Don’t use Tor. It does not provide anonymity. The Tor network transmits your
information directly to the CIA. Someone I used to know worked there. He then
found a high-status job on Google.LOL
5, 2021 20:03, jim bell wrote:
> Gizmodo: Someone Is Running Hundreds of Malicious Servers on the
> https://therecord.media/a-mysterious-threat-actor-is-running-hundreds-of-malicious-tor-relays/
> A mysterious threat actor is running hundreds of malicious Tor relays...
Gizmodo: Someone Is Running Hundreds of Malicious Servers on the Tor
Network and Might Be De-Anonymizing Users.
https://therecord.media/a-mysterious-threat-actor-is-running-hundreds-of-malicious-tor-relays/
A mysterious threat actor is running hundreds of malicious Tor relays...
If you knew how many nodes have been both removed since years,
and how many are still running and coming every day, you would
Gizmodo: Someone Is Running Hundreds of Malicious Servers on the Tor Network
and Might Be De-Anonymizing Users.
https://gizmodo.com/someone-is-running-hundreds-of-malicious-servers-on-the-1848156630
ome nextgen p2p overlay-exit networks are now working with...
there can be other reasons people may run different versions...
tor the software is different from from Tor Project Inc.
The software is opensource and BSD licensed. Thus anyone
may copy, run, share, redistribute, fork, modify, support
> But they are launching a censored
> "forum" soon so that those who don't like censored "lists"
> can freely choose another way to be censored.
Here is the new place to go if you want to be
censored by these freespeech hypocrites
and whitewashers of user risk, corporate
embarassment, and design w
that was really good.LOL.
> So someone lurks the list masturbating to it for years
> without ever posting a single word, then such claimed
LAUGH OUT LOUD :)
Sent from ProtonMail for iOS
Açık Pzt, Eki 18, 2021 10:43, grarpamp yazdı:
>> I was here, living in the Bay Area
>> ...
>> sitting aroun
that was really good.LOL.
> So someone lurks the list masturbating to it for years
> without ever posting a single word, then such claimed
LAUGH OUT LOUD :)
Sent from ProtonMail for iOS
Açık Pzt, Eki 18, 2021 10:43, grarpamp yazdı:
>> I was here, living in the Bay Area
>> ...
>> sitting aroun
> I was here, living in the Bay Area
> ...
> sitting around, looking at porn and jacking off
> ...
> on people from the shadows
So someone lurks the list masturbating to it for years
without ever posting a single word, then such claimed
code expert decides to hello world just to whine that
they ch
yeah, so he can hide that he's a nationalist asshole like you
Sent from ProtonMail for iOS
Açık Pzt, Eki 18, 2021 09:28, Xander Samurai yazdı:
>> By the way, responding to a private email to a public list, outing
>> someone's private email address, is generally considered to be a dick
>> move,
> By the way, responding to a private email to a public list, outing
> someone's private email address, is generally considered to be a dick
> move, especially when it's done deliberately.
Dear Ed,
This list is not what it used to be years ago. It's FULL of dicks! With no
dignity, no basic ethics,
The problem is, we're not gonna get rid of you and Trump supporters like you.
I'm trying to make sure they don't use the Tor network instead of shading
people. I'm preventing them from using a network that clearly connects to the
CIA.
you're a dickhead who knows no
On Mon, 18 Oct 2021, space aliens made zeynepaydogan write:
The question is, what is a guy like you doing here.
There's no place for nationalists here
I was here before you were born. I was here, living in the Bay Area and
having dinner with Tim May, when this whole list started. I met Eric
gt; ‐‐‐ Original Message ‐‐‐
> On Sunday, October 17th, 2021 at 11:56 PM, zeynepaydogan
> wrote:
>
>> yes, you can work for the tor and work on Google in the moment. it's yours
>> to have that hypocrisy
>>
>> Sent from ProtonMail for iOS
>>
>
yes, you can work for the tor and work on Google in the moment. it's yours to
have that hypocrisy
Sent from ProtonMail for iOS
Açık Pzt, Eki 18, 2021 01:23, Ed Carp yazdı:
> Considering that Google has moved 180 degrees from it's "Do no evil" founding
> to giving
By the way, responding to a private email to a public list, outing
someone's private email address, is generally considered to be a dick
move, especially when it's done deliberately.
Do you think it’ ok? Is everything all right?
Sent from ProtonMail for iOS
Açık Pzt, Eki 18, 2021 01:03, Ed Carp yazdı:
> Isn't the Google NDA incompatible with working at Tor?
