shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

252
active users

#exitnodes

0 posts0 participants0 posts today
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.ie/@jherazob" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jherazob</span></a></span> <span class="h-card" translate="no"><a href="https://existiert.ch/@leberschnitzel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>leberschnitzel</span></a></span> they <a href="https://infosec.space/@kkarhan/114437851069942896" rel="nofollow noopener noreferrer" target="_blank">already exist</a>...</p><ul><li>Worst case fork <a href="https://infosec.space/tags/PoWshield" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PoWshield</span></a> as used by the fmr. admin of <a href="https://infosec.space/tags/IncognitoMarket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncognitoMarket</span></a> if you don't want to work with your hoster/upstream to block <a href="https://infosec.space/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> attacks through <a href="https://infosec.space/tags/blackholing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blackholing</span></a> and having a proper <a href="https://infosec.space/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> setup!</li></ul><p>I think it's bad <a href="https://infosec.space/tags/TechPopulism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechPopulism</span></a> to think that <a href="https://infosec.space/tags/Anubis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Anubis</span></a> will fix all the issues.</p><ul><li>It's like <a href="https://infosec.space/tags/KernelLevelAnticheat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KernelLevelAnticheat</span></a>, <a href="https://infosec.space/tags/Antivirus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Antivirus</span></a> and <a href="https://infosec.space/tags/DRM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DRM</span></a>: A hamfisted approach that harms legitimate users more than the bad actors!</li></ul><p>Just block all the <a href="https://infosec.space/tags/GAFAMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GAFAMs</span></a> ASNs &amp; <a href="https://infosec.space/tags/hosters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosters</span></a> that host <a href="https://infosec.space/tags/Scrapers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scrapers</span></a> so the industry cracks down harder on them than on <a href="https://infosec.space/tags/IRC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IRC</span></a>, <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a>, <a href="https://infosec.space/tags/CSAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSAM</span></a> &amp; <a href="https://infosec.space/tags/BitTorrent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BitTorrent</span></a> combined!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://toot.wales/@clubchonky" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>clubchonky</span></a></span> personally, I disagree to an extent.</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> is well battle-tested and combat-hardened and using <a href="https://infosec.space/tags/OnionServices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionServices</span></a> works just fine, as none of the traffic leaves through <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a>...</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://fearness.org/@gameplayer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>gameplayer</span></a></span> <span class="h-card" translate="no"><a href="https://atomicpoet.org/users/atomicpoet" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>atomicpoet</span></a></span> it's not that simple.</p><ul><li>Shure the average cybercriminal can use some hijacked routers and desktops as a proxy for their carding fraud but that doesn't scale with huge amounts of traffic and ISPs do combat proxy use by explicitly checking traffic for it and banning such setups as per ToS.</li></ul><p>In fact, many ISPs will forcibly disconnect customers if they detect they run an open proxy or tor exit node.</p><ul><li>Speaking of <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span>, the bandwith of <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a> is way too low for any industrial-scale <a href="https://infosec.space/tags/scraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scraping</span></a> operation needed.</li></ul>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tasket" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tasket</span></a></span> I don't say @tor#Tor is perfect - far from it.</p><p><em>BUT</em> an <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionService</span></a> is way easier to conceal, shield and secure than a <a href="https://infosec.space/tags/SurfaceWeb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SurfaceWeb</span></a> site.</p><ul><li>Also the main disadvantage of Tor is speed and the fact that <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> publishes their <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a>, so blocking Tor users is too easy.</li></ul><p>Needless to say that there may be different scenarios and it takes individual assessment of needs, capabilities and <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a>, <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a>, <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> &amp; <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a> to the point that I think it's important to teach people to make that decision instead of blanket VPN shilling...</p><p><a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DontBlockTor</span></a></p>
Kevin Karhan :verified:<p>Q: Is there any Hoster that doesn't block or ban <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> ? </p><ul><li>Cuz <a href="https://infosec.space/tags/Contabo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Contabo</span></a> <a href="https://contabo.com/en/legal/terms-and-conditions/" rel="nofollow noopener noreferrer" target="_blank">does per their ToS</a>...</li></ul><p>I could understand it if they don't want <a href="https://infosec.space/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a> and subsequent traffic to <em>taint</em> their rep, but they literally <a href="https://infosec.space/tags/ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ban</span></a> <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> entirely regardless if <a href="https://infosec.space/tags/OnionService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnionService</span></a>, <a href="https://infosec.space/tags/Relay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Relay</span></a> or a private <a href="https://infosec.space/tags/Bridge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridge</span></a>.</p><p><a href="https://infosec.space/tags/DontBlockTor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DontBlockTor</span></a> <a href="https://infosec.space/tags/Bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bridges</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> not to mention it's kinda sad that <a href="https://mstdn.social/tags/TorBulkExitList" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBulkExitList</span></a> still doesn't list <a href="https://mstdn.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://mstdn.social/tags/ExitNodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExitNodes</span></a> to this day.</p><p>That issue us 7 years (!!!) old.<br><a href="https://gitlab.torproject.org/tpo/anti-censorship/bridgedb/-/issues/19997" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.torproject.org/tpo/anti</span><span class="invisible">-censorship/bridgedb/-/issues/19997</span></a> via <span class="h-card" translate="no"><a href="https://mastodon.social/@isis" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>isis</span></a></span> </p><p><a href="https://check.torproject.org/torbulkexitlist" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">check.torproject.org/torbulkex</span><span class="invisible">itlist</span></a></p>