On 5/24/20, Karl wrote:
> A general purpose network sounds nice. Everything is doable.
>
> What do you think of forking the codebase of an existing network, like tor
> or gnunet or one of the newer examples from anonymity research?
What networks ultimately do, whether they are "for" voice,
Components of software are supposed to be reuseable, which is one of its
efficiencies. Of course, if there is some sort of flaw already present,
reusing it adopts the flaw. Nevertheless, I suspect that it is more valuable
to get SOMETHING working, relatively rapidly, especially if the same
A general purpose network sounds nice. Everything is doable.
What do you think of forking the codebase of an existing network, like tor
or gnunet or one of the newer examples from anonymity research?
On Thu, May 21, 2020, 1:55 AM jim bell wrote:
> On Wednesday, May 20, 2020, 07:27:40 PM PDT,
https://arstechnica.com/information-technology/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/
"Tor hasn't changed, it's the world that's changed." -- Tor Project
Five years later, tor still looks same as 20 years prior,
while world adversaries advanced 20 years and
On Wednesday, May 20, 2020, 07:27:40 PM PDT, other.arkitech
wrote:
‐‐‐ Original Message ‐‐‐
On Tuesday, May 19, 2020 10:41 PM, jim bell wrote:
Algorithm-agnostic anonymization network.
Let's say we are agreed that a new anonymization network should be implemented.
One
‐‐‐ Original Message ‐‐‐
On Tuesday, May 19, 2020 10:41 PM, jim bell wrote:
> Algorithm-agnostic anonymization network.
>
> Let's say we are agreed that a new anonymization network should be
> implemented. One problem is that advances in such networks generally
> require implementing
Algorithm-agnostic anonymization network.
Let's say we are agreed that a new anonymization network should be implemented.
One problem is that advances in such networks generally require implementing
entirely new networks to check out new algorithms and new features, such
improvements are
That sounds cool. Let's design and build it.
On Thu, May 14, 2020, 5:02 AM grarpamp wrote:
> > well yes you can rate limit any application. If you rate limit the
> web
> > browser then the typical 5mb pages (95% malware) won't load in
> 0.1s, 'like
> > they should'.
>
> Moot since
On Thu, May 14, 2020, 5:02 AM grarpamp wrote:
> > the basic architecture for an overlay that works as "tor replacement".
>
> Would rather see a TA resistant general purpose overlay
> transport network that can serve many uses. A 'tor replacement'
> would be just one module in that.
>
Do you
> well yes you can rate limit any application. If you rate limit the web
> browser then the typical 5mb pages (95% malware) won't load in 0.1s,
> 'like
> they should'.
Moot since this chaff fill does not rate limit or impede wheat traffic,
some overheat but user should see roughly
>> > web cesspool servers send data in
>> > big chunks/high speed bursts, which is not compatible with constant
>> > rate links.
Go play packet filter rate limits, works fine.
>> your ISP rate or physical link speed already
>> serves as max rate
> people could generally send
> dummy traffic to
> web cesspool servers send data in
> big chunks/high speed bursts, which is not compatible with constant rate
> links.
They are, your ISP rate or physical link speed already
serves as max rate, or go test set a lower rate in your
packet filter, things work fine, just slower.
On 5/9/20, jim bell wrote:
> At this point, I see the main impediment is finding somebody with the
> motivations and qualifications to write the software. An additional
> complication is that whoever volunteers, he might not be trusted by
While coders can provide design meta, coders can also
be
Okay, so what should I actually do? I didn't suggest this project intending
to make the decisions by myself, alone. I figured I might be one of dozens of
deciders who combine ideas to plan this.
At this point, I see the main impediment is finding somebody with the
motivations and
On Fri, May 08, 2020 at 06:17:37PM +, jim bell wrote:
> Excellent. I should mention that I have focussed on Raspberry Pi 4 merely
> because it was new, and seemed to be quite capable of serving as a
> anonymization node.
A warning Jim, you might consider calling any conceivable such
So long as it is much more profitable to prevent
and damage cybersecurity it is unlikely that any
scheme for reliable and trustworthy public
cybersecurity will be developed for any longer
than it takes to monetize it, following a
campaign to generate public trust with freeware
and high
It turns out that in two months, I will have the opportunity to announce this
project at a convention. I will be happy to do so if it appears that there
will be sufficient progress in the next two months. A fairly firm commitment
by someone to write the software would be an excellent start.
On Sat, Oct 26, 2019 at 10:30:36PM -0300, Punk - Stasi 2.0 wrote:
>
>
> here's another article with some interesting info.
>
> Freedom Systems 2.1 Security Issues and Analysis
> https://www.freehaven.net/anonbib/cache/freedom21-security.pdf
>
> 'freedom' was the name of
On Wed, Oct 23, 2019 at 05:15:57AM -0400, grarpamp wrote:
> >> ok, so that's actually one of, or the most fundamental requirement.
> >> The connection between user and 'network' HAS to have a fixed rate.
>
> Assuming "fixed rate" means "always filled to said rate" not
> "fillable up to said
On Thu, Oct 17, 2019 at 11:11:41PM +, coderman wrote:
> ‐‐‐ Original Message ‐‐‐
> On Thursday, October 17, 2019 10:31 PM, Punk wrote:
> > ...
> > ok, so that's actually one of, or the most fundamental requirement. The
> > connection between user and 'network' HAS to have a fixed
20 matches
Mail list logo