> How about https://nymtech.net/ ?
Who knows whatabout such things.
Post such random links to the list instead,
and maybe people will evaluate about it there.
> On Sat, Nov 23, 2019 at 8:22 AM wrote:
>> > low-latency
>>
>> This phrase is misused by many as if it were some kind
>> of litmus test
> https://pando.com/2019/10/23/we-sold-pando/
https://pando.com/author/ylevine/
Might want to see that articles from the
above author and others on the subject
are archived.
I think the most common tech term is "depreciation". Tor should be o marked
on their boot page but that assumes there is a practical replacement.
On Sat, Dec 14, 2019, 2:38 AM grarpamp wrote:
> >>> snowden also said that
> >>> the NSA can't break tor.
> >> Such blanket context is unlikely.
> > w
On Sat, Dec 14, 2019 at 11:57:32AM -, Spirit of Nikopol wrote:
> On Sat, December 14, 2019 2:36 am, grarpamp wrote:
> snowden also said that the NSA can't break tor.
> >>> Such blanket context is unlikely.
>
> [.]
>
> > Also unfortunate that, today, one of the few places still
> > pr
On Sat, December 14, 2019 2:36 am, grarpamp wrote:
snowden also said that the NSA can't break tor.
>>> Such blanket context is unlikely.
[.]
> Also unfortunate that, today, one of the few places still
> propagating such blankets, in reverse via false advertising, downplaying,
> failing t
>>> snowden also said that
>>> the NSA can't break tor.
>> Such blanket context is unlikely.
> was
Also unfortunate that, today, one of the few places still
propagating such blankets, in reverse via false advertising,
downplaying, failing to mention, etc... is the Tor project itself,
not least whe
https://www.youtube.com/results?search_query=tor+vs+vpn
https://www.youtube.com/watch?v=1EsPIIwnAXM
Tor vs VPN podcast
https://www.youtube.com/watch?v=5qE4J-7Iwzc
https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/videos
>> http://www.hackerfactor.com/blog/index.php?/categories/19-Tor
>
> That article links to another article which some may find much more
> interesting (same author apparently):
My link above is not a link to an article, it's to a blog tag
that collates 22 articles about more ways that Tor, tor,
an
On Mon, Dec 02, 2019 at 07:01:55PM -0500, grarpamp wrote:
> http://www.hackerfactor.com/blog/index.php?/categories/19-Tor
That article links to another article which some may find much more
interesting (same author apparently):
https://www.hackerfactor.com/blog/index.php?/archives/789-Cyber-Goa
http://www.hackerfactor.com/blog/index.php?/categories/19-Tor
https://web.archive.org/web/20160429124221/techeye.net/news/tor-developer-helps-spooks-hack-tor
A former Tor Project developer is making a living creating malware for
the Federal Bureau of Investigation that allows agents to unmask users
of the anonymity software.
On 2019-11-26 05:11, Jim bell wrote:
I'm convinced there are too many security issues for high privacy
communication over networks that eventually utilize or terminate on commercial
facilities. Only specially designed, ptp, wireless comms using OTP or other
trusted keying, combined with appr
‐‐‐ Original Message ‐‐‐
On Friday, November 29, 2019 8:25 PM, grarpamp wrote:
> https://medium.com/@virgilgr/tors-branding-pivot-is-going-to-get-someone-killed-6ee45313b559
> ...
> 1. Theory for the Pivot
>
> In discussing this post, one of my colleagues opined that, from a
> managem
https://medium.com/@virgilgr/tors-branding-pivot-is-going-to-get-someone-killed-6ee45313b559
Tor’s Branding Pivot is Going to Get Someone Killed
Aka, human rights activism meets the Cobra Effect
Virgil Griffith
Sep 4, 2016 · 7 min read
"Three weeks ago, The Tor Project, Inc. published their Tor S
HI MIRIMIR
Original Message
On Nov 25, 2019, 7:56 PM, Mirimir wrote:
> On 11/25/2019 08:07 PM, Punk-Stasi 2.0 wrote:
>> On Tue, 26 Nov 2019 00:58:09 +
>> Peter Fairbrother wrote:
>>
>>>
>>>
>>> It should be noted that NSA do not say they can break TOR in practice,
>>> and a
On 11/25/2019 09:45 PM, Punk-Stasi 2.0 wrote:
> On Mon, 25 Nov 2019 20:56:09 -0700
> Mirimir wrote:
>
>> On 11/25/2019 08:07 PM, Punk-Stasi 2.0 wrote:
>>> On Tue, 26 Nov 2019 00:58:09 +
>>> Peter Fairbrother wrote:
>>>
It should be noted that NSA do not say they can break TOR
> Low latency means that only a few seconds of traffic need be considered. Web
> means that users have lots of traffic repeats in time-defined patterns. These
> make traffic analysis resistance hard.
Without constant fill upon which they ride hiding within
that... yes of course there's little re
On 11/25/2019 08:07 PM, Punk-Stasi 2.0 wrote:
> On Tue, 26 Nov 2019 00:58:09 +
> Peter Fairbrother wrote:
>
>>
>>
>> It should be noted that NSA do not say they can break TOR in practice,
>> and afaik there is no evidence that they have.
>
> yeah, the NSA can't break tor but some rand
> https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties
> https://www.documentcloud.org/documents/4379303-Bbg-Tor-Emails-Stack-21.html
> https://www.documentcloud.org/public/search/Account:%2019359-yasha-levine
https://www.documentcloud.org/public/search/projectid:3720
On 23/11/2019 23:23, Punk-Stasi 2.0 wrote:
My guess is that the main reason for them to get as many users as they
can is to justify funding.
