20TB,you'll%20enjoy%20unlimited%20data
>> .
>> >
>> > And their data caps, where they still exist, are 1 terabyte/month,
>> which I think would be plenty for an anonymity network.
>>
>> The problem is that a reliable cheap anonymising network for low-latency
exist, are 1 terabyte/month,
> which I think would be plenty for an anonymity network.
>
> The problem is that a reliable cheap anonymising network for low-latency
> traffic like web traffic is basically impossible.
>
> Tor is about as good as we can get. When I was designing m-o-o-t I
&
for low-latency
traffic like web traffic is basically impossible.
Tor is about as good as we can get. When I was designing m-o-o-t I
didn't include any web anonymiser for that reason.
The problem is traffic volume and latency. If we want low-latency web
traffic - nowadays [1] that's less than 4
, are 1 terabyte/month, which
>> I think would be plenty for an anonymity network.
>>
>>
>> 2.Extensive chaff. (which, of course, is an old idea, strangely it's
>> not yet implemented in TOR)
>>
>> 3."Output nodes" would outp
On 10/12/20, Dr Gerard Bulger wrote:
> Torrc allows you to exit from a different IP. I thought it a good idea to
> stop arbitrary blocking of the advertised Tor exit IP, the captchas and
> blacklists that tor users suffer.
Relay operators are free to do that for those reasons.
An
t;
> 2. Extensive chaff. (which, of course, is an old idea, strangely it's
> not yet implemented in TOR)
>
> 3. "Output nodes" would output only in encrypted form, so that people
> generally could not get in trouble for acting as an
> output node: Their output
On Tuesday, October 13, 2020, 03:13:30 PM PDT, Stefan Claas
wrote:
Karl wrote:
>> I'm burning out a bit so I want to add,
>> Please if you have better ideas of what _to_ do, suggest them.
>> Haven't read any proposals yet.
>An alternative to Tor could be the Nym Networ
Karl wrote:
> I'm burning out a bit so I want to add,
>
> Please if you have better ideas of what _to_ do, suggest them.
> Haven't read any proposals yet.
An alternative to Tor could be the Nym Network, once in production.
The Nym team is a good team and have well known
On 10/13/20, Karl wrote:
> On 10/13/20, coderman wrote:
> ...
>> you could monitor sockets and streams for activity, then queue chaff
>> traffic
>> if needed to fill in toward target rate, or some time-delayed logarithmic
>> fall-off...
>>
>>
>> have fun!
>>
>> best regards,
>
> wow thanks!
On 10/13/20, coderman wrote:
...
> you could monitor sockets and streams for activity, then queue chaff traffic
> if needed to fill in toward target rate, or some time-delayed logarithmic
> fall-off...
>
>
> have fun!
>
> best regards,
wow thanks!
‐‐‐ Original Message ‐‐‐
On Monday, October 12, 2020 10:36 PM, Karl wrote:
...
> `tor_main` appears to be in tor_api.c . If you want to memorize the
> basics of how tor works, that's the next file to look in. That's all
> for now, folks!
for Unix like sys
> On 10/13/20, Punk-BatSoup-Stasi 2.0 wrote:
>>> > The information is unknown to the vast majority of tor users,
>>> > including
>>> > all the tor users who use tor in 'dark markets' and end up in jail.
>>>
>>> That's important information
On 10/13/20, Punk-BatSoup-Stasi 2.0 wrote:
> The information is unknown to the vast majority of tor users, including
> all the tor users who use tor in 'dark markets' and end up in jail.
That's important information. You spew a lot of hard to believe
extreme interpretations, do yo
```
tor]$ grep -r 'main(' src/app
src/app/config/or_options_st.h: int LogMessageDomains; /**< Boolean:
Should we log the domain(s) in which
src/app/main/main.c:/* Main entry point for the Tor process. Called
from tor_main(), and by
src/app/main/main.c:tor_run_main(const tor_main_configuratio
On 10/12/20, grarpamp wrote:
>>> It looks like your OpenSSL headers don't match what Tor expects during
>>> `configure`.
>
> Giving the type errors during cc .o.
I don't understand you here. What do you mean?
>
>>> You can try building and linking agains
>> It looks like your OpenSSL headers don't match what Tor expects during
>> `configure`.
Giving the type errors during cc .o.
