Peter Gutmann's pixel dust protection of privacy works as
an update for faith in elaborately futile shenanigans to evade
and to nab evaders inherently implanted in fetuses then re-implanted
in corpses: dust to dust.

Logs are as deceptive and who, what and how they log.
Machine designers and sysadmins artfully possessive
documentaries inherently evasive and capturing.

At 12:04 AM 2/5/2015, coderman wrote:
On 2/4/15, John Young <[email protected]> wrote:
> Darknet is hardly dark,  or no more than Tor anonymizes,
> ...

true; perhaps best quantified as: "no ISP asshattery".
 but fails like all earth human technology in face of capable attacker
with significant resources.

[ specifically, onion overlay avoids TCP RST, DNS redir, local network
ARP poisoning, IPv4/IPv6 BGP route jacking, transport privacy and
authenticity** attacks (rewrite proxy) ]

** key management, someone has to do it. and it is always cumbersome...

but that is nary a sliver in the sky of surface exposed, in typical
"rich web service" context, full of javascript and media handlers and
plug-ins, oh my!


tell us John, do your server logs show mostly complete or incomplete
downloads of Cfour? :P


Reply via email to