WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

142

Before the server move this worked fine. After the move to the new host it does not. This is critical for several reasons:

1) TOR is critical for political dissidents to bypass state level censorship 2) Whistleblowers that fear for their life need assurances that they will not be DOXed 3) Any site that rejects TOR connections is suspect. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic

For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

Before the server move this worked fine. After the move to the new host it does not. This is critical for several reasons: 1) TOR is critical for political dissidents to bypass state level censorship 2) Whistleblowers that fear for their life need assurances that they will not be DOXed 3) Any site that rejects TOR connections is suspect. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

(post is archived)

[–] [Sticky] 2 pts (edited )

After the move to the new host it does not. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic

This has nothing to do with the new host. It is a new anti-DDoS system I put in place (in the new VPS) to prevent butthurt kikeshills from flooding poal.

Just change your Tor exit when it happens. You may be using the same nodes they use to flood poal with.

Whistleblowers that fear for their life need assurances that they will not be DOXed

lol If you think TOR is safe (regarding anonymity), you are deeply mistaken.

For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

lol Sorry for your friend, but without the protection there's no Poal. The kikes have doubled down.

[–] 0 pt (edited )

lol If you think TOR is safe (regarding anonymity), you are deeply mistaken.

Never said I did... but many people do. Honestly if I had something big enough to leak I would probably not leak it without running a VM on tails from a coffee shop 100 miles from my home with a VPN and a TOR connection... while wearing clothes I bought in walmart with cash, etc, etc, etc. And I would still probably chicken out. I have kids and a family. It would have to be a moral imperative to get the info out.

Just change your Tor exit when it happens. You may be using the same nodes they use to flood poal with.

I did try several TOR circuits when i tested this... I just tried again. After 12 different exit nodes I did get one to work.

[–] 1 pt

After 12 different exit nodes I did get one to work.

Good.