>> You can try building and linking against your own SSL, ala:
>> ./Configure --prefix=/usr no-idea no-rc5 no-mdc2 zlib-dynamic threads shared
hey thanks for your response,
On 10/12/20, coderman wrote:
> Hello Karl!
>
> It looks like your OpenSSL headers don't match what Tor expects during
> `configure`.
>
> You can try updating your openssl-devel libraries, (sometimes called libssl,
> libcrypto, ssl-dev, e
Hello Karl!
It looks like your OpenSSL headers don't match what Tor expects during
`configure`.
You can try updating your openssl-devel libraries, (sometimes called libssl,
libcrypto, ssl-dev, etc. Check accordingly for your distro).
You can try building and linking against your own SSL, ala
t; > its source.
> >
> > s/A/B/ is sed script substitution notation. It means replace A with
> > B. I tell jokes because I'm in pain, and I'd rather share nice things
> > than harm, especially if those nice things could have some important
> > small part.
> >
note that this is only building little-t tor the application, and not a whole
bundle, like Tor Browser, which includes the launcher app, and a modified
Firefox, and tor.
regarding configure, some other options that might be useful building against
your own libs, and on win32:
export CFLAGS
>
> s/A/B/ is sed script substitution notation. It means replace A with
> B. I tell jokes because I'm in pain, and I'd rather share nice things
> than harm, especially if those nice things could have some important
> small part.
>
> A lot of people are working on the Tor projec
, especially if those nice things could have some important
small part.
A lot of people are working on the Tor project. You can see what
they're working on at https://gitweb.torproject.org/ . I have no clue
how to use gitweb to actually get source code, but I'm pretty good at
guessing people's [s/social
, especially if those nice things could have some important
small part.
A lot of people are working on the Tor project. You can see what
they're working on at https://gitweb.torproject.org/ . I have no clue
how to use gitweb to actually get source code, but I'm pretty good at
guessing people's [s/social
https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html
https://www.hackerfactor.com/blog/index.php?/archives/890-Tor-0day-Replying-to-the-Tor-Project.html
https://www.hackerfactor.com/blog/index.php?/categories/19-Tor
Hackerfactor...
"
I read off the ad
On Wed, Sep 16, 2020 at 05:54:17PM -0400, grarpamp wrote:
> https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-01
Thanks for posting this link.
https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-01
>> do some exit relay operators have a policy to prevent connections
>> leaving their exit node via non-encrypted ports (e.g. port 25)?
>>
>> not even wanting to be in a
>> position to observe users' data passing through the exit node in clear
>> text.
>> hoping that encrypted connections
>>
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using
Throughput Fingerprinting
Prateek Mittal et al. ACM CCS 2011
https://dl.acm.org/doi/pdf/10.1145/2046707.2046732
https://www.cryptolux.org/images/b/bc/Tor_Issues_Thesis_Thill_Fabrice.pdf
"Tor Stinks" -- NSA ;)
-- Forwarded message --
From: nusenu
Date: Thu, 20 Aug 2020 22:47:55 +0200
Subject: [tor-talk] >600 Tor relays without ContactInfo and similar properties
To: tor-t...@lists.torproject.org
Since the Tor directory authorities are no lo
Decrypt: Hackers steal Bitcoin through large-scale exploit on Tor: report.
https://decrypt.co/?p=38359
, at worst presenting a DoS condition.
Its too bad the Tor project won't answer his calls or accept his patches -
it seems at first glance he'd be a solid addition to the project.
I hope this conversation ultimately does more good than harm. The techradar
article is advertising VPNs and 'privacy
TechRadar: Multiple zero-day vulnerabilities in Tor have been disclosed online.
https://www.techradar.com/news/tor-network-hit-by-two-major-zero-day-attacks
the NSA's fangs on literally every fiber
optic cable and in every exchange they can weasel into, GPA. They are
difficult to defeat unless you are filling the network with fill
traffic such that they can't tell wheat from chaff. Tor doesn't do
this.
.. At this point the middle node could als
Hi,
Long story short:
A Tor dev "pastly" on OFTC muted me ("remotecontrolledboy") in their off
topic channel relating to asking about an event some years ago with
coderman. pastly and I also had some positive interactions supporting
users of Tor and did not stop me from slig
http://blackholecloud.com/
BlackHoleCloud
Now with Shadowsocks, Wireguard, OpenVPN, Stunnel, and a Tor Bridge.
