Its on the loopback adapter for your system. What does it proxy to? You should be able to bypass an app. I don't trust an app to be doing that shit for me.
Oh what's this? It sends a copy of everything I write as a direct email to the feds? Its another fucking tactic to collect data, they have many of them, I'd like to not give them another.
Its a peer to peer web socket app, it loops back to yourself because you act as a host for any site you visit. Nothing on it is encrypted but it uses tor exit nodes to conceal your IP address.
Utilizing a websocket proxy on the loopback doesn't mean you host anything, it just means that you access the content via a locally 'hosted' reverse proxy. At best it is operating a local web cache to keep you from downloading the same content more than once per whatever interval is set on the content.
Exiting over tor is cool, is there a way to 'see' it doing this, or would I need to be running an upstream layer-7 inspection service to validate the requests are not leaking out further than expected?
I don't know how to view Tor traffic through my machine but the sites are locally hosted, I run it off an SD card because it takes up too much hard drive space. When you open the zeronet folder you can view the content for every site you view and manually delete it that way if you want. It uses a short bitcoin style hash between a private and public key to determine the owner of the website. The websites are downloaded through a bit torrent system. There are down sides there are a lot of fuckers that try to share CP on there, so using blocklists is important.
(post is archived)