Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread Peter Fairbrother

On 15/10/2021 18:03, coderman wrote:


‐‐‐ Original Message ‐‐‐
On Friday, October 15, 2021 12:09 AM,
  PrivacyArms  wrote:


To clarify my question: Is there an anonymous network (GPA)
for secure/private messaging better than Tor?


privacy loves company, so the unpleasant answer to your question
is: no, there's nothing remotely as popular as Tor that is also
a GPA resistant mix network.

... remember when people ran mixminion? :P
[ https://github.com/mixminion/mixminion ]


Did they? I thought it never got off the ground. Maybe some alpha 
version? People certainly ran Mixmaster, Len Sassaman was a close friend.


But when Nick Matthewson left the Mixminion development team for Tor in 
2004 (and Andrei Serjantov, who with George Danezis were the main 
Mixminion theory guys, went in to the quant business) the rest of the 
PET crowd either followed into Tor or left, and there was nobody to 
develop Mixminion.


:(



Liked the story :)

Peter Fairbrother


Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread Peter Fairbrother

On 15/10/2021 19:24, Punk-BatSoup-Stasi 2.0 wrote:


Is that so? Cause if A and B are connected through a 'high speed' fully 
padded link, they can replace the 'chaff' with their data at will and with very 
'low latency'...



And no anonymity whatsoever.

Peter Fairbrother



Re: UFO: Inside the BlackVault, FOIA POSSE, MKULTRA, ARTICHOKE, BLUEBIRD

2021-10-15 Thread grarpamp
> what hardware would you include in the $250 kit?

Depends on what probes from the above list or others
you are interested to observe and can get for $250.

The market can pack a few cheap probes into a toy,
or pay a lot for one good probe.

Magnetometer or electric charge sensor could
be fun, because who is watching those at all today.
Vibrations to see that sort of activity.
Same for an electronic "nose" to sample and plot
whatever alien rat stench wafts your way.

Have fun :)


Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread grarpamp
On 10/15/21, Peter Fairbrother  wrote:
> perhaps I should have said low-latency browsing.

Defining what the end user application is, is required
if you want to design a net to carry it.
If the subject is about tor's feature as currently implemented,
the application scope is therefore narrow, one of only moving
TCP streams across the internet between client and server.
(Users can move UDP and even raw IP over top of that with
OnionCat, but that's no different, and is covered in other threads.)

Nothing about a base layer of chaff prevents
"low-latency browsing" as an application.

> You might perhaps do a reasonably low latency anonymous twitter for
> instance but not low-latency anonymous browsing.

Hardly anyone has developed, released, run, and iterated
over any chaffed or other designs than tor for that browsing
use case, so that probably cannot yet be said.

Tor has vacuumed up, propagandized, sucked the funds from,
steered via proceedings, and effectively killed all the competitive
research and development in the space for last 20 years.
That must end, ignore and stop worshipping Tor, go compete.

> It can matter if traffic is aggregated and an adversary can only see the
> aggregated traffic. It can matter if the adversary uses timing
> information to correlate the input and output traffic to a network
> (which he almost inevitably does).

Self contradicted, so then don't say they can only see the aggregate,
define the cases being for the suggested answers.

An entire class of TA is solely based on matching up i/o
across all nodes to find matches. Certain things don't
matter to such matching engines.

> Not if it was a randomly-variable one year delay they couldn't.

If your app is "browsing", or doing any other TCP stream,
yes they can, such streams have other identifiable
traffic characteristics than just arrival and inter packet timing,
such as total size of transfer, TCP ramps, backoffs, etc.

Tor's hidden services are especially sitting ducks.

> Or if you took the timing data away.

Already explained reclocking as being useful.

> If it was like that, Tor could (and probably would) add a little bit of
> packet size restriction, and that would probably be enough to make it TA
> resistant.

No, TCP streams, their bulk data, etc... endpoints still characterizable.

> It's not TA-resistant because the design requirement for low latency
> buggered the design. You could add lots of covertraffic but it wouldn't
> help much - the lack of aggregation kills it as far as TA goes.

No, a network running a base of chaff already serves the purpose that
these "aggregation" functions tries to do... ie: such as networks with voids
keep scheming up ways to avoid their own voids such as by steering clients
to internal aggregating gravity wells, msg buffer stores, etc based upon
bandwidth weight consensus or other mechanisms.