Dedicated VPN servers matched to a Tiny Hardware Firewall VPN endpoint
Build your servers in 19 cities around the globe
Introducing our newest and fastest security solution: the J2157
On 06/18/2020 04:31 PM, coderman wrote:
> it's all about attack surface (to a lesser degree, hardening).
>
> when FaceBook bought 0day dev against their own user, the weak link was a
> video player - not Tor Browser, not tor, nor Tails model, but a video
> implementation insi
‐‐‐ Original Message ‐‐‐
On Wednesday, May 27, 2020 2:59 PM, John Young wrote:
> Barton Gellman claims in Dark Mirror that NSA hacked Tor Browser
> Bundle. (pp.79-81). Snowden warned "disable the fucking Javasripts."
>
> https://twitter.com/Cryptome_/status/1265
On 5/24/20, Karl wrote:
> A general purpose network sounds nice. Everything is doable.
>
> What do you think of forking the codebase of an existing network, like tor
> or gnunet or one of the newer examples from anonymity research?
What networks ultimately do, whether they are
First grarpamp, now John Young!
These breaches of the public trust by our "esteemed" Western institutions is a
source of great anger for some.
The evident compromises that have and continue to exist within organisations
such as the Tor Inc board, is entirely insidious.
To chan
Barton Gellman claims in Dark Mirror that NSA hacked Tor Browser
Bundle. (pp.79-81). Snowden warned "disable the fucking Javasripts."
https://twitter.com/Cryptome_/status/1265658170195804164
At 10:27 AM 5/27/2020, you wrote:
From: Vasilis
To: torserv...@freelists.org
Subject: Re
to implement
multiple software concepts.
Jim Bell
On Sunday, May 24, 2020, 02:59:42 PM PDT, Karl wrote:
A general purpose network sounds nice. Everything is doable.
What do you think of forking the codebase of an existing network, like tor or
gnunet or one of the newer examples from
A general purpose network sounds nice. Everything is doable.
What do you think of forking the codebase of an existing network, like tor
or gnunet or one of the newer examples from anonymity research?
On Thu, May 21, 2020, 1:55 AM jim bell wrote:
> On Wednesday, May 20, 2020, 07:27:40 PM
https://arstechnica.com/information-technology/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/
"Tor hasn't changed, it's the world that's changed." -- Tor Project
Five years later, tor still looks same as 20 years prior,
while world adversaries advance
problem is that advances in such networks generally require implementing
entirely new networks to check out new algorithms and new features, such
improvements are strongly deterred. After all, that's one reason that TOR
doesn't get as many improvements as we might like. (Another reason
re implementing entirely new networks to check out new algorithms and
> new features, such improvements are strongly deterred. After all, that's one
> reason that TOR doesn't get as many improvements as we might like. (Another
> reason is that it is financed, at least in part, b
are strongly deterred. After all, that's one reason that TOR
doesn't get as many improvements as we might like. (Another reason is that it
is financed, at least in part, by people who are hostile to a "too-good"
anonymization system.)
Sure, we could implement a new set of nodes, hopefull
should'.
>
> Moot since this chaff fill does not rate limit or impede wheat traffic,
> some overheat but user should see roughly same speed
> as tor, i2p, phantom, etc.
>
> > the basic architecture for an overlay that works as "tor replacement".
>
> Would rather s
On Thu, May 14, 2020, 5:02 AM grarpamp wrote:
> > the basic architecture for an overlay that works as "tor replacement".
>
> Would rather see a TA resistant general purpose overlay
> transport network that can serve many uses. A 'tor replacement'
> would be just o
see roughly same speed
as tor, i2p, phantom, etc.
> the basic architecture for an overlay that works as "tor replacement".
Would rather see a TA resistant general purpose overlay
transport network that can serve many uses. A 'tor replacement'
would be just one module in that.
orks fine.
> you can't just foward traffic from
> the overlay to the arpanet web cesspool and expect anonimity
That's further approachable with some network fill design
than it is with tor or anything else today that do nothing.
Possibly even a 10x odds reduction or more.
> Services that
> web cesspool servers send data in
> big chunks/high speed bursts, which is not compatible with constant rate
> links.