>
> Sent with [ProtonMail](https://protonmail.com/) Secure Email.
>
> ‐‐‐ Original Message
Yup.
It was never the end. The question we need to ask is how much @torproject
getting paid for it. They criticized Google's privacy policy. Ironically, a
software developer working in Tor is currently working at Google. what position
does he/she’s work in? “Privacy Lead”
Sent from Proto
This is an IRC log from #tor-internal - our water cooler irc channel. It was
made on November 10th, 2014. I have created this log because it is absolutely
essential that everyone on tor-internal@ see the internal live chat related to
the recent tor-internal@ mailing thread.
Please be considerate
22:20 < ioerror> If we have a CIA person working at Tor, many of us will be put
in danger .
https://medium.com/@zeynep.201844/tor-b1cd6ec45542
Sent from ProtonMail for iOS
>> Thing is, I don't trust Claudia to get it right (we have a history... ).
history?
‐‐‐ Original Message ‐‐‐
On Saturday, October 16, 2021 1:34 PM, Peter Fairbrother
wrote:
> On 16/10/2021 10:12, Stefan Claas wrote:
>
> > On Sat, Oct 16, 2021 at 10:24 AM Peter Fairbrother pe...@ts
.
>
>
>
> The loopix part looks interesting, at first glance. Though "a
> measure of sender and receiver unobservability" is not exactly reassuring..
Well, I mentioned Nym, because, once in production, it could be an
alternative to Tor. They already have a test net running
nd, but...
- You don't have to, users will emit more chances for you.
- Matching engines software and hardware have advanced light
years ahead of where they were 10++ years ago when
those slides were generated, while tor has remained static [1].
The Tor Project and its people knew of the traffic a
On 16/10/2021 10:12, Stefan Claas wrote:
On Sat, Oct 16, 2021 at 10:24 AM Peter Fairbrother wrote:
Though there's no such thing as 100% anonymity, security, etc...
there are certainly different comparative magnitudes of it available
today, and higher ones are probably quite achievable with som
On 16/10/2021 12:00, grarpamp wrote:
On 10/16/21, Peter Fairbrother wrote:
Except the increased bandwidth cost. And if you have to have padding
between each node, or on each link, that becomes very expensive.
...
[whatever FUD's/month]
Again, no, users have already bought whatever speed they
ly big and or otherwise unique transfer.
> low latency
There's that FUD phrase being used again as if it means something
[when] it doesn't.
> low added cost
There's that FUD phrase being used again as if it means something
[when] it doesn't.
> a gpa that was and is not
On Sat, Oct 16, 2021 at 10:24 AM Peter Fairbrother wrote:
> > Though there's no such thing as 100% anonymity, security, etc...
> > there are certainly different comparative magnitudes of it available
> > today, and higher ones are probably quite achievable with some
> > work on new alternative mo
a base-chaff-flow
web system]
Tor has vacuumed up, propagandized, sucked the funds from,
steered via proceedings, and effectively killed all the competitive
research and development in the space for last 20 years.
Yep. Totally agree there.
An entire class of TA is solely based on matching up
On 15/10/2021 18:03, coderman wrote:
‐‐‐ Original Message ‐‐‐
On Friday, October 15, 2021 12:09 AM,
PrivacyArms wrote:
To clarify my question: Is there an anonymous network (GPA)
for secure/private messaging better than Tor?
privacy loves company, so the unpleasant answer to your
On 15/10/2021 19:24, Punk-BatSoup-Stasi 2.0 wrote:
Is that so? Cause if A and B are connected through a 'high speed' fully
padded link, they can replace the 'chaff' with their data at will and with very
'low latency'...
And no anonymity whatsoever.
Peter Fairbrother
an application.
> You might perhaps do a reasonably low latency anonymous twitter for
> instance but not low-latency anonymous browsing.
Hardly anyone has developed, released, run, and iterated
over any chaffed or other designs than tor for that browsing
use case, so that probably cannot yet
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
‐‐‐ Original Message ‐‐‐
On Friday, October 15, 2021 12:09 AM,
PrivacyArms wrote:
> To clarify my question: Is there an anonymous network (GPA)
> for secure/private messaging better than Tor?
privacy loves company, so the unpl
matter if the adversary uses timing
information to correlate the input and output traffic to a network
(which he almost inevitably does).