> And the reason for the lack of aggregation (and no fixed packet sizes)
> is because they wanted low latency.

ATM networks were both low-latency, and fixed packet sizes,
and millions of happy users browsed the web over them,
a prior art proven and in use well before and after tor's birth.

So Tor's design assumptions and direction may well have
been buggered by something else...

Opensource projects are as subject to rat infestation and
influence as are miracle closed source commercial $nakeoil
crypto hardware from fabulously and errantly trusted US and Euro
locations and GovCorps, then just look at Debian, the internet's
history of corrupt "standards" bodies, TOP SECRET nudges
yet curiously missing the non-beneficial ones that are applied, etc...

> That is not the only way to go, though it was famously used in eg the
> US-USSR hotline. It is expensive.

No, the hotline was made up of leased circuits,
they paid the same leased line rate to the telcos whether
they were sending wheat, chaff, or nothing at all over them.
And they could pass precisely no more than the line rate
of the circuit that they provisioned allowed, regardless of
what they were sending.

> And a simple base layer wastes bandwidth.

Explained many times that it doesn't, chaff gets out
of the way and uses the wheat as chaff replacement
while wheat is present.

And if an edge user stuck on stupid limited byte based billing
wants to opt out of the constant chaff base, they can, they
just don't get its benefits and have to fall back on whatever
other defenses the network provides.

> Techniques like
> randomly-variable base rates, traffic aggregation, end-user sharing
> (which among other things blurs the edges of the network), directed
> covertraffic (where the covertraffic looks "guilty"), route splitting,
> latency jittering and so on are available to defeat TA at lesser
> bandwidth cost.

Except the techniques don't necessarily work when your use
case is TCP data streams... "browsing", file transfer, etc...
all have patterns of matching i/o characteristics between endpoints
and/or nodes.

End-users are still end-users a

Glad tidings

2021-10-15 Thread professor rat
ALEX the great, Gladstein is a superhuman rights activist

Igniting the biggest and most effective peaceful protest of all time

Planting a seed of liberty at the root of exploitation and tyranny. 

Establishing complete, utter, total worldwide domination - but not over 
governments or ideology. Over tyranny and isolation and ignorance. 
This is my Glad declaration of humanitarian principles - "to report the news 
without fear or favor'. 
I promise to be a force for good in this world, fighting injustice, crushing 
intolerance, battling inhumanity, striking a blow for freedom. 
Think Mises - think Rothbard -  think Alex - be Glad


Burying the Satoshi departure lede

2021-10-15 Thread professor rat
Correlation is not causation but Gavin Andresen previously served as technical 
lead developer for the Bitcoin project, and was even credited as Nakamoto’s 
successor.

On April 27, 2011, Andresen publically claimed to be preparing to talk Bitcoin 
at an emerging technologies conference at the CIA headquarters.
A few months after Andresen’s CIA visit, he appeared on a Bitcoin podcast to 
discuss its development. There, Andresen was quickly asked to reveal the last 
time he’d been contacted by Nakamoto.

“Um, I haven’t had email from [Nakamoto] in a couple of months, actually,” 
Andresen replied. “The last email I sent him, I actually told him I was going 
to talk at the CIA. So it’s possible that… that may have had something to do 
with their deciding [to leave].”


No danger from moral hazard at Bitcoin Magazine

2021-10-15 Thread professor rat
Nakamoto’s Genesis statement was a challenge to the moral hazard created by the 
Bank of England, which was functioning as a lender of last resort for British 
companies that had followed reckless policies and were now in danger of going 
bankrupt. . . "

Or it was a news headline from the Times, a corpse-media outlet beat-up into a 
crypto-fascist headline by the unconscionable scoundrel Alex Gladstein at his 
favorite corpse-media outlet.


Risible weasel-words from bitcoin zine

2021-10-15 Thread professor rat
"...To underline the primary importance of scarcity and predictable monetary 
issuance in the making of digital cash, Nakamoto released Bitcoin not after a 
government surveillance scandal, but in the wake of the Global Financial Crisis 
and ensuing money printing experiments of 2007 and 2008. .."

Who needs money printing experiments when you have e-money capable of Big God 
divisibility?
Bitcoin is divisible up to eight decimal points. 1011 The smallest unit, equal 
to 0.0001 bitcoin, is called a Satoshi after the pseudonymous developer 
behind the cryptocurrency. ... Though the U.S. dollar can be divided into 
cents, or 1/100 of $1, one Satoshi is just 1/100,000,000 of 1 BTC.