They are, your ISP rate or physical link speed already
serves as max rate, or go test set a lower rate in your
packet filter, things work fine, just slower.
>> https://lists.cpunks.org/pipermail/cypherpunks/2020-May/080509.html
>> mid: CAD2Ti282noLJEugQ8dQ6BAnbfxdz8DDy1xUpNAXSXMxHNN
Being potentially applicable to a more abstract generic overlay
transport network handling modular applications, one perhaps
being 'replacing tor'...
adly it gets attacked and broken.
Then scrap or amend it, and code and deploy it.
Or skip all those traditional formalities and just start
hacking stuff together.
> The one situation that I consider intolerable is that TOR remains as a
> monopoly in the "anonymization marketplace"
and qualifications to write the software. An additional
complication is that whoever volunteers, he might not be trusted by others.
What is to be done?
The one situation that I consider intolerable is that TOR remains as a monopoly
in the "anonymization marketplace".
Jim Bell
chieving private online
communications. other.architekt fell into the same false assumption about Tor,
not realising the very real and known problems directly about privacy on the
Tor network.
When some folks discover they have been deceived in their thinking in this way,
there will be backlash agains
we agree that 1,000 quantity will be a
good initial "critical mass" for this project?
A thousand independent node operators isn't a small number.
>> tor is currently
larger,
<https://metrics.torproject.org/networksize.htm
l
but>https://metrics.torproject.org/n
agree that this is a matter that needs to be discussed. But no doubt you've
heard of the saying, 'the perfect being the enemy of the good'.
> Can we agree that 1,000 quantity will be a good initial "critical mass" for
> this project?
A thousand independent node operator
> Yes, VoIP via UDP works very well through Tor with OnionCat. However,
> both endpoints must be running Tor and OnionCat. Basically, all devices
> running Tor and OnionCat have IPv6 addresses in the same /48 subnet. So
> any such device can connect with any other.
> But _not_ with
HA! Tor now shadow-banning! What a golden moment (not) for "free
communication" :D
On Mon, Mar 30, 2020 at 09:42:08PM -0400, grarpamp wrote:
> Regarding...
>
> https://lists.torproject.org/pipermail/tor-relays/2020-March/018243.html
> https://i.imgur.com/VG7pm3S.jpg
Regarding...
https://lists.torproject.org/pipermail/tor-relays/2020-March/018243.html
https://i.imgur.com/VG7pm3S.jpg
Tor's censors did not let below truth through,
cowardly let it expire quietly, while approving the others.
"
Your mail to 'tor-relays' with the subject
Re: [tor-r
On 3/6/20, William Pate wrote:
> This constantly trips me up. In my modem settings, I'm offered these options
> for port forwarding. I know I need to open 9001, but what do I enter into
> the external port fields?
> https://lists.torproject.org/pipermail/tor-relays/attachments/20200
Tor Project sometimes censor and manage speech on its mailing lists
from some various facts, alternative points of view, free and open
convo, news journalist articles, inquiry, critique of Tor Project itself, etc...
perhaps some of the links below may be of interest or merit, or
even be nothing
Convo on Cloudflare Tor Mozilla via StopMITMInternational
https://github.com/mozilla-mobile/focus-android/issues/1743
ge become known, particularly when parallel construction
and various [il]legal processes around the world effectively allow
those trump cards to remain secret, thus not triggering defensive
moves and arms races to their disadvantage.
This isn't specific to tor, it's the nature of the entire netsec ga
50-100+k salaries start being depended upon,
YouTube channels censored to keep tidy public message,
bury evidences, etc. Cigarettes were hide to cause cancer
for decades, what if people knew those facts?
Tor is increasingly analyzed by analysts over years due its mass,
others care for its users too
‐‐‐ Original Message ‐‐‐
On Thursday, February 13, 2020 10:59 AM, John Young wrote:
...
> https://documentcloud.org/documents/6775056-20200211.htm (pages 20-21)
https://www.documentcloud.org/notes/print?docs[]=6775056
20200211
206 Pages - Contributed by Alexa O'Brien, Alexa O'Brien
> How about https://nymtech.net/ ?
Who knows whatabout such things.
Post such random links to the list instead,
and maybe people will evaluate about it there.
