On 1/23/23, A Tor Minion <atormin...@torproject.org> wrote: > In case it affects you as you are still running your relay or bridge on > Tor 0.4.5.x: the 0.4.5 series is going EOL
Yet still no one bothers to talk about what the censorban effects of that would be upon the current use, and the future development and use, of some P2P and other types of applications and protocols over tor's onions, and thus upon the users and future users of them. > currently still 760 relays [running 0.4.5.x] Notably, ~64% [~493] of those 760 are running 0.4.5.10 or prior, and ~77% [~382] of those 493 are running exactly 0.4.5.10. Thus clearly there is a movement to continue support v2 onions in as much of an up to date with tor fashion as they can while still preserving v2 capability. v2 flags can be broken down similarly. Omg, gasp, how can it be, such Valiant Rebels against Authority! "We" must Smash them!, says the Tor Project Incorporated. Well, pehaps those 493 relays may be freely, even rightly, choosing to resist, by continuing their support for v2 onions and all its applications for users, including bidirectional 1:1 IPv6 mapped transport (UDP, TCP, bittorrent, chats, P2P, cryptocurrencies, voice/video protocols, file and storage clouds, etc) over tor OnionLand, via the amazing OnionCat plugin as needed, and by continuing to run v2 HSDIR servers, and by being brave DirAuths against such Authority that they will continue to sign over v2 capable relays, so as to let them live freely without such arbitrary persecution, even perhaps moreso in the case of the v2 capable non-exit cloud. As searchable by "OnionCat" on lists... TPO's arbitrary and unecessary ripping v2 function out of tor versions newer than 4.5.10 would permanently disenfranchise users from running the entire universe of all the IPv6 capable applications [1] over tor onions that depend on v2+OnionCat to run. And it will permanently prevent anyone from developing or porting any such novel and interesting applications for and to tor onions in the future. That's bad, and is especially harmful to such potentials considering how the Internet is now tending and preferring to develop decentralized P2P applications to help resist, route around, and extinct central tyrannies... some of those apps would certainly not be able to run over tor unless plugged into v2+OnionCat. The world has not, is not, and won't be solely unidirectional TCP... the bidirectional, mesh, UDP, broadcast, IPv6, embeds, etc still do and will exist, and apps do and will depend on them. Does Tor Project Incorporated really desire to foreclose on some such interesting possibilities over tor's onions. Also bad is Tor Project's blanket "security" claim FUD as an excuse to remove v2, when it is properly users that should get to decide whether the actual differences between v2 and v3 onions features really apply to their use cases, threat models, and acceptable tradeoffs for the apps they choose to run over tor's onions in OnionLand. Note clearly that Tor Project still refused to post an unbiased technical comparison table wiki between v2 and v3 and OnionCat for the benefit of users to consult, nor did they post such on a blog or forum or list, nor speak on the application-limiting future that v3 would represent, they just handwaved "new" and "security" memes, and claimed "support cost" when in reality TPO gets paid $Millions to support users and applications. As before, Tor should have, and still should, modularize the functionality for v2 onions HSDIRs relays and clients, and then push that out to the community to enable, support, and operate that module option as they so choose... a dedicated v2 cloud of sorts. For the Valiant Rebels, and should Tor still refuse to modularize, 4.5.10 would be the last of their official releases to support v2. It's also an opensource software, protocol, and operation that can be freely forked into a new project that may also venture to address Tor's other big problems as well. After 25 years of the Tor elephant, it's time for all sorts of new projects to compete in the overlay space anyway. For one, did you know that you can overlay the GNURadioRF space with encrypted random transports... have phun :) "Tor Stinks -- NSA, known since before 2012" https://github.com/rahra/onioncat/ https://www.onioncat.org/ https://dist.torproject.org/tor-0.4.5.10.tar.gz https://dist.torproject.org/tor-0.4.5.10.tar.gz.asc https://gitweb.torproject.org/tor.git/tag/?h=tor-0.4.5.10 30b10a30ced563382c09bb290d0568932ca98b03 cached-consensus:client-versions 0.4.5.10 cached-consensus:server-versions 0.4.5.10 May all do well in countering the various adversaries of freedom. #FreeAssange [1] And today's IPv4 applications that also depend on v2+OnionCat transport features, since the world is porting them to IPv6 and soon abandoning IPv4. [CC's for inclusion, censors abound]