WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

1.4K

Before the server move this worked fine. After the move to the new host it does not. This is critical for several reasons:

1) TOR is critical for political dissidents to bypass state level censorship 2) Whistleblowers that fear for their life need assurances that they will not be DOXed 3) Any site that rejects TOR connections is suspect. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic

For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

Before the server move this worked fine. After the move to the new host it does not. This is critical for several reasons: 1) TOR is critical for political dissidents to bypass state level censorship 2) Whistleblowers that fear for their life need assurances that they will not be DOXed 3) Any site that rejects TOR connections is suspect. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

(post is archived)

[–] [Sticky] 2 pts (edited )

After the move to the new host it does not. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic

This has nothing to do with the new host. It is a new anti-DDoS system I put in place (in the new VPS) to prevent butthurt kikeshills from flooding poal.

Just change your Tor exit when it happens. You may be using the same nodes they use to flood poal with.

Whistleblowers that fear for their life need assurances that they will not be DOXed

lol If you think TOR is safe (regarding anonymity), you are deeply mistaken.

For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

lol Sorry for your friend, but without the protection there's no Poal. The kikes have doubled down.

[–] 0 pt (edited )

lol If you think TOR is safe (regarding anonymity), you are deeply mistaken.

Never said I did... but many people do. Honestly if I had something big enough to leak I would probably not leak it without running a VM on tails from a coffee shop 100 miles from my home with a VPN and a TOR connection... while wearing clothes I bought in walmart with cash, etc, etc, etc. And I would still probably chicken out. I have kids and a family. It would have to be a moral imperative to get the info out.

Just change your Tor exit when it happens. You may be using the same nodes they use to flood poal with.

I did try several TOR circuits when i tested this... I just tried again. After 12 different exit nodes I did get one to work.

[–] 1 pt

After 12 different exit nodes I did get one to work.

Good.

[–] [deleted] 3 pts

TOR is blocked due to attacks from talk lolis. Find another way.

[–] 0 pt

So if you wanted to post something really spicy, how would you do it without TOR?

I told him to just go post it on different site like patriots.win... but I have to say that seeing this issue makes me trust Poal.co less

[–] 2 pts

FYI Poal doesn't block Tor. Only nodes who have been used to attempt flooding.

These nodes are unblocked after a certain amount of time. So as mentioned in my sticky reply, use another Tor exit and it will work.

[–] 2 pts

Tor traffic is being used to upload CP to pic8.

That's why tor exit nodes have been blocked.

Have nice day.

[–] [deleted] 2 pts

Tor traffic is being used to upload CP to pic8.

More ways they are trying to take down the site!

For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

Does he have proof we never landed on the moon and is scared NASA will murder him? If I was in fear of my life from the gov't because I had spicy info I would totally use TOR and Poal to post it? LMFAO! Seriously, you expect us to buy this whole story?

Poal.co refusing secure connections for TOR connections was a not a good look.

I believe you are one of those trying to take down the site and your kvetching over this is not a good look and very suspicious.

[–] 2 pts

You could send it to someone via a secure messenger like tox or BM and have an unrelated party post it.

[–] 1 pt

Your info may be outdated. Both Tor and VPN exit nodes have been watched for over a year now. They are not safe for sensitive info, for anyone.
If your friend isnt willing to own his spicy info, he probably shouldn't share.

[–] 1 pt

TOR is completely compromised. Stop using it.