> On Sat, Nov 23, 2019 at 8:22 AM wrote:
>> > low-latency
>>
>> This phrase is misused by many as if it were some kind
>> of litmus test
On Fri, Feb 14, 2020 at 01:43:41PM -0800, C. Comet wrote:
> >
> > One way blogs - OWBs:
> > Important points:
> > - OWBs are, due to present tech, not anonymous.
> > - They simply provide the possibility that something you write or some
> > document (say an Affidavit) that you upload, cannot
Jurisdictions:
User visible blog names might contain the jurisdiction, say:
AUS.MyExMateJimIsABastard.OwBloggPlt23jf.onion/...
MyExMateJimIsABastard.OwBloggPlt23jf.onion/AU/...
and then if an Australian court issues an injunction against
"$CODE.MyExMateJimIsABastard.OwBloggPlt23jf.onion/",
On Fri, Feb 14, 2020 at 09:52:58AM +1100, Zenaan Harkness wrote:
> and due to the contract, and default tech policies in place in
"-implicit- technical contract by virtue of the default policies in place"
[You know, it seems quite difficult to speak precisely...]
guess...
The infrastructure is probably something like:
- a VM/VPS
- ssh
- git
- user db
- sync scripts, push and/or pull depending on peer conf
- OWB software/platform
- tor
- web server to deploy blog as .onion html site
and the only parts to develop are the sync scripts, u
o helo-gunships.
Possible names:
- one way blog
- speak your facts
- one way facts
- facts don't lie
- true news
- bloody nasty muffas exposed
etc
> At 05:31 AM 2/13/2020, you wrote:
> > Anyone know of a Tor site which is basically a blog site, but effectively
> &g
forth. Git,
Full-Disclosure, Dark Web, alternatives to internet as watering
holes, stings, recruitment hangouts, why even this very cess pit. Trust us.
At 05:31 AM 2/13/2020, you wrote:
Anyone know of a Tor site which is basically a blog site, but
effectively only allows additions of
Anyone know of a Tor site which is basically a blog site, but effectively only
allows additions of documents, attachments and pages (sort of like git stores
all history) - perhaps based on git?
This is sort of like a wikileaks, but unfiltered/ unadjudicated, and also not
for any government
g physically found in
>> the *first place*. Look for cases where the servers were mysteriously
>> just "found", with rest of timeline unfolding after that secret or
>> questionable moment. Tor and other networks are sold as being
>> able to protect from such netwo
On Sun, Feb 09, 2020 at 10:02:03PM -0500, grarpamp wrote:
> https://cryptome.org/2020/02/marques-62.pdf
> https://www.wired.com/2013/09/freedom-hosting-fbi/
>
> For example, these are some example of the type of
> suspicious quotes lacking any further details that people
> can spot littering
On 02/09/2020 05:23 PM, grarpamp wrote:
> Question how exactly the servers are being physically found in
> the *first place*. Look for cases where the servers were mysteriously
> just "found", with rest of timeline unfolding after that secret or
> questionable moment.
https://cryptome.org/2020/02/marques-62.pdf
https://www.wired.com/2013/09/freedom-hosting-fbi/
For example, these are some example of the type of
suspicious quotes lacking any further details that people
can spot littering cases and investigate further in their
analysis project of cases...
"It's
the cases is not what was done to the
servers and users *after* the servers were cracked remotely over
tor or whatever other overlay network, or similarly done *after* being
physically found... that's obviously going to be some silly exploit.
Question how exactly the servers are being physical
On 2/9/20 3:40 AM, grarpamp wrote:
> “We can’t have a world where a government is allowed to use a black box of
> technology from which spring these serious criminal prosecutions,”
This guy is from another planet (like most lloigors. Yes you can. You
do. You ALWAYS will, as long as there are
The code had attacked a Firefox
> vulnerability that could target and unmask Tor users—even those using
> it for legal purposes such as visiting Tor Mail—if they failed to
> update their software fast enough.
The article answers the question.
Rr
signature.asc
Description: OpenPGP digital signature
against tor and
overlay networks in general, and the large number of these
"mystery gaps" type of articles (some court cases leaving hardly
any other conclusion with fishy case secrecy, dismissals, etc)...
the area of speculative brokeness and parallel construction
seems to deserve serious inv
NullTX: Darknet Operator Faces 30 Years in Jail yet his Arrest Raises Many
Tor-related Questions.
https://nulltx.com/darknet-operator-faces-30-years-in-jail-yet-his-arrest-raises-many-tor-related-questions/
> So what can we do to achieve the ideal distributed network?
