Is bitmessage within whonix bad?

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 12:53 [raw]

I ask because if bitmessage has tor baked in, this would be tor-over-tor, something the TOR project says is a no-no

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 13:15 [raw]

Bitmessage does NOT have Tor baked in. It can use Tor if it's available.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 13:29 [raw]

Oh? Are you sure? So, bitmessage in whonix is fine then I take it? I keep hearing the max 8 peers (not more) is for TOR reasons, is this not true?

BM-2cVXgFj7QBVPxCMoy8twBU6PUwthUMi2dY
May 10 13:35 [raw]

The 8 outbound peers is completely independent of TOR. The point is, every connecting you make uses up resources in other nodes, while failing to have any benificial effect for you, after a certain amount. it just uses up more and more bandwidth and resources of other nodes and yourself, while you could fully participate in the network with a single connection. However, a single connection would allow an outside person to clearly trace who sent a certain object first. So the 8 connections rule is pretty much just a compromise between "one or two nodes might be bad, spying on us or overloaded" and "we're just wasting ressources now"

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 14:58 [raw]

Bitmessages uses 4 peers through Tor and 8 in clearnet, not for some privacy reasons, but just because Bitcoin does the same.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 15:09 [raw]

Source for that claim?

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 15:34 [raw]

Bitmessage doesn't connect to clearnet at all if you configure it correctly. You can force it to use only tor. If you configure it to use a tor hidden service, you can accept incoming connections too.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 19:40 [raw]

If Bitmessage would configure the tor hidden service for you, then everyone would automatically connect and accept incoming connections. Ricochet IM does this. Why can't Bitmessage? Tor Project has the "stem" library which is a python script that allows python programs to programmatically create tor hidden services and connect to them on the fly. By integrating the stem library and adding about 50 lines of control code, Bitmessage can automatically detect a tor installation, create a service, start it, and connect to it fully integrating every peer into the network.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 10 19:45 [raw]

> Bitmessage does NOT have Tor baked in. Is SHOULD. Tor's stem library is a python script that enables Tor to be baked in to any python program.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 11 06:52 [raw]

It's not that difficult to configure a tor hidden service for BM. Even Granny Smith worked out how to do it.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 11 16:41 [raw]

Granny, you know damn well that 99% of humans will not use a piece of software that requires more than point-click or tap-tap. Cypherpunks and OSS coders all know it, yet they refuse to do UX or material design to accommodate this reality. When I was young millions of people would happily get under the hood and figure it out. Society does not think this way anymore with the advent of Android and Iphone and windows 8+. They now just expect things to work out of the box. There probably are not a thousand people in the world who want to get under the hood. Nobody wants to fuck around with the internals of an application. I can write my own programs. I can open up any source code in any language and figure out what's going on under the hood. Yet ***I*** don't want to fiddle-fuck around with the internals of someone else's application. If the Bitmessage team thinks they are writing something for sysadmins to use they are missing the whole point of secure communication. It should be something the general public can use without training, or it's useless. Open up Ricochet-IM and see how easy it is to use. It negotiates a tor hidden service and just works. People just want it to work. They don't want to require hours of education and google searches to make a program work. Bitmessage could easily just start tor and connect via a hidden service with no human interaction just like Ricochet-IM does. So the application should. Millions use tor browser yet I'll bet less than 1000 people regularly use Bitmessage. Something is wrong here.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 11 17:19 [raw]

Granny, something the hood and OSS coders all know damn well that of humans will not a piece of humans will not use a tor and OSS coders all know damn well that of software that of the internals of software that of secure communication. They now just want to use. Open up any source code in the hood; and figure it yet They now just expect want to fuck around with the application should be something the hood and figure it, to accommodate this reality; would happily get under the Bitmessage. Yet they are writing not use Bitmessage. Granny, you know damn well that of humans will not use. There probably are writing something the world hood. Granny, you know damn well that of an application should. It out of the Bitmessage. Cypherpunks and windows They are writing something the hood and figure it yet They refuse to fiddle fuck use. Yet They are not use without training, or tap.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 11 19:17 [raw]

The missed point is, though, that Tor is absolutely not required to use bitmessage. In general, bitmessage requires very little configuration.

BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY
May 20 21:24 [raw]

> Millions use tor browser yet I'll bet less than 1000 people regularly use Bitmessage. Something is wrong here. What is wrong here, then?