You could drop a 1 year
store and forward packet buffer delay on every interface in
the entire tor cloud and the NSA could still analyze it.
Not if it was
us.
Latency is just a timing measure, whether your traffic events,
sessions, and characteristics occur over milliseconds, or days,
traffic analysis doesn't give a shit. You could drop a 1 year
store and forward packet buffer delay on every interface in
the entire tor cloud and the NSA could still
On 15/10/2021 01:09, PrivacyArms wrote:
To clarify my question: Is there an anonymous network (GPA) for secure/private
messaging better than Tor?
Regarding the other question: What can criminals can do to stay anonymous which
is outside the law (hacking/stealing computers/wifi), more
1) Is there a better way for anonymous communication than Tor?
2) Is there a global adversary resistant mixnet?
3) Someone mentioned the fact, that criminals have better ways of hiding than
Tor? What methods do you had in mind?
‐‐‐ Original Message ‐‐‐
On Tuesday, October 12, 2021 2
> Tor uses some kind of limited padding,
Tor Project Inc added netflow padding after someone
started posting on netflow, general TA, and Sybil problems.
Then TPI censored, banned, and booted them out after
they kept publicly posting about TA and other insidious and
inconvenient problems such
On 11/10/2021 04:59, Punk-BatSoup-Stasi 2.0 wrote:
On Mon, 11 Oct 2021 03:18:15 +
PrivacyArms wrote:
Thanks. I will read the linked paper, but Tor uses connection padding. Maybe
your information is out of date?
Nah. Tor uses some kind of limited padding,
It's designed so
> but if you threat model is nation state,
> you've got bigger problems ... :P~
The threat model of the State is Freedom,
you've got to deliver that big problem to them.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
‐‐‐ Original Message ‐‐‐
On Friday, October 8, 2021 8:05 AM, Stefan Claas
wrote:
> the assumed number of malicious nodes is much higher.
> Then you do not include the assumed number of honest, but
> compromised nodes.
*this* is the
>> hard to monitor and log it.
>
>
> don't spread misinformation karl. There's no 'probable cause' of
> anything
> at play here, and the implicit claim that attaking tor is 'hard' is
> bullshit.
I feel irritated. Is what you are saying true? Would my expression
have landed better if I hadn't used that phrase?
On Sun, Oct 10, 2021, 2:03 AM Peter Fairbrother wrote:
> On 10/10/2021 [offlist] wrote:
> > If the US is compromised by 100%, Tor would not work at all, right?
>
> For providing reliable anonymity against the US and UK government
> agencies in the form of the NSA and
ruth
because their paychecks depend on keeping the issues
buried from their funders and users.
Tor Project Inc is full of $hit, they lie, they censor,
they're hypocrites, they hide and refuse to answer,
they kick out independents, spend more time
on wokestering than work product, and more.
To
On 10/10/2021 [offlist] wrote:
> If the US is compromised by 100%, Tor would not work at all, right?
For providing reliable anonymity against the US and UK government
agencies in the form of the NSA and GCHQ, yes, Tor is completely useless.
Against a lesser adversary, well there are m
c warrants (and a warrant for traffic data for a Tor node
would be almost automatically granted anyway)..
Also any traffic which *goes through* the US or UK is traffic-compromised.
Peter Fairbrother
‐‐‐ Original Message ‐‐‐
On Friday, October 8, 2021 7:35 AM, grarpamp wrote:
How
What I want to know is the percentage risk of x malicious nodes to deanonymize
a user by controlling the full circuit.
‐‐‐ Original Message ‐‐‐
On Friday, October 8, 2021 7:35 AM, grarpamp wrote:
> > How can I calculate how much impact X honest Tor relays have?
> > Is
Hi,
IIRC the assumed number of malicious nodes is much higher.
Then you do not include the assumed number of honest, but
compromised nodes.
How much would your equation help Tor users, in different
locations, if ISPs would hand over to third parties who is
using Tor with port 9050 and 9051, so
> How can I calculate how much impact X honest Tor relays have?
> Is it better to calculate with bandwidth consumed (250Gbps), despite the
> number of relays (~7000)?
>
> Basically, I want to get the mathematical equation to this statement:
> I run X Tor relays at Y Mb/s each
Dear Cypherpunks community,
I came across a post on the Whonix forum recently. Since I am also interested
in this question I copied it here:
https://forums.whonix.org/t/math-behind-honest-tor-nodes/12464
http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/t/math-behind
On 10/3/21, grarpamp wrote:
> On 9/28/21, PrivacyArms via tor-talk wrote:
Hello PA
https://lists.torproject.org/pipermail/tor-talk/
Tor Project staffers didn't reply in over a week to your list post.