Why Wikileaks sold all its crypto

2021-10-15 Thread professor rat
"... digital rights advocacy groups have largely not recognized nor celebrated 
the role that proof of work and an unchanging monetary policy can play in 
protecting human rights. . . "

Alex Gladstein


Libertarian support for the police

2021-10-15 Thread professor rat
https://crookedtimber.org/2013/06/25/the-hayek-pinochet-connection-a-second-reply-to-my-critics/

The Hayek-Pinochet Connection

https://mises.org/library/are-libertarians-anarchists

Mises worked for the Pinochet of the early 1930's - Dolfuss in Austria


NAZI Nick Szabo needs killing ( My 2000$ )

2021-10-15 Thread professor rat
Szabo had certainly aimed for it with bit gold, and others inspired by Austrian 
economists like Fredrich Hayek and Murray Rothbard had long discussed getting 
the creation of money out of government hands. .."

How do you reconcile libertarianism with support of the police?
I’ll admit — my original question was not phrased so diplomatically. It went 
more along the lines of, OMG what is wrong with you? Do you have any idea how 
fascist you sound on Twitter?? Nick Szabo

https://elaineou.com/2020/06/07/how-do-you-reconcile-libertarianism-with-support-of-the-police/


Using a peer-to-peer network to check for bullshit narratives

2021-10-15 Thread professor rat
“Bitcoin’s solution is to use a peer-to-peer network to check for 
double-spending… The result is a distributed system with no single point of 
failure. Users hold the crypto keys to their own money and transact with each 
other, with the help of the P2P network to check for double-spending...”

Cryptoanarchy's solution is to use a peer-to-peer network to check for 
double-talking… The result is a distributed system with no single point of 
failure. Users hold the freely distributed crypto keys to their own free 
e-money and transact freely with each other, with the help of the P2P network 
to check for double-dealing.


Alex Gladstein needs killing ( My 200$ )

2021-10-15 Thread professor rat
In 1999, Back finished his Ph.D. in distributed systems and began work in 
Canada for a company called Zero Knowledge Systems. There, he helped build the 
Freedom Network, a tool that allowed individuals to browse the web privately. 
Back and his colleagues used what are known as “zero-knowledge proofs” (based 
on Chaum’s blind signatures) to encrypt communications over this network, and 
sold access to the service.

Back, as it turns out, was also ahead of his time on this key innovation. In 
2002, computer scientists improved on Zero Knowledge System’s model by taking a 
U.S. government private web browsing project called “onion routing” open 
source. They called it the Tor Network, and it inspired the age of the 
virtual-private networks (VPNs). It remains the gold standard for private web 
browsing today…"
OR
In 1995, Bell finished his essay in distributed systems and began work in 
Cypherpunks for a company called Soft Drill Apster Systems. There, he helped 
build the Freedom Network, a tool that allowed individuals to predate the web 
publically. Bell and his colleagues used what are known as “open-source 
propaganda-of-the-deed” (based on anarchists signature, direct-action) to 
value-add communications over this network, and increase access to the service.

Bell, as it turns out, was also ahead of his time on this key innovation. In 
2003, pentagon paid computer scientists improved on this Networked anarchists 
System’s model by taking a U.S. government private web bounty project called 
“Future Maps” open source. They called it the PAM Network, and it inspired the 
age of the public bounty hunter. It remains the gold standard for anti-social 
crime minimization today.


Bitcoin Magazine lies about cypherpunks

2021-10-15 Thread professor rat
"... Some cypherpunks were crypto-anarchists — deeply skeptical of the modern 
democratic state. Others believed it was possible to reform democracies to 
preserve individual rights. No matter what side they took, many considered 
digital cash to be the Holy Grail of the cypherpunk movement…"
OR
Some cypherpunks acted as revolutionary anarchists diametrically opposed to any 
and all nation-states, even the best and most popular of them . Their credo is 
" Cypherpunks are all about privacy for the poor and transparency for the 
powerful ". Cryptoanarchism, via global networked revolution, is the goal of 
this movement.

Bitcoin magazine lies-by-omission about the three list c-punks that were jailed 
1995 - 2002


Re: Encrypted "WebMail" Hardly Secure, Consider Standalone and Unix [re: OpenPGP.js Features]

2021-10-15 Thread grarpamp
On 10/15/21, Steven Schear  wrote:
> Or perhaps GrapheneOS.