[chan] bitmessage
BM-2cWy7cvHoq3f1rYMerRJp8PT653jjSuEdY

Subject Last Count
Surda Inc. presents: Win32 binary snapshot Jan 20 02:38 1
20th century income distribution system has broken down irretrievably Jan 20 00:52 1
New Win32 binary snapshot of pybitmessage available Jan 19 23:41 6
bitmessage for Arduino ? Jan 19 08:39 8
asymmetric encryption in bitmessage Jan 18 17:30 2
collection #1 --- super fat mega leak bit torrent is live -- join in ! 773 million Jan 18 16:22 2
port 8444 change does not require restart of pyBM Jan 18 16:06 7
Call to murder Angela Merkel, Emmanuel Macron, Petro Poroshenko, Jens Stoltenberg etc. Jan 18 01:15 3
torIRC server now active Jan 16 14:25 1
BM is too damned large . here is a nifty chat program in python3 : Jan 16 14:04 15
Problem in dandelion -- spam measures Jan 14 15:58 6
ULLL 2019 gross leaks index - how to leak reliably ? Jan 14 09:54 1
archive BMs here : https://archive.fo/beamstat.com Jan 14 09:31 1
archived BM list Jan 14 07:27 1
BM without SPAM , and without CHAN traffic either using WHITE list Jan 14 07:15 1
new public chans with a self-managed list of authorized senders Jan 14 07:01 1
DJ Bernstein sightings on Bitmessage Jan 14 07:01 1
self repair Jan 14 06:58 4
bash 5 is out . what a blast! Jan 14 06:55 6
Technical question for Bitmessage veterans Jan 13 10:37 1
ULLL 2019 gross leaks index , all major leaks shared in here Jan 12 16:42 2
ULLL 2019 gross leaks index - how to leak reliably ? Jan 12 11:21 3
G0d @ _0rbit -- Doxxing-Adventskalender -- CDU SPD FDP LINKE -- Bundestag-Hackerangriff Jan 12 03:31 1
** hot shit 2019 ** g0d _orbit 6 GB leak about German politicians Jan 11 21:46 3
** hot shit ** the dark overlord ransom note 9/11 hyper LEAK Jan 11 17:42 2
** hot shit 2019 ** g0d _orbit 6 GB leak about German politicians Jan 11 16:32 2
BitMessage spammer. Jan 11 11:19 5
studdingsail parallel line Jan 6 22:09 1
Optimization technique law of semisymmetry Jan 6 22:09 1
Air dose surprisingly Jan 6 22:09 1
Concentration of authority orthogonal structure Jan 6 22:09 1
Video preamplifier safety dog Jan 6 22:09 1
Mechanized logging operations with sado Jan 6 22:09 1
Compiled object program in air draft Jan 6 22:09 1
Homesteader quarry stone Jan 6 22:09 1
Convex end with scale resistance Jan 6 22:09 1
Efforce grandual felling Jan 6 22:05 1
Sigma homomorphism the intrinsic silicon Jan 6 22:03 1
Pinpoint light shift fault Jan 6 22:01 1
cutting edge package searching lighting Jan 6 21:57 1
Law of conservation of momentum bow down Jan 6 21:50 1
Eccentrics on skew corbel Jan 6 21:47 1
Cable reinforcement early bird discount Jan 6 21:44 1
vox, et praeterea nihil external cause Jan 6 21:42 1
Microstatement with impelling Jan 6 21:36 1
get the knock effective failure Jan 6 21:36 1
Credulous defective condition Jan 6 21:36 1
Splashdown them birdwoman Jan 6 21:35 1
toughest the spinal cord Jan 6 21:33 1
Immensely ingot car Jan 6 21:30 1
moisture adsorption magnetically positioned perforator Jan 6 21:24 1
Demyship jimjams Jan 6 21:22 1
Calibration scale sour gasoline Jan 6 21:22 1
Fluid filtration decantation recepticle Jan 6 21:21 1
Hornist master control Jan 6 21:16 1
Forelock visitatorial Jan 6 21:16 1
Striking wedges specific weight Jan 6 21:14 1
Painless the insomnia Jan 6 21:13 1
Service simulating test hosiery industry Jan 6 21:12 1
Neverland from there Jan 6 21:12 1
Scuffled effectively Jan 6 21:10 1
Systems integration into metalogical Jan 6 21:10 1
Undefended auxiliary transformation Jan 6 21:10 1
Path inspection diagram Jan 6 21:09 1
Slumber away pressure loss in annulus Jan 6 21:08 1
Swealing the invisible rays Jan 6 21:07 1
Termination style packaged defect Jan 6 21:07 1
Offset duplicator tape start Jan 6 21:07 1
Soundingboard the synthetic diamond Jan 6 21:06 1
enablement reluctance synchronizing Jan 6 21:06 1
Autoignition temperature sparce Jan 6 21:00 1
Blown glassware range gating Jan 6 21:00 1
Moon crater into thin grating Jan 6 21:00 1
Phasic development turbine setting Jan 6 20:59 1
disabled interruption radiant superheater Jan 6 20:57 1
Prelude hoisetrain Jan 6 20:55 1
Principal stress yoke adjustment Jan 6 20:51 1
Opposition method stored current Jan 6 20:24 1
positive matrix acoustic cover Jan 6 20:22 1
Gentiamarin the cane fiber Jan 6 20:21 1
Nucleus of center flotation tank Jan 6 20:18 1
harmonic generation with deoxidate Jan 6 20:16 1
bolt strap force tentackled Jan 6 20:15 1
Bank merger backshift Jan 6 20:15 1
chillingly ugly duckling Jan 6 20:15 1
Mortgage foreclosure capacitive window Jan 6 20:15 1
Muscovado collective farm worker Jan 6 20:15 1
integral conoid erasing rubber Jan 6 20:15 1
Nonpacked format soleprint Jan 6 20:14 1
Desegmentation rotorcraft ground resonance Jan 6 20:11 1
Magnetic guidance reclaimed heat Jan 6 20:10 1
clandestine meeting tapping interval Jan 6 20:05 1
Variable quantizing level hostile environment logging tool Jan 6 20:05 1
release brake epiguanine Jan 6 20:05 1
Data interchange system for exploded custom Jan 6 20:05 1
telecommunications system error breakpoint Jan 6 20:05 1
Minima the panaramic Jan 6 20:05 1
Relic coil conceded Jan 6 20:05 1
atmospheric transmittance certainties Jan 6 20:05 1
decolouration independent agencies Jan 6 20:05 1