Initially the main reason was to increase traffic, in order to make
traffic analysis harder. Really.
I was around when the idea was first bei
On 11/25/2019 03:46 AM, grarpamp wrote:
>> FOIA documents came out
>
> ?
https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties
https://www.documentcloud.org/documents/4379303-Bbg-Tor-Emails-Stack-21.html
Edit: Also
https://www.documentcloud.org/public/search/Account
On 11/25/2019 03:46 AM, grarpamp wrote:
>> FOIA documents came out
>
> ?
https://surveillancevalley.com/blog/fact-checking-the-tor-projects-government-ties
https://www.documentcloud.org/documents/4379303-Bbg-Tor-Emails-Stack-21.html
On Mon, Nov 25, 2019 at 07:11:48PM +, jim bell wrote:
> I can think of what might be a disproof of this:
> https://en.wikipedia.org/wiki/Dining_cryptographers_problem
>
> >> any low-latency web onion router - could not defeat The Man
>
> >This seems yet to be lacking proof and perhap
On Mon, Nov 25, 2019 at 03:27:30PM -0300, Punk-Stasi 2.0 wrote:
> On Mon, 25 Nov 2019 06:03:38 -0500
> grarpamp wrote:
>
> > > by 'low latency' they mean two things :
> > >
> > > 1) 'efficient' use of data transmission capacity, i.e. whether chaff is
> > > sent(expensive) or not.
> >
> > Ch
On Mon, Nov 25, 2019 at 05:46:32AM -0500, grarpamp wrote:
> > FOIA documents came out
>
> ?
>
> > villians
>
> Various things people have mentioned, conspiracy or not,
> that people can decide...
>
>
> > Is that a quote from X...
> > advertising tor as a means to
> > "Defend yourself again
>> Chaff might be really only "expensive" if
>> 1) Monetary, user chose to pay for it under metered plan,
>
> except, unmetered plans are a scam.
Yes if you don't get the physical line rate or whatever
the marketing tries to bullshit.
> And that's the whole point. I think
> it's safe to ass
I can think of what might be a disproof of this:
https://en.wikipedia.org/wiki/Dining_cryptographers_problem
>> any low-latency web onion router - could not defeat The Man
>This seems yet to be lacking proof and perhaps
cannot actually be said without it.
A message (or a dummy) could be
I'm convinced there are too many security issues for high privacy
communication over networks that eventually utilize or terminate on
commercial facilities. Only specially designed, ptp, wireless comms using
OTP or other trusted keying, combined with appropriate tradecraft are
likely to be effectiv
> by 'low latency' they mean two things :
>
> 1) 'efficient' use of data transmission capacity, i.e. whether chaff is
> sent(expensive) or not.
Chaff might be really only "expensive" if
1) Monetary, user chose to pay for it under metered plan,
or refuses to buildout free p2p, guerilla
> FOIA documents came out
?
> villians
Various things people have mentioned, conspiracy or not,
that people can decide...
> Is that a quote from X...
> advertising tor as a means to
> "Defend yourself against network surveillance and traffic analysis."
Posted that problem on tor-talk so
On Sun, Nov 24, 2019 at 03:25:03PM -0700, Mirimir wrote:
> On 11/24/2019 04:00 AM, John Young wrote:
> > Critique of Tor applies equally, perhaps moreso, to the whole Internet
> > for monetization, technology, personnel, administration, operation,
> > funding, seducing the public, NGOs, dissent. So
On 11/24/2019 04:00 AM, John Young wrote:
> Critique of Tor applies equally, perhaps moreso, to the whole Internet
> for monetization, technology, personnel, administration, operation,
> funding, seducing the public, NGOs, dissent. So too, to crypto,
> anonymization, cypherpunks.
>
> Perennial que
Critique of Tor applies equally, perhaps moreso, to the whole
Internet for monetization, technology, personnel, administration,
operation, funding, seducing the public, NGOs, dissent. So too, to
crypto, anonymization, cypherpunks.
Perennial question is how to sort through the tsunami of claims
On 11/23/2019 04:23 PM, Punk-Stasi 2.0 wrote:
> On Sat, 23 Nov 2019 15:39:55 -0700
> Mirimir wrote:
>
>>
>> The villains here are writers of the Tor Project website. They bullshit
>> users, overselling Tor. Why, I don't know. Maybe it's all a honeypot. Or
>> maybe they're just idiots.
>
>
On 11/23/2019 10:00 AM, Punk-Stasi 2.0 wrote:
> On Sat, 23 Nov 2019 03:21:08 -0500
> grarpamp wrote:
>
>>
>>> low-latency
>>
>> This phrase is misused by many as if it were some kind
>> of litmus test for determining TA resistance... it is not.
>
> by 'low latency' they mean two things :
>
On 23/11/2019 17:00, Punk-Stasi 2.0 wrote:
On Sat, 23 Nov 2019 03:21:08 -0500
grarpamp wrote:
low-latency
This phrase is misused by many as if it were some kind
of litmus test for determining TA resistance... it is not.
by 'low latency' they mean two things :
No, neither of tho
> recommend utilizing Tor to combat government surveillance
If users adversaries operate under whichever governments
classification levels such as TOP SECRET FVEY, and especially
if the users are doing something that such govts would take
personal affront to, such users need to do some serious thi
38 matches
Mail list logo