Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/13/2018 03:14 PM, juan wrote: > On Sat, 11 Aug 2018 15:17:45 -0700 > Mirimir wrote: > > >> >> Ummm, no :) There are still many extreme .onion sites. Mainly "hard >> candy". A quick scan yielded eight that were up when I checked: > > > Well, I'd say most of your links show that the content is hardly > extreme. Seriously, WTF? You say "hardly extreme"? Did you actually look at all of those "hard candy" sites? If you don't consider some of that extreme, I wonder about your criteria ;) But whatever. I'm not going to post examples to the list :)
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Sat, 11 Aug 2018 15:17:45 -0700 Mirimir wrote: > > Ummm, no :) There are still many extreme .onion sites. Mainly "hard > candy". A quick scan yielded eight that were up when I checked: Well, I'd say most of your links show that the content is hardly extreme. Four versions of the **censored** hidden wiki, a couple of discussion boards with barely any content as far as I can tell, one of the 'hacking' forum has 0 posts in all categories, another apparently requires an email address (...), and sites trying to sell ordinary porn for bitcoins, so more than likely outright scams. And there are a couple of sites that seem to link to 'ilegal' content onclearnet! So although the boards are a 'hidden' service their content isn't actually hosted on tor. Rather suspicious I'd say. So I'll stick to my general view : tor has an extensive record of failure, and if the govt wants a honeypot, then some sites have to last for a while to provide the illusion that 'tor works'.
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/11/2018 02:05 PM, juan wrote: > On Fri, 10 Aug 2018 10:43:07 -0700 > Mirimir wrote: > >> On 08/09/2018 08:42 PM, juan wrote: >>> On Thu, 9 Aug 2018 15:01:46 -0700 >>> Mirimir wrote: >>> >>> >> >> So? Well, if they [mix networks] are not being implemented, they're not >> very useful. > > >> Sure, there are better options. But they're not currently implemented at >> useful scale. How can you use a mix network that exists only as an >> academic paper, and perhaps some tens of people testing it? > > Oh my bad. I misread and thought you said they were not being > implemented because they could not possibly be useful. Since you had said > that tor was 'good enough' for AP, I assumed that you further added that slow > mix networks were not really needed, so no demand and no supply. > > > But you are saying that a critical mass of users is required, which is > of course true, and something I never denied...So not sure how that comment > of yours is 'helpful'? =) OK, I'm glad. We at least agree that better anonymity networks are needed. In particular, higher-latency mix networks with padding. And I think that we agree that lack of demand has stalled implementation, even though there have been proposals. And so, I'm going to drop the rest of the discussion about this, because I'm tired of it ;) I was serious about Riffle, though :) >> One of the major Russian marketplaces is (or was) on I2P. >> Also lots of porn and CP, predictably. > > By now I'm starting to suspect that your definition of 'child porn' is > that of the puritan, jew-kristian, american government? Any girl under 18 > wearing a bikini is 'child porn'? And even going by such 'definition' I don't > think there's "lots of CP' on i2p or tor. > > Furthermore, you can find that sort of 'CP' on clearnet... Ummm, no :) There are still many extreme .onion sites. Mainly "hard candy". A quick scan yielded eight that were up when I checked: Child a Priori - because children always come first http://7vd5mehclc2zw4sw.onion/ Dark Scandals [pwned cam whores] http://darksdsp6iexyidx.onion/ Hijab FUCK Girls http://hijabxq3ctj6oufk.onion/ Little Cute Girls http://girlsk34dlwyaqex.onion/ Loli Lust http://lolimknaduomuzdr.onion Sea Kitten Palace [gore, torture and Disney] http://wtwfzc6ty2s6x4po.onion/ Teen Deepthroat http://qa4t6wjhl4gzl5in.onion/ videos for Bitcoin Youngest Girls http://hq4etj553otlzb5m.onion/ Even so, the collections on Freenet are far more extensive. >>> "in the past you could find links on reddit to .onion sites that kinda >>> looked 'uncensored'. Those sites do not exist anymore. But feel free to >>> prove me wrong and POST EVIDENCE, that is, links to content that the >>> 'authorities' would like to remove but can't. " >> >> OK, let me see. I don't spend much time on .onion sites. Many sites did >> disappear over the past year or two. > > Many sites disappear EVERY year or two. That is, they don't LAST more > than a year or two. And that's always been so. > > And actually it's probably getting worse because there isn't any > upgrate to tor whereas you can expect the traffic analyisis capabilities of > the enemy to be upgraded all the time. OK, so I have spent a few hours rooting around for .onion sites. There are multiple forks of The Hidden Wiki, plus a hard candy fork: The Hidden Wiki [semi censored version] http://zqktlwi465r2mxfw.onion/wiki/Main_Page.php The Uncensored Hidden Wiki [but no hard candy] http://2zmcyrryihrpdzka.onion/wiki/index.php/Main_Page http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page http://uhwikihjqzr5tyll.onion/wiki/index.php/Main_Page Central Park [including some hard candy] http://boysopidonajtogl.onion/ Then there are a few search engines: Ahima [search, fast, doesn't return many dead sites] http://msydqstlz2kzerdg.onion/ not Evil [search, returns many dead sites, some marked as dead] http://hss3uro2hsxfogfq.onion/ OnionLand Search Engine [heavily censored] http://3bbaaaccczcbdddz.onion Also some discussion sites: Galaxy3 [general discussion] http://galaxy3m2mn5iqtn.onion/ Hidden Answers [very diverse] http://answerstedhctbek.onion The Hub [dark marketplace stuff] http://thehub7xbw4dc5r2.onion/ I did find a few cracking/hacking sites: 0day [hacking forum, also clearnet] http://qzbkwswfv5k2oj5d.onion/ AN0NYM0US'z F0RUM [hacking forum] http://rhe4faeuhjs4ldc5.onion/ Codex [cracking forum] http://codexqutu7ytbguw.onion/ Torum ["cyber security" forum] http://gf2juatsqdph6x2h.onion/ But most of the old standards are gone, such as Dark0de, Mazafaka and Trojanforge. And "not Evil" returns numerous dead cracking/hacking .onion URLs. So anyway, it's my guess that most of the cracking/hacking sites, and lots of other weird shit, were on shared .onion hosting that's been taken down. And conversely, it's arguable that the surviving hard candy sites are self hosted. Survival of the fittest, you know.
