space/tags/Bridge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bridge</span></a>.</p><p><a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DontBlockTor</span></a> <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bridges</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torproject</span></a></span> not to mention it's kinda sad that <a href="https://mstdn.social/tags/TorBulkExitList" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TorBulkExitList</span></a> still doesn't list <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mstdn.social/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExitNodes</span></a> to this day.</p><p>That issue us 7 years (!!!) old.<br><a href="https://gitlab.torproject.org/tpo/anti-censorship/bridgedb/-/issues/19997" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.torproject.org/tpo/anti</span><span class="invisible">-censorship/bridgedb/-/issues/19997</span></a> via <span class="h-card" translate="no"><a href="https://mastodon.social/@isis" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>isis</span></a></span> </p><p><a href="https://check.torproject.org/torbulkexitlist" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">check.torproject.org/torbulkex</span><span class="invisible">itlist</span></a></p>