WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

609

Before the server move this worked fine. After the move to the new host it does not. This is critical for several reasons:

1) TOR is critical for political dissidents to bypass state level censorship 2) Whistleblowers that fear for their life need assurances that they will not be DOXed 3) Any site that rejects TOR connections is suspect. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic

For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

Before the server move this worked fine. After the move to the new host it does not. This is critical for several reasons: 1) TOR is critical for political dissidents to bypass state level censorship 2) Whistleblowers that fear for their life need assurances that they will not be DOXed 3) Any site that rejects TOR connections is suspect. I know this often happens upstream from the web host, but plain and simple it means that somewhere in the connection chain there is someone who is recording IP addresses and does not want anonymous traffic For reference, I have a friend who works for a well know big-tech firm and he has a spicy detail he wanted to leak... I told him to fire up TOR and post it here. Poal.co refusing secure connections for TOR connections was a not a good look.

(post is archived)

[–] 1 pt

Your info may be outdated. Both Tor and VPN exit nodes have been watched for over a year now. They are not safe for sensitive info, for anyone.
If your friend isnt willing to own his spicy info, he probably shouldn't share.