That's one of those ever spawning and dying wannabe
secure Android OS lineants. And those only begin to get
safer when they strip the google suite out of the stock Android.
Ok yes use them if you need to run Android-only apps, but
Android and its apps are generally as abysmal for privacy
and security as WinMac. And a lot of its apps won't run
without g-suite social-suite sdk libs or unlocked permissions.
Yet if it's a phone / phablet / web-only form factor you
want, Linux and even nearly BSD kernels will run on
some of the ARM64 models now, and you can run
Android emulator on amd64.
Android perhaps a bit moot re the subject, since where
are any particularly useful/featured email+gpg clients for
it... the small form factor exacts a mandatory toll there.
Which is an opportunity for any coders who can utilize it...


Play anarchist games for a few years and real anarchists start showing up.

2021-10-15 Thread professor rat
Play anarchist games for a few years and real anarchists start showing up.

https://bitcoinmagazine.com/.image/c_limit%2Ccs_srgb%2Cq_auto:good%2Cw_526/MTg0NTM0NjU1NTM2NDczMjA4/eric-hughes-email-announcing-the-list.webp


Back your favorite blockchain and profit

2021-10-15 Thread professor rat
Both BTC and ETH are chasing the ATH, which was only established earlier in the 
current bull run. When BTC runs, so do the Alts. 

https://help.augur.net/

On Augur, It doesn't matter where you are, how much you want to trade, or what 
event you want to trade on as long as someone is willing to take the other side 
of your trade.

This guide is intended to help users; traders, market creators, and reporters; 
navigate the application. For immediate questions or assistance, join the Augur 
Discord chat.

Augur Pro is an Ethereum-based prediction market plaform that enables 
user-created markets, which are resolved by REP holders. Access help docs for 
Augur Pro here.

Augur Turbo is a layer two (Polygon) based prediction market that features 
daily markets in sports, crypto, and other categories


Beginning of the Leninist cypherpunk revolution

2021-10-15 Thread professor rat
Beginning of the Leninist cypherpunk revolution

https://bitcoinmagazine.com/culture/bitcoin-adam-back-and-digital-cash

…and the Stalinist cult of Big Dog/God


Re: Encrypted "WebMail" Hardly Secure, Consider Standalone and Unix [re: OpenPGP.js Features]

2021-10-15 Thread Steven Schear
Or perhaps GrapheneOS.

On Sat, Oct 9, 2021, 10:32 PM grarpamp  wrote:

> > https://opensource.com/article/21/10/openpgpjs
>
> Not your code provisioning, not your keys, not your privacy.
>
> All these online web crypto email services...
> you're trusting an untrustable third party web services,
> which exist and grovel to survive under license incorporation
> taxation permission and at leisure of untrustable government,
> to deliver unsigned unaudited crypto libs on the fly over the
> web into your browser for execution... that's fatal, and
> gets routinely exploited by authorities, snoops, courts,
> companies, crackers, admins, etc.
>
> If too incompetent and dumbed down from living
> a life of WinMac garbage to learn and use something
> like gnupg locally to safely cut and paste, at least consider
> using something like Mozilla Thunderbird as a mail client
> which includes gpg as a standalone local email crypto tool.
>
> WinMac is an online security spyveillance profiling phonehome
> datawhoring exploit nightmare and it just keeps getting worse.
>
> People really should start learning and using a unix...
> They're well documented, run great on common hardware,
> run web, office, mail, comms, emulators, games, cryptos,
> database, GUI, etc... and are free so you can donate
> to support development.
>
> https://www.freebsd.org/
> https://www.openbsd.org/
>
> https://archlinux.org/
> https://linuxfromscratch.org/
> https://www.kernel.org/
> https://www.debian.org/
>


Get your FIL here

2021-10-15 Thread professor rat
The collaboration enables Flow users to mint NFTs, leverage InterPlanetary File 
System (IPFS) content addressing and store tokens in the decentralized storage 
hosted by Filecoin.

https://cointelegraph.com/news/flow-integrates-filecoin-storage-services-to-make-nfts-more-decentralized

According to Filecoin, IPFS content addressing is a solution to location 
addressing, which retrieves online information from specific locations on the 
web, such as from behind URLs. Filecoin asserts that this method has “obvious 
downsides” as the data relies on the centralized entities who own the locations 
and can “control the content.”