And via the three day mailman expiry period, Tor Project has again
cowardly and
On 9/28/21, PrivacyArms via tor-talk wrote:
> Dear Tor community,
>
> I came across a post on the Whonix forum recently. Since I am also
> interested in this question I copied it here:
> https://forums.whonix.org/t/math-behind-honest-tor-nod
Someone leaked the internal logs. (2014) Tor hasn’t felt the need to make any
statements about the leaked data. when i asked, the community team lead (Tor)
wrote to meHe said:
I'm curious about "the daily log was leaked". What does this exactly mean?
He learned that informatio
Someone leaked the internal logs. (2014) Tor hasn’t felt the need to make any
statements about the leaked data. when i asked, the community team lead (Tor)
wrote to me
He said:
I'm curious about "the daily log was leaked". What does this exactly mean?
He learned that informatio
ion that anything they say regarding logs is true.
There is also no penalty, if operators are not well known big public persons
the VPN's just shutdown, rebrand, reboot.
Assuming that everything is logged forever is the
better starting point.
> The Tor project can’t help anonymously.
Softwar
Use a no-logs VPN. The Tor project can’t help anonymously.Don’t respect a
community where people who say they're incompetent behind each other's backs.
in 2014, the daily log was leaked. Tor hasn't made a statement about it. And
some of them work in highest ranked position
ugh a snake.
NYM seems more generic dev-platformish,
MAID-SAFE seems more storage-ish,
neither seem to offer an alternative to tor
for users to browse the clearnet automagically,
ie would require clunky nature of adding
edge services similar to false.i2p, perhaps
even requiring special new brow
MaidSafeCoin (MAID) was launched in February 2006. It is a project that aims to
decentralize the Internet. According to the developers, its concept predates
Bitcoin (BTC) by several years.
The SAFE network works similarly to the TOR network, meaning that all online
content is distributed and
llywood.
>
> Stupid pirate scene hasn't evolved much since
> days of FTP... some crews are still using it, lol.
> They advanced to decrypt Blu-Ray and DVD, screencap,
> etc... but still hardly taking distribution seriously.
>
> [delete]
>
> >Unfortunately, Tor P
tion seriously.
[delete]
>Unfortunately, Tor Project is fixated on disallowing its
users any freedom to make their own tradeoff choices
as to how to use and deploy its [formerly] flexible overlay
software as such... with that Tor Project is destroying
users ability to share freely as they see fit.
eneral... news, books, code, video conversations, etc...
need to do is use tor+onioncat+bittorrent
and the entire planet full of all those needing to
distribute all sorts of data securely anonymously (to a
certain level of tradeoff, as is everything in security)
will benefit from the anonymo
https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru
https://docs.paloaltonetworks.com/cortex/cortex-xpanse/cortex-xpanse-user-guide/cortex-xpanse-expander/data/netflow-data.html
https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/
Those making allegations without evidence against Tor here resemble nothing so
much as that infamous Nazi-fag-moron, Batshit-crazy ( The Govt-Agent-Truther! )
Why it makes sense to group them together - and get rid of them together.
200 USD each to kill Gramps, Batshit and Semich.
" Fo
Speaking of all that...
The fact that "Tor Stinks -- NSA"...
the need to start fresh investigation, code, develop, and deploy
additional new alternative proof-of-concept networks, besides
the old 25 year legacy and vacuum that is Tor Project, utilizing
full-time base of chaff fill, and
You describe hungry wolves.
Predators watch their entire ecosystem, making paths where they need to, to
manage their prey.
Those paths shift when where they are, is no longer a good idea.
A rural hunter on a game trail, displaces the wolves. New paths form.
Some include chickens.
A blockchain
's also just what
> happens.
>
> Tor's ability to leave functionality gaps hinges on its users being unable
> to take advantage of them easily themselves.
Further helped by Tor's not equally presenting known risks,
censoring, ultimately leaving users ignorant and unto wolves.
On Sun, May 30, 2021, 4:50 PM Karl wrote:
>
>
> On Sun, May 30, 2021, 4:38 PM wrote:
>
>> On 2021-05-31 04:38, Karl wrote:
>> > One group I know lost access to their website multiple times, the old
>> > website stayed up and google directed people to it, they had to
>> register a
>> > new domain
On Sun, May 30, 2021, 4:38 PM wrote:
> On 2021-05-31 04:38, Karl wrote:
> > One group I know lost access to their website multiple times, the old
> > website stayed up and google directed people to it, they had to register
> a
> > new domain name ...