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Fri, 10 Aug 2018 10:43:07 -0700 Mirimir wrote: > On 08/09/2018 08:42 PM, juan wrote: > > On Thu, 9 Aug 2018 15:01:46 -0700 > > Mirimir wrote: > > > > > > So? Well, if they [mix networks] are not being implemented, they're not > very useful. > >>> > Sure, there are better options. But they're not currently implemented at > useful scale. How can you use a mix network that exists only as an > academic paper, and perhaps some tens of people testing it? Oh my bad. I misread and thought you said they were not being implemented because they could not possibly be useful. Since you had said that tor was 'good enough' for AP, I assumed that you further added that slow mix networks were not really needed, so no demand and no supply. But you are saying that a critical mass of users is required, which is of course true, and something I never denied...So not sure how that comment of yours is 'helpful'? =) To recap : me : Better tools are needed. you ; but they don't exist! me : well yes? THat's why they are needed...? > OK, that helps maybe a little. But you've been online for many years, > and I'm sure that you have friends and associates. So organize some > cutting-edge mix network. Ha. I have tried to sell(metaphorically speaking) more secure channels to friends and wasn't too succesful. They don't believe it's worthwhile because in the grand scheme of things we are fucked anyway, they say. At any rate, that has little to do with my comments about tor and what sort of comms are needed for AP. > Maybe Riffle, developed by Young Hyun Kwon.[1] > Or whatever you think better. And damn, I'll even help, if you like :) > > 1) > https://dspace.mit.edu/bitstream/handle/1721.1/99859/927718269-MIT.pdf?sequence=1 Thanks. Let me see... > > > > > > And yet you seem to be very uncritical of a flagship project of the US > > military like tor. > > Maybe to you I seem insufficiently critical. But maybe ask Tor devs ;) When I was on tor-talk I saw little if any criticism. But meh... > > >> Or in this case, I2P. > > > > From what I've seen of i2p content(or complete lack of it) it's a lot > > worse than tor. Which is saying a lot... > > That's because I2P has very few clearnet exits, so all you see is stuff > hosted on I2P. Yes, that's what I looked at and that's the basic data to look at. What sort of content is hosted inside i2p. > One of the major Russian marketplaces is (or was) on I2P. > Also lots of porn and CP, predictably. By now I'm starting to suspect that your definition of 'child porn' is that of the puritan, jew-kristian, american government? Any girl under 18 wearing a bikini is 'child porn'? And even going by such 'definition' I don't think there's "lots of CP' on i2p or tor. Furthermore, you can find that sort of 'CP' on clearnet... > > >> For decentralized storage generally, I like IPFS. > >> For example, a year or > >> two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though > >> I'm not currently running any IPFS nodes, it's still there. Because > >> enough people pinned it. If I hadn't disclosed that, it would be > >> nontrivial for adversaries to link it to me. > >> > >> 0) https://ipfs.io/ipfs/QmUDV2KHrAgs84oUc7z9zQmZ3whx1NB6YDPv8ZRuf4dutN/ > > > > > > Hm. OK. Looking at IPFS...So it's a lot newer than tor and freenet! NEW > > AND IMPROVED. Meaning, untested. And they have a 'filecoin' and 200 > > millions through an ICO... > > So whatever. It's the thing now, for kids. But it does seem to work > pretty well. there's also maidsafe and storj which are well funded too (or at least maidsafe is) and they are not going anywhwere as far as I can tell (though admitedly I haven't looked into them). Anyway, I might take a look at ipfs though for starters the reference client uses fucking go from fucking google...Not encouraging at all. > >> > >> Really? Gotta a link for that? > > > > > > you never heard of gnutella...? > > Sure, but didn't know that it was still up. Is it? ...you can find out for yourself? =) But yeah, although it has (a lot) less users than in the good old days it still works. > > I mean, damn, I can't find any music on TPB! That sucks. I haven't had much trouble getting some stuff off tpb but I don't use it too much so... > > If augur's interface is a shitty website accessed through tor, then I'm > > going to be skeptical about its success. And lo and behold, augur's web > > interface uses JAVASHIT, number one security hole for 'web applications'. > > The root issue isn't where Augur's website runs. The issue is trading > Ethereum anonymously. I expect all parts of the system need to be secured... > > If you want to run a full node you need to download some 200gb, but >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/09/2018 08:42 PM, juan wrote: > On Thu, 9 Aug 2018 15:01:46 -0700 > Mirimir wrote: > > So? Well, if they [mix networks] are not being implemented, they're not very useful. >>> >>> not useful for what? >> >> Huh? Are you retarded? Sure, you and your friends can setup some super >> duper mix network, but it won't do you any fucking good. Because, you >> know, you're the only people using it. And once an adversary gets >> access, you're totally screwed. > > Sure, but now you jumped to something else. What about keeping track of > the topic at hand? > > Topic : there are no secure mix networks because people (stupidly) use > more 'convenient' stuff. And while the faster, less secure stuff does have > its use cases, so do the other systems. > > So what's retarded here is your line of thinking "there are no better > options cause they are not useful' Sure, there are better options. But they're not currently implemented at useful scale. How can you use a mix network that exists only as an academic paper, and perhaps some tens of people testing it? >> And unless you actually >> mobilize some support and participation for whatever you want. I haven't >> heard much of that from you. > > > It should be self evident that explaining that tor is mostly useful to > watch jewtube has the implicit goal of 'mobilizing support' for better > alternatives. > > also notice that I am not an agent of the US military, but an > independent individual from a banana republic - so my resources to 'mobilize > support' are somewhat limited. OK, that helps maybe a little. But you've been online for many years, and I'm sure that you have friends and associates. So organize some cutting-edge mix network. Maybe Riffle, developed by Young Hyun Kwon.