“In content-based addressing, content is no longer retrieved from single 
locations on the web. Rather, content is retrieved from any participating nodes 
on the IPFS network that have the content you’re requesting,” Filecoin outlined.


Those who trade Freecoins for Shit-coin deserve neither freedom or stability.

2021-10-15 Thread professor rat
Those who trade *essential* Freecoins for Stable-shit-coin deserve - and will 
get -  neither freedom or stability.

https://decrypt.co/83560/cftc-fines-tether-bitfinex-us-dollar-reserves


Re: Releasing the KrakenSDR!

2021-10-15 Thread Steven Schear
Might be great for passive radar.

On Fri, Oct 15, 2021, 6:58 AM grarpamp  wrote:

> Did someone's wallet just get lighter :)
>
> It's rx-only though... cpunks still need a way to communicate
> freely worldwide without using GovCorp infrastructure, passing
> beyond borders of jurisdictions and continents... via encrypted RF.
> Using both shorter HF P2P hops, but also reaching out as far
> as possible using whatever antenna you can manage to raise
> or lay down...
>
> https://en.wikipedia.org/wiki/Extremely_low_frequency
> https://en.wikipedia.org/wiki/Spark-gap_transmitter
>
> Jim may volunteer for the new quantum radio division...
> https://duckduckgo.com/?q="quantum+radio";
>


Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread coderman
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


‐‐‐ Original Message ‐‐‐
On Friday, October 15, 2021 12:09 AM,
 PrivacyArms  wrote:

> To clarify my question: Is there an anonymous network (GPA)
> for secure/private messaging better than Tor?

privacy loves company, so the unpleasant answer to your question
is: no, there's nothing remotely as popular as Tor that is also
a GPA resistant mix network.

... remember when people ran mixminion? :P
[ https://github.com/mixminion/mixminion ]



> Regarding the other question: What can criminals can do
> to stay anonymous which is outside the law (hacking/stealing
> computers/wifi), more?

one time, a retired person noticed someone connected to their WiFi
that was not a client name nor MAC ID recognized.

curious, they broke out the directional antenna and packet sniffer
to find out the signal was coming from the next door neighbor.

odd! being retired, and knowing that they neighbor, they went next
door to ask if they were having network trouble, and how they managed
to leach the WPA passphrase?

alas, the neighbor was none the wiser! their computer was wired into
the router. yes, it had a WiFi card, but Ethernet was easier. the
 neighbor not so technically savvy after all.

the retired one taks a look at the desktop. behold! a trojan process.
the retired one worked in tech, and knew how to use a disassembler.
but it wasn't even that hard - it was a compiled script, and the source
was sitting in memory.

- ---

next the retired person geolocated the command and control host.
it was in europe, another country away, but our retired friend also
has friends in many countries. time for a visit!

arriving on a flight to brussels, a travel agency office was observed
at the C&C end. they lease a dedicated line for internet, it was
setup a decade ago by the owner's son. they don't know how it works,
but it costs 160 euros a month.

"mind if i take a look at your router?" the retired one asks?

 ' sure thing.'

a static forward is provisioned between the public port and a private
internal address. checking the DHCP/IP assignments (there is a static
one assigned to a mystery client) the retired one finds a client
associated over wireless, another hop: this one a coffee shop across
the street.

- ---

in the cofeee shop our retired one followed the signal analyzer to
its natural conclusion : a USB powered SoC under a table with an
antenna in the direction from whence just travelled!

but where does it go? a dual radio SoC, not unsimilar to a pineapple,
the local side was leeching coffee house WiFi for upstream.

*sigh* time to tear apart the sdcard ...

 [ break for refreshments ]

"damnit! a wireguard tunnel to a bullet proof hosting server!"

our retired person is again compelled to travel. this time a friend
of a friend who runs the hosting service for bitcoin and monero.

sheer luck we happened to have a contact!  calling in a favor,
our retired adventurer found the customer. there is no contact or
registrar info, of course. but this IP address looked familiar!

- ---

back at the coffee shop, with a new MAC ID to hunt for,
a woman in the rear corner of the store sticks out as signal source.


"excuse me, are you a hacker?", our retired friend asks.

   'yes.. i saw you looking for something. i thought it might be me',
she says with a sly smile.