>
> Could you give me the group and the domain
On 2021-05-31 04:38, Karl wrote:
> One group I know lost access to their website multiple times, the old
> website stayed up and google directed people to it, they had to register a
> new domain name ...
Could you give me the group and the domain names?
git's gpg commits can in principle deal wit
Juan, do you know anything about the fake-looking websites that replace the
normal websites of controversial projects once they get well-known?
One group I know lost access to their website multiple times, the old
website stayed up and google directed people to it, they had to register a
new domai
My memory is not completely the same as yours, but it does seem important
to be willing to take and improve on things made by people we do not trust.
I lose some technical advantage by using mostly free-licensed software; it
reduces my options in emergencies.
Still, it's certainly very important
On Sun, 30 May 2021 12:53:10 -0400
Karl Semich <0xl...@gmail.com> wrote:
> Whenever you make a big project that threatens the major stuff, people come
> in and mess it up,
tor was created and is fully controlled by the US military. Do not
spread misinformation about it. Nob
Whenever you make a big project that threatens the major stuff, people come
in and mess it up, put others in powerful roles, send misleading
communications, adjust websites and dialogues to change public impact,
spend lots of money ... It's great to change that, but it's also just what
happens.
To
I posted back then that even simple netflow analysis by
cooperated ISP's, tier-1's, etc could be used to match
and discover endpoints. Then Tor/MPerry rolled out this padding.
It has some level of benefit against some netflow analysis
under certain use cases.
As with other "Tor
I received a message from the list!
Also I posted yet another wrong thing to the list I think?
Meanwhile, orbot stopped working for me. I wasn't get connections
through it. So I turned it off, and back on, didn't help. I turned
it off and tried running tor from termux, but it said
Well, I was confused when I posted that, but there's actually a whole
padding infrastructure set up that appears configurable somewhat.
https://github.com/torproject/torspec/blob/main/padding-spec.txt
With some review a proposal could theoretically be made to make things
constant-bandwidth for th
On Fri, 28 May 2021 10:10:29 -0400
Karl wrote:
> I'm looking at orbot and seeing it has "circuit padding" now. I don't know
> whether this meets the requirements of chaff, and would like to know.
according to their docs that padding is supposedly a defense against
'netflow' based anal
Looks like circuit padding's been around for 2 years now. Guess I'd better
plan to learn its limits eventually.
[thread:schizo]
to fix
the situation. Repeat until actually fixed, shift environments if needed.
If I can get message delivery working for this list again, I can stick
around to stay on issues like the forthrightness of Tor for defending
journalists and activists. It would be helpful to know what is actually
nee
And I should mention whenever I post something: I'm still not
receiving messages from this list. It appears that gmail is bouncing
their delivery; Greg might be able to look into what the bounce
message is at some point, not sure.
ork distribution similar to my
mysterious speed cap
Additionally,
- leaving tor running locally for extended time has sometimes been a
way to make sure a system has an issue, for me
Instead, I've installed orbot on my phone, and I use adb's tcp
forwarding to use the phone as a tor client. Thi
HF posted:
> https://www.hackerfactor.com/blog/index.php?/categories/19-Tor
> https://twitter.com/hackerfactor/status/1341164309095694336
> "my years of previous interactions with the Tor Project had
> been met with everything from silence to outright hostility. ...
> With n
The Hacker News: Over 25% Of Tor Exit Relays Are Spying On Users' Dark Web
Activities.
http://feedproxy.google.com/~r/TheHackersNews/~3/keMzbRcpGLs/over-25-of-tor-exit-relays-are-spying.html
In the past an organisation would alter the website to compromise the
systems of its users, secretly installing malicious code on them to track
them.
https://www.helpnetsecurity.com/2016/11/30/exploited-de-anonymize-tor-browser-users/
This involves retaining a set of dangerous and publicly
-- Forwarded message --
From: Seth David Schoen
Date: Sun, 2 May 2021 23:20:05 -0700
Subject: [tor-talk] Looking for information about onion site user
deanonymization
To: tor-t...@lists.torproject.org
Hi tor-talk,
I'm working as a consultant to a criminal defense lawyer
> Which ISP is better?
They all suck.