[1] Or whatever you think better. And damn, I'll even help, if you like :) 1) https://dspace.mit.edu/bitstream/handle/1721.1/99859/927718269-MIT.pdf?sequence=1 >>> oh, that's nice =) (just in the highly unlikely case that you are >>> trying to mock me, bear in mind that the joke is on you =) ). >> >> No mocking involved. I do agree. And you know, I really don't love those >> Americunt fascists either. Even though I'm living there now. > > > And yet you seem to be very uncritical of a flagship project of the US > military like tor. Maybe to you I seem insufficiently critical. But maybe ask Tor devs ;) But not Freenet! That shit is ~20 years out of date. More below. >>> >>> Keep trolling. So decentralized storage is 20 years out of date whereas >>> using php to serve files behind a low quality proxy is the 'technology' of >>> the next americunt century. >> >> No, Freenet is 20 years out of date. Because it makes _no_ attempt to >> obscure IP addresses of peers. As far as I know, there is no protocol >> for decentralized storage that does obscure IP addresses of peers. > > uh, so everything is 20 years out of date? > >> And so you need to use some overlay network. Such as VPNs and/or Tor. > > OK. So if you add a proxy before freenet then freenet is better than > php in a centralized webserver? Almost certainly, because it's distributed. But in my experience, the Freenet community doesn't like people using proxies. >> Or in this case, I2P. > > From what I've seen of i2p content(or complete lack of it) it's a lot > worse than tor. Which is saying a lot... That's because I2P has very few clearnet exits, so all you see is stuff hosted on I2P. One of the major Russian marketplaces is (or was) on I2P. Also lots of porn and CP, predictably. >> Because there's no need to reach clearnet stuff. >> However, I2P also has its issues. It's a lot smaller than Tor. And every >> participant must be a router, analogous to a Tor relay. Which means that >> participants attract more attention, and may get their IPs blacklisted. > > > That's how a decentralized network works? If you are a peer you may > attract attention. Not sure what kind of 'workaround' can be for that. If you > use an 'overlay' then you will 'attract attention' for using an overlay, etc. What's nice about Tor is that relay operators attract the most attention. And it's my impression that they're generally not up to any iffy shit. Or at least, they shouldn't be, if they're smart. So people up to iffy shit just run clients. And that doesn't attract as much attention. Especially if they use bridges that aren't published. Or create their own bridge, on some random VPS. >> For decentralized storage generally, I like IPFS. >> For example, a year or >> two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though >> I'm not currently running any IPFS nodes, it's still there. Because >> enough people pinned it. If I hadn't disclosed that, it would be >> nontrivial for adversaries to link it to me. >> >> 0) https://ipfs.io/ipfs/QmUDV2KHrAgs84oUc7z9zQmZ3whx1NB6YDPv8ZRuf4dutN/ > > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Thu, 9 Aug 2018 15:01:46 -0700 Mirimir wrote: > >> > >> So? Well, if they [mix networks] are not being implemented, they're not > >> very useful. > > > > not useful for what? > > Huh? Are you retarded? Sure, you and your friends can setup some super > duper mix network, but it won't do you any fucking good. Because, you > know, you're the only people using it. And once an adversary gets > access, you're totally screwed. Sure, but now you jumped to something else. What about keeping track of the topic at hand? Topic : there are no secure mix networks because people (stupidly) use more 'convenient' stuff. And while the faster, less secure stuff does have its use cases, so do the other systems. So what's retarded here is your line of thinking "there are no better options cause they are not useful' > > >> You > >> can fume all you want about some ideal that ought to exist. But that > >> alone doesn't really help much. > > > > you mean, discussing the 'technical details' doesn't 'help' whereas US > > military propaganda 'helps'? Well, of course, that's true, depending on > > what is being 'helped'... > > Sure, "discussing the 'technical details'" helps. But not if you're just > bitching about what's wrong with existing stuff. lol - in other words, there's a laundry list of criticism that you are fully unable to counter so you call it 'bitching'. > And unless you actually > mobilize some support and participation for whatever you want. I haven't > heard much of that from you. It should be self evident that explaining that tor is mostly useful to watch jewtube has the implicit goal of 'mobilizing support' for better alternatives. also notice that I am not an agent of the US military, but an independent individual from a banana republic - so my resources to 'mobilize support' are somewhat limited. > > > > oh, that's nice =) (just in the highly unlikely case that you are > > trying to mock me, bear in mind that the joke is on you =) ). > > No mocking involved. I do agree. And you know, I really don't love those > Americunt fascists either. Even though I'm living there now. And yet you seem to be very uncritical of a flagship project of the US military like tor. > > >> But that's not the only reason. There's also the > >> latency vs usability tradeoff. > > > > Which I think I acknowledged... > > Yes, you did. Barely. And them you hand-waved it away ;) Bullshit. Just in case my position isn't clear. You want to watch jewtube videos or control drones to murder children use tor, a 'low latency' network. You want some half decent anonimity? Use something else. This being the cpunks mailing list, not the tor mailing list, or other outlet for US military propaganda, it seems to me that your constant 'bitching' about 'usability' is misplaced. > > >> Or even if it is, maybe you ought to be > >> promoting them? > > > > And what am I doing here? > > So far, you've promoted Freenet. Which is arguably _worse_ than Tor. It's not my intention to promote freenet, and I barely promoted it. What needs to be done is getting rid of the tor scum =) > > >> But not Freenet! That shit is ~20 years out of date. More below. > > > > Keep trolling. So decentralized storage is 20 years out of date whereas > > using php to serve files behind a low quality proxy is the 'technology' of > > the next americunt century. > > No, Freenet is 20 years out of date. Because it makes _no_ attempt to > obscure IP addresses of peers. As far as I know, there is no protocol > for decentralized storage that does obscure IP addresses of peers. uh, so everything is 20 years out of date? > And so you need to use some overlay network. Such as VPNs and/or Tor. OK. So if you add a proxy before freenet then freenet is better than php in a centralized webserver? > > Or in this case, I2P. From what I've seen of i2p content(or complete lack of it) it's a lot worse than tor. Which is saying a lot... > Because there's no need to reach clearnet stuff. > However, I2P also has its issues. It's a lot smaller than Tor. And every > participant must be a router, analogous to a Tor relay. Which means that > participants attract more attention, and may get their IPs blacklisted. That's how a decentralized network works? If you are a peer you may attract attention. Not sure what kind of 'workaround' can be for that. If you use an 'overlay' then you will 'attract attention' for using an overlay, etc. > > For decentralized storage generally, I like IPFS. > For example, a year or > two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though > I'm not currently running any IPFS nodes, it's still there. Because > enough people pinned it. If I hadn't disclosed that, it would be > nontrivial
