

Mind at least providing a link for your pretty strong claim about Tor?
I don’t have one. Thanks for asking, you made me actually reconsider the truthfulness of my own statement… I was just parroting back what I heard many times, years ago, among the people that attended a hacklab from the city I was living in back then.
Same goes with the ‘tip’ that said that Tor was initially funded by the US Military (which apparently is true, but then the project turn out to be independent.) These two “facts” were presented, and parroted back and forth in that space a lot.
It would be great to have real analysis knowing which data centers or actors have the biggest control of exit nodes. If there’s really a way to de-anonimyze any traffic from there.
PS. Since we are on the topic, another concern regarding Tor network is the possibility of correlation attacks. It always strikes me how ISP stops providing connection at ‘random’ if you were a frequent user. Pretty sure there’s legal forces behind it… but that’s my paranoia. Now those minutes or hours offline sprinkled here and there to my router were a fact. Anyway, the dark web is really full of a lot sick places. I’d rather just stay away from it entirely and use a VPN for my privacy when searching media and stuff. That’s a lesson I learned.
this is self-hosting local-first apps. There’s some local-first manifesto somewhere… one of their greatest ‘backend’ developments were CRDTs. The idea, is that the app can be turned off, synchronization can be interrupted and resumed, and so on. Those CRDTs allow people to use a text editor even when the client(s) are disconnected from the server. Of course, depending on how much your version differs, the merge conflict of diverging versions will be easier to solve…