   'how did you find me?'


[ our retired subject explains the process of recusion ...
  after many minutes, reaching the terminus in this tale. ]


'ah, that explain it.' she says satisfied.
'my threat model was law enforcement, not batshit crazy!'


THE END.
-BEGIN PGP SIGNATURE-

iNUEAREKAH0WIQRBwSuMMH1+IZiqV4FlqEfnwrk4DAUCYWm0FF8UgAAuAChp
c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0NDFD
MTJCOEMzMDdEN0UyMTk4QUE1NzgxNjVBODQ3RTdDMkI5MzgwQwAKCRBlqEfnwrk4
DCSEAP9pB8KNe7Ai4wJqIaObCbvThGP9efsbDVv5X+dDTs1YIgD+J/hBJICF+zhy
uWrcEy4ToP28cd3cYZlMegBiOZaeCs4=
=7dJX
-END PGP SIGNATURE-



Freud’s crackpot theories were of no scientific worth

2021-10-15 Thread professor rat
https://blogs.scientificamerican.com/mind-guest-blog/9-things-you-probably-didn-t-know-about-sigmund-freud/

Surely no decent honest c-punk would ever cite this Quack approvingly!


Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread Peter Fairbrother

On 15/10/2021 11:07, grarpamp wrote:

Anonymity is hard, and low-latency anonymity is almost impossible.


People keep throwing this "low latency" term around as if it's
some kind of distinction, a proven generality, lesser capable to
anonymity, than any other particular "latency" level. This is bogus.


There is a smigdin of truth in that, but there's probably more in the 
simple use of the term low-latency, or perhaps I should have said 
low-latency browsing.


You might perhaps do a reasonably low latency anonymous twitter for 
instance, but not low-latency anonymous browsing.



Latency is just a timing measure, whether your traffic events,
sessions, and characteristics occur over milliseconds, or days,
traffic analysis doesn't give a shit. 


It can matter if traffic is aggregated and an adversary can only see the 
aggregated traffic. It can matter if the adversary uses timing 
information to correlate the input and output traffic to a network 
(which he almost inevitably does).


You could drop a 1 year

store and forward packet buffer delay on every interface in
the entire tor cloud and the NSA could still analyze it.


Not if it was a randomly-variable one year delay they couldn't. Or if 
you took the timing data away.


If it was like that, Tor could (and probably would) add a little bit of 
packet size restriction, and that would probably be enough to make it TA 
resistant.



That's because tor's design is hardly TA resistant,
not because it's "low-latency".


It's not TA-resistant because the design requirement for low latency 
buggered the design. You could add lots of covertraffic but it wouldn't 
help much - the lack of aggregation kills it as far as TA goes.


And the reason for the lack of aggregation (and no fixed packet sizes) 
is because they wanted low latency.



They also use it as apology and to avoid doing dynamic
base of chaff, because they are application layer7 people
who don't understand how raw packet networks work at <=L3
and how to use them to run a base layer of dynamically
yielding chaff to ride your wheat over on demand.


I think you are being overly optimistic/simplistic here.

That is not the only way to go, though it was famously used in eg the 
US-USSR hotline. It is expensive.


And a simple base layer wastes bandwidth. Techniques like 
randomly-variable base rates, traffic aggregation, end-user sharing 
(which among other things blurs the edges of the network), directed 
covertraffic (where the covertraffic looks "guilty"), route splitting, 
latency jittering and so on are available to defeat TA at lesser 
bandwidth cost.



Fixed sizes of cells, etc.


Yeah, that's almost a requirement. Certainly makes life easier.


"Low latency" really just defines the point at which users
switch from thinking "Hey this is fast enough to surf the web
(or whatever their use case)", to "This shit's too damn slow
to do anything, I'm out."


Which is about 4 seconds for web browsing today (a few studies have been 
published),


.. though in the days of acoustic modems it was longer ..




Anonymous remailers could work


They're a bit harder since a "message" gets injected into a
proper random mix/cloud/buffer, and is not an e2e stream tacked
up across it. Yet without chaff on every link, message size
controls, etc... they can still fall to TA the same way tor does.


Iirc Mixmaster has message size control. It doesn't have or need 
specific per-link chaff, but it does have chaff - nobody knows/knew how 
much, it was added by individual users.


Per-link chaff might help against some injected traffic attacks, but it 
is not strictly necessary.





but they are pretty much moribund now.