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/09/2018 01:09 PM, juan wrote: > On Thu, 9 Aug 2018 10:25:12 -0700 > Mirimir wrote: > >> On 08/08/2018 11:01 PM, juan wrote: >>> On Wed, 8 Aug 2018 20:44:53 -0700 >>> Mirimir wrote: >>> >>> Anyway, I vaguely recall proposed higher-latency mix networks that would be usable for browsing, remote management, etc. But I haven't heard that any are actually getting implemented. >>> >>> so? >> >> So? Well, if they're not being implemented, they're not very useful. > > not useful for what? Huh? Are you retarded? Sure, you and your friends can setup some super duper mix network, but it won't do you any fucking good. Because, you know, you're the only people using it. And once an adversary gets access, you're totally screwed. >> You >> can fume all you want about some ideal that ought to exist. But that >> alone doesn't really help much. > > you mean, discussing the 'technical details' doesn't 'help' whereas US > military propaganda 'helps'? Well, of course, that's true, depending on what > is being 'helped'... Sure, "discussing the 'technical details'" helps. But not if you're just bitching about what's wrong with existing stuff. And unless you actually mobilize some support and participation for whatever you want. I haven't heard much of that from you. >> And yeah, I know that they're not being implemented because those >> Americunt fascists are so damn good at propaganda. I do tend to agree >> with you about that. > > oh, that's nice =) (just in the highly unlikely case that you are > trying to mock me, bear in mind that the joke is on you =) ). No mocking involved. I do agree. And you know, I really don't love those Americunt fascists either. Even though I'm living there now. >> But that's not the only reason. There's also the >> latency vs usability tradeoff. > > Which I think I acknowledged... Yes, you did. Barely. And them you hand-waved it away ;) >> Or even if it is, maybe you ought to be >> promoting them? > > And what am I doing here? So far, you've promoted Freenet. Which is arguably _worse_ than Tor. >> But not Freenet! That shit is ~20 years out of date. More below. > > Keep trolling. So decentralized storage is 20 years out of date whereas > using php to serve files behind a low quality proxy is the 'technology' of > the next americunt century. No, Freenet is 20 years out of date. Because it makes _no_ attempt to obscure IP addresses of peers. As far as I know, there is no protocol for decentralized storage that does obscure IP addresses of peers. And so you need to use some overlay network. Such as VPNs and/or Tor. Or in this case, I2P. Because there's no need to reach clearnet stuff. However, I2P also has its issues. It's a lot smaller than Tor. And every participant must be a router, analogous to a Tor relay. Which means that participants attract more attention, and may get their IPs blacklisted. For decentralized storage generally, I like IPFS. For example, a year or two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though I'm not currently running any IPFS nodes, it's still there. Because enough people pinned it. If I hadn't disclosed that, it would be nontrivial for adversaries to link it to me. 0) https://ipfs.io/ipfs/QmUDV2KHrAgs84oUc7z9zQmZ3whx1NB6YDPv8ZRuf4dutN/ > by the way, freenet is 18 years old and your employer the tor > corporation is 15 years old. So I guess tor is 'almost' ~20 years out of > date? > > > And you know, there's even older stuff than freenet, like the p2p > networks based on gnutella and they are of course superior to bittorrent, let > alone to 'web based' 'solutions'. Really? Gotta a link for that? I've been wondering where to get some current music at a decent price. I will _not_ use Spotify! >>> Not sure if you are keeping track of the 'issue' here. As far as I'm >>> concerned the 'issue' is not BROWSING THE FUCKING WEB but doing >>> 'cryptoanarchy' 'stuff' >> >> Huh? Just what the fuck else is "'cryptoanarchy' 'stuff'" then? > > > We were talking about assasination politics. And you barefacedly > declared that tor was 'good enough' for end users, 'good enough' for hidden > services, and 'good enough' for killing trump. So here the 'crypto anarchy > stuff' is AP. > > Now, are you trolling or what? You can't remember the topic of the > discussion from one message to the next? Or? OK, so how are you planning to use Augur or whatever without revealing your IP address? And actually, if I said that Tor would work with Augur, I was wrong. Because Ethereum wallets use UDP, which Tor doesn't handle. So you're left with nested VPN chains. Unless someone forks to I2P. But that too seems iffy, given how small I2P is. >> There >> are web sites. There's email. There are various more-or-less P2P >> messaging systems. There's SSH for managing servers. >> >> I agree that email and messaging would better resist compromise
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Thu, 9 Aug 2018 10:25:12 -0700 Mirimir wrote: > On 08/08/2018 11:01 PM, juan wrote: > > On Wed, 8 Aug 2018 20:44:53 -0700 > > Mirimir wrote: > > > > > >> > >> Anyway, I vaguely recall proposed higher-latency mix networks that would > >> be usable for browsing, remote management, etc. But I haven't heard that > >> any are actually getting implemented. > > > > so? > > So? Well, if they're not being implemented, they're not very useful. not useful for what? > You > can fume all you want about some ideal that ought to exist. But that > alone doesn't really help much. you mean, discussing the 'technical details' doesn't 'help' whereas US military propaganda 'helps'? Well, of course, that's true, depending on what is being 'helped'... > > And yeah, I know that they're not being implemented because those > Americunt fascists are so damn good at propaganda. I do tend to agree > with you about that. oh, that's nice =) (just in the highly unlikely case that you are trying to mock me, bear in mind that the joke is on you =) ). > But that's not the only reason. There's also the > latency vs usability tradeoff. Which I think I acknowledged... > Or even if it is, maybe you ought to be > promoting them? And what am I doing here? > > But not Freenet! That shit is ~20 years out of