> Throttle all (nodes) to the slowest... to get the best diversity?
> We need all (nodes), whether high or small capacity. Don't we?
Tor is a form of gravity well. If the cloud is not saturated,
adding more nodes incre
> https://pando.com/2019/10/23/we-sold-pando/
https://pando.com/author/ylevine/
Might want to see that articles from the
above author and others on the subject
are archived.
I think the most common tech term is "depreciation". Tor should be o marked
on their boot page but that assumes there is a practical replacement.
On Sat, Dec 14, 2019, 2:38 AM grarpamp wrote:
> >>> snowden also said that
> >>> the NSA can't break tor.
>
On Sat, Dec 14, 2019 at 11:57:32AM -, Spirit of Nikopol wrote:
> On Sat, December 14, 2019 2:36 am, grarpamp wrote:
> >>>> snowden also said that the NSA can't break tor.
> >>> Such blanket context is unlikely.
>
> [.]
>
> > Also unfortu
On Sat, December 14, 2019 2:36 am, grarpamp wrote:
>>>> snowden also said that the NSA can't break tor.
>>> Such blanket context is unlikely.
[.]
> Also unfortunate that, today, one of the few places still
> propagating such blankets, in reverse via false advertis
>>> snowden also said that
>>> the NSA can't break tor.
>> Such blanket context is unlikely.
> was
Also unfortunate that, today, one of the few places still
propagating such blankets, in reverse via false advertising,
downplaying, failing to mention, etc... is the To
On 12/12/19, Logforme wrote:
> My ISP ... does not provide ... and has no roadmap
> I can't switch ISP since they provide the fiber connection for the
> apartment building.
Seems you should be building out your own
P2P fiber mesh guerrilla network house-to-house
owner-to-owner, each node
https://www.youtube.com/results?search_query=tor+vs+vpn
https://www.youtube.com/watch?v=1EsPIIwnAXM
Tor vs VPN podcast
https://www.youtube.com/watch?v=5qE4J-7Iwzc
https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/videos
>> http://www.hackerfactor.com/blog/index.php?/categories/19-Tor
>
> That article links to another article which some may find much more
> interesting (same author apparently):
My link above is not a link to an article, it's to a blog tag
that collates 22 articles about more way
On Mon, Dec 02, 2019 at 07:01:55PM -0500, grarpamp wrote:
> http://www.hackerfactor.com/blog/index.php?/categories/19-Tor
That article links to another article which some may find much more
interesting (same author apparently):
https://www.hackerfactor.com/blog/index.php?/archives/789-Cy
http://www.hackerfactor.com/blog/index.php?/categories/19-Tor
On Thu, Nov 14, 2019 at 12:06:19PM +1100, Zenaan Harkness wrote:
> On Wed, Nov 13, 2019 at 07:06:26PM -0300, Punk-Stasi 2.0 wrote:
> > https://www.freehaven.net/anonbib/cache/active-pet2010.pdf
> >
> > "Suppose the adversary runs just two routers. If we take into
>
ave still chosen not to tip their hat.
Many now take crypto donations.
Or just start some non-profit or cypherpunk collective
and do it all in public under the sun of free speech.
Even ignoring any meta issues of who, where, for how much,
why etc... tor and other networks would still take lots of va
Various wrote:
> "seconds of traffic" refers to the global buffer space
> and time required for *PA find a solution within it.
> I've wondered whether it's just that they need lots of users for cover
> traffic. That _was_ a major factor in opening Tor to the public, in
On Sun, Dec 01, 2019 at 11:17:59AM +0100, Adéla Eastmund wrote:
> > Few want to do 1, 3, or 4, because when done right,
> > there's no profit or control over other people for them
> > to have, and that's how it should be.
>
> That's what cypherpunks are her for tho.
> Nobody makes any money from,
https://web.archive.org/web/20160429124221/techeye.net/news/tor-developer-helps-spooks-hack-tor
A former Tor Project developer is making a living creating malware for
the Federal Bureau of Investigation that allows agents to unmask users
of the anonymity software.
201 - 300 of 687 matches
Mail list logo