Still useful if you want to use "E-Mail" addresses over "E-Mail" networks,
and should continue to be developed and deployed for that legacy purpose.
But for the general purpose of "messaging" they are largely now rightly
replaced by dedicated p2p message network apps that don't have to
compromise themselves to "E-Mail"s old protocol restrictions and trust model.



I don't know of any strict anonymity p2p apps.


Peter Fairbrother


ADAM BACK linked to murder in Malta

2021-10-15 Thread professor rat
https://decrypt.co/82371/former-malta-government-official-becomes-whistleblower-in-nft-form


Pervasive use of cryptography across society must be anarchist

2021-10-15 Thread professor rat
The alternative is Marxist - a nightmare

https://arxiv.org/abs/2110.07450


Re: FUCK Wikileaks

2021-10-15 Thread Karl
Hey PR,

Earlier you referred to me as 'kreepy', so I'm stepping back on the
question asking a lot.

I want to let you know that I'm interested in learning where you come
from and figuring out how to make things right.

On 10/11/21, professor rat  wrote:
> RE -   'information' from 'CHRISTIAN SCIENTISTS'.
>
> This should interest every c-punk paying even the most minimal amount of
> attention.
>
> Despite having tens of millions ( crypto donations profits ) and access to
> the worlds best lawyers in one of the most libel-suit friendly jurisdictions
> outside of frikkin' SINGAPORE, Wikileaks never sued.
>
> Bob Hawke sued papers that lied about him in Au ( based on British Law ) and
> won. Elton John sued a paper in England and won.
>
> If Mange was innocent why on earth wouldn't he sue low-credibility Xtian
> scum from the corpse-media? Or anyone that repeated them in the Anglosphere
>
> He can't be as fucking stupid as Gramps, Semich and Batshit, can he?
>
> Wikileaks are worse than criminals - they are mistake-prone Nazbol MORONS
>


Re: UFO: Inside the BlackVault, FOIA POSSE, MKULTRA, ARTICHOKE, BLUEBIRD

2021-10-15 Thread Karl
>> The response here should be to set up _public_ monitoring so we can see
>
> It's now possible for people to crowd design an opensource
> rooftop mounted all spectrum monitoring sensor rig...
> 180 degree hemisphere video cameras in visible and infrared,
> audio, RF antennas, active panel radar, magnetometer, etc...
> design a range of rigs buildable for $250-$2500 depending
> on sensitivity, sensors included, etc.
> Feed it down inside to a CPU doing gnuradio processing,
> video audio detection motion software, recording, alerting, etc.
> Space the nodes every 1-5-10-25-50-100 km as can be,
> link them all across the internet to get wide area detection
> and tracking coverage.

what hardware would you include in the $250 kit?


Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread grarpamp
> Anonymity is hard, and low-latency anonymity is almost impossible.

People keep throwing this "low latency" term around as if it's
some kind of distinction, a proven generality, lesser capable to
anonymity, than any other particular "latency" level. This is bogus.
Latency is just a timing measure, whether your traffic events,
sessions, and characteristics occur over milliseconds, or days,
traffic analysis doesn't give a shit. You could drop a 1 year
store and forward packet buffer delay on every interface in
the entire tor cloud and the NSA could still analyze it.
That's because tor's design is hardly TA resistant,
not because it's "low-latency".

They also use it as apology and to avoid doing dynamic
base of chaff, because they are application layer7 people
who don't understand how raw packet networks work at <=L3
and how to use them to run a base layer of dynamically
yielding chaff to ride your wheat over on demand.
Fixed sizes of cells, etc.

"Low latency" really just defines the point at which users
switch from thinking "Hey this is fast enough to surf the web
(or whatever their use case)", to "This shit's too damn slow
to do anything, I'm out."

> Anonymous remailers could work

They're a bit harder since a "message" gets injected into a
proper random mix/cloud/buffer, and is not an e2e stream tacked
up across it. Yet without chaff on every link, message size
controls, etc... they can still fall to TA the same way tor does.

> but they are pretty much moribund now.

Still useful if you want to use "E-Mail" addresses over "E-Mail" networks,
and should continue to be developed and deployed for that legacy purpose.
But for the general purpose of "messaging" they are largely now rightly
replaced by dedicated p2p message network apps that don't have to
compromise themselves to "E-Mail"s old protocol restrictions and trust model.