date. More below. Keep trolling. So decentralized storage is 20 years out of date whereas using php to serve files behind a low quality proxy is the 'technology' of the next americunt century. by the way, freenet is 18 years old and your employer the tor corporation is 15 years old. So I guess tor is 'almost' ~20 years out of date? And you know, there's even older stuff than freenet, like the p2p networks based on gnutella and they are of course superior to bittorrent, let alone to 'web based' 'solutions'. > > > Not sure if you are keeping track of the 'issue' here. As far as I'm > > concerned the 'issue' is not BROWSING THE FUCKING WEB but doing > > 'cryptoanarchy' 'stuff' > > Huh? Just what the fuck else is "'cryptoanarchy' 'stuff'" then? We were talking about assasination politics. And you barefacedly declared that tor was 'good enough' for end users, 'good enough' for hidden services, and 'good enough' for killing trump. So here the 'crypto anarchy stuff' is AP. Now, are you trolling or what? You can't remember the topic of the discussion from one message to the next? Or? > There > are web sites. There's email. There are various more-or-less P2P > messaging systems. There's SSH for managing servers. > > I agree that email and messaging would better resist compromise if they > used higher-latency mix networks. Even very high-latency ones, with lots > of padding. Not just email, but any protocol that doesn't require 'instant' messages. Which I imagine includes AP. > But SSH via nested VPN chains plus Tor is painful enough as > it is. I can't imagine waiting minutes between typing and remote action. > > >> What have I missed? > > > > good thing that at least you are asking. Now try to answer your > > question. > > Well, I was hoping for some constructive discussion. But that's hard > with you. But whatever, we are what we are. You are expecting me to provide something that doesn't exist and can't exist? And since nobody can provide a fast and secure network, you just keep parroting tor propganda? Well I guess that's your job description? > > >> Yes, basically. Tor was developed by the US military. But that's not > >> likely why privacy activists embraced it. > > > > yes it is - 'privacy' 'activists' 'embraced' it because the fucking US > > military promoted it. > > > > again, here's a link for you > > > > http://www.monitor.upeace.org/innerpg.cfm?id_article=816 > > > > that's commie 'anarchist' appelbaum who got US$ 100k per year to > > promote a tool used by the US govt to promote coups in the middle east. > > Indeed. Tor was announced on _this list_ :) ...not entirely sure what your remark means? Anyway, hopefully the reason why tor is so 'popular' is clear enough by now. But I guess you are still ignoring the reason for tor to exist. It is for americunt nazis to promote 'democracy' in 'repressive' regimes. > > And seriously, are you following the published literature on overlay > networks? No. I'm following tor propaganda by you and grarpamp in lists like this one. > > > > yes, ask all the people who are in jail thanks to tor. Or dead. > > Yeah, yeah. But nothing's perfect. And consider how many more would be > jailed or dead if they _hadn't_ used Tor. Less people. You don't do stupidly risky things if you know you are getting caught. You do them when you drink the koolaid from the US military like Ulbricht did. > >>
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/08/2018 11:01 PM, juan wrote: > On Wed, 8 Aug 2018 20:44:53 -0700 > Mirimir wrote: > > >> >> Anyway, I vaguely recall proposed higher-latency mix networks that would >> be usable for browsing, remote management, etc. But I haven't heard that >> any are actually getting implemented. > > so? So? Well, if they're not being implemented, they're not very useful. You can fume all you want about some ideal that ought to exist. But that alone doesn't really help much. And yeah, I know that they're not being implemented because those Americunt fascists are so damn good at propaganda. I do tend to agree with you about that. But that's not the only reason. There's also the latency vs usability tradeoff. Or even if it is, maybe you ought to be promoting them? But not Freenet! That shit is ~20 years out of date. More below. > Not sure if you are keeping track of the 'issue' here. As far as I'm > concerned the 'issue' is not BROWSING THE FUCKING WEB but doing > 'cryptoanarchy' 'stuff' Huh? Just what the fuck else is "'cryptoanarchy' 'stuff'" then? There are web sites. There's email. There are various more-or-less P2P messaging systems. There's SSH for managing servers. I agree that email and messaging would better resist compromise if they used higher-latency mix networks. Even very high-latency ones, with lots of padding. But SSH via nested VPN chains plus Tor is painful enough as it is. I can't imagine waiting minutes between typing and remote action. >> What have I missed? > > good thing that at least you are asking. Now try to answer your > question. Well, I was hoping for some constructive discussion. But that's hard with you. But whatever, we are what we are. >> Yes, basically. Tor was developed by the US military. But that's not >> likely why privacy activists embraced it. > > yes it is - 'privacy' 'activists' 'embraced' it because the fucking US > military promoted it. > > again, here's a link for you > > http://www.monitor.upeace.org/innerpg.cfm?id_article=816 > > that's commie 'anarchist' appelbaum who got US$ 100k per year to > promote a tool used by the US govt to promote coups in the middle east. Indeed. Tor was announced on _this list_ :) And seriously, are you following the published literature on overlay networks? I was, but I'm maybe 2-3 years out of date. So if any y'all know about something that's getting traction, or seriously ought to be, please do point to it. >> It became popular because it >> provided a better mix of security and usability. > > > yes, ask all the people who are in jail thanks to tor. Or dead. Yeah, yeah. But nothing's perfect. And consider how many more would be jailed or dead if they _hadn't_ used Tor. Also very slow. And I can't imagine how it could have scaled. Although I suppose that some of the binary newsgroups did get pretty fucking huge. But anyway, overhead is a key problem with mix networks. >>> >>> >>> That's how they work as far as I understand them. So saying it's a >>> problem really misses the point. >> >> What's a problem is _too much_ overhead. > > > you are just bullshiting and hand waving. No, I'm not. Go read the fucking papers, if you don't believe me. >> That is, total traffic grows >> more or less exponentially with the number of users. > > >> Development of the Web was part of it, I'm sure. >>> >>> Yep. And the 'culture' behind it. Allow retards to stream super ultra >>> SHD videos. But I wouldn't like to