Go start your own ISPs and meshnets that actually gives a shit
about people, privacy, transparency, censorship, servers, speech,
freedom, crypto, and actually fights back against government
largesse, intrusion, regulation, power, etc.
Demand is high, you will
> See all the fun threads here before they delete them...
>
> https://lists.torproject.org/pipermail/tor-relays/2021-March/thread.html
The Freedom Infection spread to tor-onions,
and quickly got amputated by another censor...
https://lists.torproject.org/pipermail/tor-onions/2
Meanwhile, as Tor Project Incorporated and its Holier Than Thou
[anon] "moderators" more properly known as Censors continue
to refuse to let [certain] people post some topical centric to their
list charters, even when same topics were approved before in history...
Tor Project has
-- Forwarded message --
From: Lisa Winter
Date: Mon, 22 Mar 2021
Subject: Re: [tor-relays] Questing regarding Team Cymru Tor Relays and Bridges
Georg Koppen:
Weird - I got the following reply a few hours after submitting the mail:
>Your message has been rejected, proba
, --e-cigarettes or
> prescription drugs/devices.
>
> I have a zoom meeting with two attorneys from EFF.org on March 18. Stay
> tuned....and maybe ban PayPal.
>
> --potlatch
>
>> Am 3/11/21 um 12:42 AM schrieb potlatch:
>>
>>> Today I received a message from P
via reddit:
"""
You will currently not be able to access any v3 onion addresses, what is
happening is unknown, but it is potentially a huge attack on the entire
network. Earlier today I made a post outlining consequences I would be putting
into place to deter markets from funding DoS attacks ag
https://micahflee.com/2014/12/fact-checking-pandos-smears-against-tor/
Pando people (Yasha Levine, Paul Carr, and Mark Ames) and their #TorGate
followers haven’t presented a shred of technical evidence against Tor’s safety
Who smelled it dealt it?
Peter " Palantir " Thiel is a Pando investor!
> Four Seasons Total Interior Design
> https://twitter.com/mattblaze/status/1332442077309833217
Matt Blaze, who is Chair of board of directors of Tor Project Inc,
and supposedly a respected security analyst, appears to spend
more time twatting about stupid microphones, than removing
the ne
Another 600++ were removed in September.
Estimate 25-50% of all nodes are adversarial.
And the network is not very TA resistant.
With darknet markets constantly getting shut.
Tor Project still advertising false protection
and not putting up giant warning banners.
> more than
After people made suggestions years ago, Tor is only
now finally getting around to finding 300 bad relays...
https://lists.torproject.org/pipermail/tor-relays/2020-October/019045.html
protip: There are hundreds more than that...
https://www.hackerfactor.com/blog/index.php?/archives/897-Tor-0day-Crashing-the-Tor-Network.html
> circuit padding
> client-edge padding capability already built
Neither may have much impact on a global TA adversary.
Draw it on paper and start thinking like a TA,
if not obvious, then dro
(the total number of users is higher, but
>> at any time 1 million users are using the service) that is 150 million
>> bytes per month per user divided by 2,592,000 seconds per month, which
>> is 58 bytes per second per user or 463.32 baud.
>>
>>
>>
>> Looked
conds per month, which
> is 58 bytes per second per user or 463.32 baud.
>
>
>
> Looked at another way, if people always used an anonymity service the
> hops would multiply their traffic by say 5 times (3 times as in TOR is
> not enough). Covertraffic and file size
I'm curiou
per user divided by 2,592,000 seconds per month, which
is 58 bytes per second per user or 463.32 baud.
Looked at another way, if people always used an anonymity service the
hops would multiply their traffic by say 5 times (3 times as in TOR is
not enough). Covertraffic and file size padding tr
On 15/10/2020 00:30, Punk-BatSoup-Stasi 2.0 wrote:
On Wed, 14 Oct 2020 23:33:35 +0100
Peter Fairbrother wrote:
You're bragging about being part of the 'team' of US military scum
responsible for the tor scam. You being an english cunt means you were
the GCHQ 'representa
>
> On Wed, Oct 14, 2020, 6:34 PM Peter Fairbrother wrote:
>>
>>> On 14/10/2020 18:22, jim bell wrote:
>>>
>>>
>>> To put some BOTE numbers on that, suppose you want to provide for 1
>>> million concurrent users. You have about 150 TB per month user traffic
>>> to play with (500 x 1TB, ~3 hops), 1
101 - 200 of 801 matches
Mail list logo