Batshit crazy in Texas

2021-10-15 Thread professor rat
NBCNews
· 13h
NEW: A school administrator in Southlake, Texas, advised teachers last week 
that if they have a book about the Holocaust in their classroom, they should 
also have a book with an "opposing" perspective.


Bitcoin dot con

2021-10-15 Thread professor rat
https://www.bitcoin.com

Come to Jesus, scam

Needless to say " Bitcoin Cash " is to Big Dog what Roger Ver is to Jesus 
Fucking Christ.


Re: Dishonest Tor relay math question - tor-talk is to lazy

2021-10-15 Thread Peter Fairbrother

On 15/10/2021 01:09, PrivacyArms wrote:

To clarify my question: Is there an anonymous network (GPA) for secure/private 
messaging better than Tor?

Regarding the other question: What can criminals can do to stay anonymous which 
is outside the law (hacking/stealing computers/wifi), more?


Anonymity is hard, and low-latency anonymity is almost impossible.  A 
brief history:


In 1981 David Chaum described mix networks (including onion routing). 
This was only possible because of the then-recent invention of public 
key cryptography. This idea was then instantiated as the Cypherpunks 
anonymous remailer, then the Mixmaster remailer.


A further development, Mixminion, was in the works in the early to mid 
noughties, but was derailed when its chief coder, Nick Matthewson, 
decided to work on TOR instead.


Anonymous remailers could work, but they are pretty much moribund now.


The same year, in "True Names", Vernor Vinge described a "feed", whereby 
short encrypted messages were aggregated and broadcast. Chaum described 
a similar idea, incorporating dummy traffic, and other plans involving 
private information retrieval. [2]


None of these have come to fruition.



So no, there are no "strict" anonymous networks in existence. By 
"strict" I mean mathematically provable, without requiring trusting 
another person.


Nor are there any effective widely-deployed anonymous networks which 
only require trusting any one out of many people.




There are several less-than-strict techniques, which may or may not 
work.  You could "use other people's computers" by chaining through a 
few web proxies. You could internet cafes, hack into wifi (perhaps using 
a box connected via an IR link) or relay through a chain of pwned boxen.


Sneaky people might well think of some more, but I wouldn't put them in 
an email. :)




Secure messaging, as opposed to anonymous messaging, where 
confidentiality rather than anonymity is the requirement, is of course 
possible - there are several apps, or you could almost write your own 
(don't do it, I said "almost"!).


Just make sure it is really end=to=end and there are NO dedicated [1] 
servers involved anywhere - there is no cryptographic need for a 
dedicated server in a secure messaging network. If there is one then you 
are trusting it to do something; and remember the 6th law:


"Only those you trust can betray you."




Peter Fairbrother

[1] by dedicated I mean you have to use a particular server. If you have 
to use any one of several servers it might be OK if you (can) run your 
own server. Or it might not. No server is safer]



[2] Chaum's 1981 MS thesis, "Untraceable Electronic Mail, Return
Addresses, and Digital Pseudonyms" contains almost all the types of 
strict anonymous communication ever invented, worth a read.


http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf

Vernor Vinge's True Names is of course required reading:

https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjqu4Pr7MvzAhVTglwKHRBJBfEQFnoECAIQAQ&url=http%3A%2F%2Fwww.scotswolf.com%2FTRUENAMES.pdf&usg=AOvVaw0u3GgYC_zdrgFmYrmP2DAA


All those rapists - and their jailhouse lawyers

2021-10-15 Thread professor rat
https://www.buzzfeed.com/stephenlaconte/celebrities-who-dont-deserve-fame-reddit

"The royal family. I just don’t understand why anyone gives a fuck about them."


Re: LAN cables can be sniffed to reveal network traffic with a $30 setup, says researcher • The Register

2021-10-15 Thread grarpamp
On 10/15/21, jim bell  wrote:
> https://www.theregister.com/AMP/2021/10/14/lantenna_ethernet_cable_rf_emissions/

Cables are designed to control crosstalk and other undesirable effects,
meet FCC, cut costs, lower power, etc... not to fight the TEMPEST.


LAN cables can be sniffed to reveal network traffic with a $30 setup, says researcher • The Register

2021-10-15 Thread jim bell
https://www.theregister.com/AMP/2021/10/14/lantenna_ethernet_cable_rf_emissions/