blame the victims too much, so of course >>> the problem is the assholes at the top who dictate how 'technology' is >>> developed. >> >> Open-source software is hardly driven by "assholes at the top". > > > what - are you referring to the fact that tor is open source? So > fucking what. It is developed and controlled by military scum like syverson > and the little tor mafia. Who by now must have gotten 10 MILLION DOLLARS for > their 'work'. So what? Is poverty your ideal or something? >> Trust me, dude. Stay away from Freenet. Sure, you think Tor is pwned. >> But Freenet is so pwned that I'd never use it ;) Except through Tor ;) >> It's a joke. > > yes I agree. What you say is a joke. > > You are confirming from the nth time that you are if not a paid agent, > an 'amateur' one. > > >> As soon as an adversary joins your network, they can trace >> data movement. So they can show that your node has handled pieces of >> illegal files, identified by hash. > > uh yeah, that's how freenet works. You have encripted pieces of stuff > that can be anything. That's where you're wrong. If an adversary is in your Freenet network, they see all those encrypted pieces of stuff. And if they're running a suitably modified version of the Freenet software, they know which of those pieces are part of which files. Because they can fetch each file of interest, and decompose the
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Wed, Aug 08, 2018 at 08:44:53PM -0700, Mirimir wrote: > On 08/08/2018 11:21 AM, juan wrote: > > On Tue, 7 Aug 2018 20:42:37 -0700 > > Mirimir wrote: > >> But even so, people who want anonymity, some of them > >> doing illegal stuff, _will_ end up using Tor. So why not help them use > >> it more safely? > > > > Oh, but I do. Whenver I have the chance, I tell darm markets > > operators to not post their contact information on facebook. > > Is that the best you can do? Frankly, educating folks to not put their personal contact details on Facebook is quite a useful thing - there are some pretty uneducated folks out there. Also, letting pepes know that Tor is essentially the NSA/CIA network is also, presumably, useful education material to those who are otherwise swamp-indoctrinated.
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Wed, 8 Aug 2018 20:44:53 -0700 Mirimir wrote: > > Anyway, I vaguely recall proposed higher-latency mix networks that would > be usable for browsing, remote management, etc. But I haven't heard that > any are actually getting implemented. so? Not sure if you are keeping track of the 'issue' here. As far as I'm concerned the 'issue' is not BROWSING THE FUCKING WEB but doing 'cryptoanarchy' 'stuff' > > What have I missed? good thing that at least you are asking. Now try to answer your question. > Yes, basically. Tor was developed by the US military. But that's not > likely why privacy activists embraced it. yes it is - 'privacy' 'activists' 'embraced' it because the fucking US military promoted it. again, here's a link for you http://www.monitor.upeace.org/innerpg.cfm?id_article=816 that's commie 'anarchist' appelbaum who got US$ 100k per year to promote a tool used by the US govt to promote coups in the middle east. > It became popular because it > provided a better mix of security and usability. yes, ask all the people who are in jail thanks to tor. Or dead. > >> Also very slow. And I can't imagine how it could have > >> scaled. Although I suppose that some of the binary newsgroups did get > >> pretty fucking huge. But anyway, overhead is a key problem with mix > >> networks. > > > > > > That's how they work as far as I understand them. So saying it's a > > problem really misses the point. > > What's a problem is _too much_ overhead. you are just bullshiting and hand waving. > That is, total traffic grows > more or less exponentially with the number of users. > > >> Development of the Web was part of it, I'm sure. > > > > Yep. And the 'culture' behind it. Allow retards to stream super ultra > > SHD videos. But I wouldn't like to blame the victims too much, so of course > > the problem is the assholes at the top who dictate how 'technology' is > > developed. > > Open-source software is hardly driven by "assholes at the top". what - are you referring to the fact that tor is open source? So fucking what. It is developed and controlled by military scum like syverson and the little tor mafia. Who by now must have gotten 10 MILLION DOLLARS for their 'work'. > Trust me, dude. Stay away from Freenet. Sure, you think Tor is pwned. > But Freenet is so pwned that I'd never use it ;) Except through Tor ;) > It's a joke. yes I agree. What you say is a joke. You are confirming from the nth time that you are if not a paid agent, an 'amateur' one. > As soon as an adversary joins your network, they can trace > data movement. So they can show that your node has handled pieces of > illegal files, identified by hash. uh yeah, that's how freenet works. You have encripted pieces of stuff that can be anything. > And even though they can't really > prove that you accessed those files, they can say in court that they > can, and you'll be hard pressed to convince a jury otherwise. that may be how your nazi legal system works - you can be charged with anything and convicted without proof. That's not freenet's fault. anyway, it's quite funny that you robotically ignore all of tor's problems and are barefaced enough to badmouth the competition > I keep repeating that Tor is what we have now for working ~anonymously > online because it just fucking is! Sure, there's JonDoNym, but it's a > tiny network, and not many people use it. And it's not really that > friendly to anonymity, in any case. I2P is interesting, I admit, but > it's mainly a closed system. There are some clearnet exits, but the rest > of I2P doesn't like them. are you drunk or something? Again WHO gives a fuck about 'browsing the web'? Why would cypherpunks be interested in 'anonymously' reading the jew york times? Which is something you can do with any free vpn anyway. > > So it's not that I'm saying Tor is the best, or whatever. It's literally > that there's nothing else that's widely enough used to provide any real > anonymity. Or at least, that I know of. > > So again, what super anonymous overlay networks have I missed? I'm all > ears :) maybe taking too much psychoactive substances isn't good for you. go back and try to grasp what the topic of the discussion is. > > >> But even so, people who want anonymity, some of them > >> doing illegal stuff, _will_ end up using Tor. So why not help them use > >> it more safely? > > > > > > Oh, but I do. Whenver I have the chance, I tell darm markets operators > > to not post their contact information on facebook. > > Is that the best you can do? yes. I can directly tell you to go fuck yourself. That's actually better.
