I know that ponytail marthafucker from letsencrypt.org is on the line and his 
presence is relevant to tomcat.

So when I asked why use his software in light of TOR

instead of having a discussion I was logged off.

What a bunch of pussy grabbers .

China beat the virus you never will until you are extinct like the Apache.  The 
best thing you could do is have TRUMP  in charge. I love it when a plan comes 
together.

We at hacker one are making millions at your  incompetence.

Now be a good bitch and unsubscribe me.

[ ](https://mail.protonmail.com/#)[Mark as 
read/unread](https://mail.protonmail.com/#)
 Move to
 Move toLabel as

JeffEvans <jeffevans1...@protonmail.com>

21:58 (19 minutes ago)

To: jeffevans1...@protonmail.com
[ Custom Filter](https://mail.protonmail.com/#)
 Move to
 Label as
 ReplyReply allForward[More](https://mail.protonmail.com/#)
Show details

Sent with ProtonMail Secure Email. ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ On 
Thursday, 7 May 2020 19:39, JeffEvans <jeffevans1...@protonmail.com.INVALID> 
wrote: > So why use [letsencrypt.org](http://letsencrypt.org/) ? > > Sent with 
ProtonMail Secure Email. > > ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐ > On Thursday, 7 
May 2020 06:56, JeffEvans jeffevans1...@protonmail.com.INVALID wrote: > > > 
What is a URL ? > > O'reilly publisher "Networks is a very simple concept known 
only to a few" > > A url is divided up into three parts. > > HEAD : IP ADDRESS 
OF ORIGIN and DESTINATION > > BODY : contains Index.html from tomcat > > TAIL : 
CHECKSUM for developers to check the sum total number of bytes are same as in 
the body. Check if no bytes got lost on the way. > > TOR : when a user's URL 
travels through TOR network the origin ip address is extracted from URL and its 
ip address replaced instead. Then on the way back ip address is then placed 
back with users ip address so it can find it's way home. > > This system of 
SecureByDesign is so effective as consumer protection , that Facebook has moved 
its servers inside the TOR so as to quicken the network traffic travelling 
through TOR. Although they know they have exposed their server IP address to 
TOR. But they dont mind that. > > Obviously if you are dumb enough to login via 
a pop box or html form then the whole idea of using TOR is negated. > > SSL 
will encrypt and decrypt via its own dedicated port. > > --

Sent with [ProtonMail](https://protonmail.com) Secure Email.

Reply via email to