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/08/2018 11:21 AM, juan wrote: > On Tue, 7 Aug 2018 20:42:37 -0700 > Mirimir wrote: > >> On 08/07/2018 06:14 PM, juan wrote: >>> On Tue, 7 Aug 2018 17:49:54 -0700 >>> Mirimir wrote: >>> >>> > for other stuff...do you have to ask? What sort of system do you think > should be used for coordinating 'criminal' activity, instead of streaming > super full SHD video for retards? That's the question. >>> >>> And the answer is : some sort of 'high latency' mixing network. And >>> interestingly enough such a network doesn't seem to exist, although it >>> seems to me it would require less resources than something like tor. And >>> nobody seems to be worried about having or not having that kind of >>> network, which strikes me as odd... >> >> Well, as I'm sure you know, high-latency mix networks -- Cypherpunk and >> Mixmaster remailers.[0] -- predate Tor. > > > Right. In other words, the state of anonymous comms in the last 20 > years has gone a long wayBACKWARDS. I suppose. But to me it just seems that users voted with their activity. Sure, high-latency remailer mix networks are arguably more secure against traffic analysis. But they're not very useful for anything except email and Usenet posting. They're not even workable for reading Usenet anonymously. So basically, Tor came along as the Web took over. So more and more people started running Tor relays, and fewer and fewer ran remailers, or even used them. Anyway, I vaguely recall proposed higher-latency mix networks that would be usable for browsing, remote management, etc. But I haven't heard that any are actually getting implemented. What have I missed? >> That's how I used the original >> cypherpunks list, way back when. A few years ago, I played with them a >> little. I got QuickSilver Lite running in Wine.[1] Basically, all email >> goes to alt.anonymous.messages, you download everything, and then your >> client finds stuff that you can decrypt. > > Yes, that's a 'brute force' technique that works. Steve Kinney > mentioned it as well. > > > >> Some resources were (are?) >> available as .onion services. I probably have notes somewhere, if you're >> interested. >> >> I'm not sure why that all died. It _was_ bloody complicated, even with >> QuickSilver Lite. > > Well, a few guesses : > > 1) not enough people thought it was important enough because > surveillance wasn't as bad as it is today > > 2) ...so the tradeoff security/usability didn't seem worthwhile > > 3) those systems were displaced by worse, 'fast' solutions provided by > the US military. Yes, basically. Tor was developed by the US military. But that's not likely why privacy activists embraced it. It became popular because it provided a better mix of security and usability. >> Also very slow. And I can't imagine how it could have >> scaled. Although I suppose that some of the binary newsgroups did get >> pretty fucking huge. But anyway, overhead is a key problem with mix >> networks. > > > That's how they work as far as I understand them. So saying it's a > problem really misses the point. What's a problem is _too much_ overhead. That is, total traffic grows more or less exponentially with the number of users. >> Development of the Web was part of it, I'm sure. > > Yep. And the 'culture' behind it. Allow retards to stream super ultra > SHD videos. But I wouldn't like to blame the victims too much, so of course > the problem is the assholes at the top who dictate how 'technology' is > developed. Open-source software is hardly driven by "assholes at the top". >> Although I recall >> seeing a crude hack that pulled stuff from alt.anonymous.messages, and >> massaged it into a web page. >> I guess that you say that there is none, and we should all just organize our local cells. >>> >>> What I was trying to say is that, if the use case is 'criminal >>> activity', then using a 'low latency' network like tor which provides >>> centralized 'hidden' services is a not a good idea. It's more like a recipe >>> for disaster. >> >> Well, if you exclude low-latency networks, you're pretty much left with >> nothing to use. > > > THat is not true. Although I don't know how robust it is, I think > freenet comes closer to being a mix network of sorts, and it's a > decentralized storage by design. See? Unlike the garbage produced by the > pentagon nazis in which 'hidden' services are a hack, freenet was designed > with censorship resistance as a key property. Trust me, dude. Stay away from Freenet. Sure, you think Tor is pwned. But Freenet is so pwned that I'd never use it ;) Except through Tor ;) It's a joke. As soon as an adversary joins your network, they can trace data movement. So they can show that your node has handled pieces of illegal files, identified by hash. And even though they can't really prove that you accessed those files, they can s
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Tue, 7 Aug 2018 20:42:37 -0700 Mirimir wrote: > On 08/07/2018 06:14 PM, juan wrote: > > On Tue, 7 Aug 2018 17:49:54 -0700 > > Mirimir wrote: > > > > > >> > >>> for other stuff...do you have to ask? What sort of system do you think > >>> should be used for coordinating 'criminal' activity, instead of streaming > >>> super full SHD video for retards? > >> > >> That's the question. > > > > And the answer is : some sort of 'high latency' mixing network. And > > interestingly enough such a network doesn't seem to exist, although it > > seems to me it would require less resources than something like tor. And > > nobody seems to be worried about having or not having that kind of > > network, which strikes me as odd... > > Well, as I'm sure you know, high-latency mix networks -- Cypherpunk and > Mixmaster remailers.[0] -- predate Tor. Right. In other words, the state of anonymous comms in the last 20 years has gone a long wayBACKWARDS. > That's how I used the original > cypherpunks list, way back when. A few years ago, I played with them a > little. I got QuickSilver Lite running in Wine.[1] Basically, all email > goes to alt.anonymous.messages, you download everything, and then your > client finds stuff that you can decrypt. Yes, that's a 'brute force' technique that works. Steve Kinney mentioned it as well. > Some resources were (are?) > available as .onion services. I probably have notes somewhere, if you're > interested. > > I'm not sure why that all died. It _was_ bloody complicated, even with > QuickSilver Lite. Well, a few guesses : 1) not enough people thought it was important enough because surveillance wasn't as bad as it is today 2) ...so the tradeoff security/usability didn't seem worthwhile 3) those systems were displaced by worse, 'fast' solutions provided by the US military. > Also very slow. And I can't imagine how it could have > scaled. Although I suppose that some of the binary newsgroups did get > pretty fucking huge. But anyway, overhead is a key problem with mix > networks. That's how they work as far as I understand them. So saying it's a problem really misses the point. > > Development of the Web was part of it, I'm sure. Yep. And the 'culture' behind it. Allow retards to stream super ultra SHD videos. But I wouldn't like to blame the victims too much, so of course the problem is the assholes at the top who dictate how 'technology' is developed. > Although I recall > seeing a crude hack that pulled stuff from alt.anonymous.messages, and > massaged it into a web page. > > >> I guess that you say that there is none, and we > >> should all just organize our local cells. > > > > What I was trying to say is that, if the use case is 'criminal > > activity', then using a 'low latency' network like tor which provides > > centralized 'hidden' services is a not a good idea. It's more like a recipe > > for disaster. > > Well, if you exclude low-latency networks, you're pretty much left with > nothing to use. THat is not true. Although I don't know how robust it is, I think freenet comes closer to being a mix network of sorts, and it's a decentralized storage by design. See? Unlike the garbage produced by the pentagon nazis in which 'hidden' services are a hack, freenet was designed with censorship resistance as a key property. But another point is, if at the moment there only are fast, low quality networks, then what's needed is...something else. You keep repeating we only have tor - why? My answer is that you are just a tor propagandist which in turns makes you as US military propagandist. That's what the EVIDENCE points to. > But even so, people who want anonymity, some of them > doing illegal stuff, _will_ end up using Tor. So why not help them use > it more safely? Oh, but I do. Whenver I have the chance, I tell darm markets operators to not post their contact information on facebook. > > 0) https://remailer.paranoici.org/clist.html > 1) https://www.quicksilvermail.net/qslite/
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Tuesday, August 7, 2018, 8:47:46 PM PDT, Kurt Buff wrote: >And, USPS might (or might not) destroy the data, but they don't mention whether or not they pass it all on the some TLA or other as well as passing on to LEO's on-demand. Wouldn't put it past them... >Kurt I thought about this in late 2013, I think when they busted the original Silk Road. I wondered, what precautions a seller on such a black-net market would want to take. They have a big advantage, they can toss their mailings into just about any mailbox, and use different phony return-addresses (actually genuine addresses, but randomly-selected) with each mailing. But, I concluded they'd want to make their mailings have dozens of different looks, to ensure that even a recorded scan of all mailings could not easily be used to notice similarities. Different colors, different shapes, different fonts. Jim Bell
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Tue, Aug 7, 2018 at 5:21 PM, jim bell wrote: > https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html > > "But Mr. Donahoe said that the images had been used “a couple of times” by > law enforcement to trace letters in criminal cases, including one involving > ricin-laced letters sent to President Obama and Mayor Michael R. Bloomberg > of New York. The images of letters and packages are generally stored for a > week to 30 days and then destroyed, he told the A.P." > [end of quote from article] > > > About that article. > > I think it's curious that they claim to "destroy' the images after "a week > to 30 days". If there are about 1 billion mailed items each year, and it > takes 50 kilobytes to store an image (wild ass guess, and assuming some > compression), that would amount to 50 terabytes of data: A bit more than 4 > of the largest-capacity of hard drives currently sold. > > > https://www.wdc.com/products/internal-storage/wd-gold-enterprise-class-hard-drive.html?gclid=CjwKCAjwhqXbBRAREiwAucoo-yp9zBDxr1hrojtP7nXAw8Trmtx4-9N8m5DAecI3hqQeTEyGeHWYjBoCg_IQAvD_BwE > > Think about it. If YOU had access to this data, would YOU erase it, if the > storage only cost about $2000 per year? > > Jim Bell It's going to be about an order of magnitude more than that - not because of the size of the images, but because they're going to OCR and index all of it, but I'm sure they're already OCRing already, because automation. The images are pretty useless without it the indexing. But still - let's say that you're off by three orders of magnitude, and it costs $2m/year to store it, that's chump change for a very good surveillance system, and if you do network graphs and frequency analyses, etc, well, now you're cooking with gas. And, USPS might (or might not) destroy the data, but they don't mention whether or not they pass it all on the some TLA or other as well as passing on to LEO's on-demand. Wouldn't put it past them... Kurt
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/07/2018 06:14 PM, juan wrote: > On Tue, 7 Aug 2018 17:49:54 -0700 > Mirimir wrote: > > >> >>> for other stuff...do you have to ask? What sort of system do you think >>> should be used for coordinating 'criminal' activity, instead of streaming >>> super full SHD video for retards? >> >> That's the question. > > And the answer is : some sort of 'high latency' mixing network. And > interestingly enough such a network doesn't seem to exist, although it seems > to me it would require less resources than something like tor. And nobody > seems to be worried about having or not having that kind of network, which > strikes me as odd... Well, as I'm sure you know, high-latency mix networks -- Cypherpunk and Mixmaster remailers.[0] -- predate Tor. That's how I used the original cypherpunks list, way back when. A few years ago, I played with them a little. I got QuickSilver Lite running in Wine.[1] Basically, all email goes to alt.anonymous.messages, you download everything, and then your client finds stuff that you can decrypt. Some resources were (are?) available as .onion services. I probably have notes somewhere, if you're interested. I'm not sure why that all died. It _was_ bloody complicated, even with QuickSilver Lite. Also very slow. And I can't imagine how it could have scaled. Although I suppose that some of the binary newsgroups did get pretty fucking huge. But anyway, overhead is a key problem with mix networks. Development of the Web was part of it, I'm sure. Although I recall seeing a crude hack that pulled stuff from alt.anonymous.messages, and massaged it into a web page. >> I guess that you say that there is none, and we >> should all just organize our local cells. > > What I was trying to say is that, if the use case is 'criminal > activity', then using a 'low latency' network like tor which provides > centralized 'hidden' services is a not a good idea. It's more like a recipe > for disaster. Well, if you exclude low-latency networks, you're pretty much left with nothing to use. But even so, people who want anonymity, some of them doing illegal stuff, _will_ end up using Tor. So why not help them use it more safely? 0) https://remailer.paranoici.org/clist.html 1) https://www.quicksilvermail.net/qslite/
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
Original message From: Mirimir Date: 8/7/18 5:49 PM (GMT-08:00) To: cypherpunks@lists.cpunks.org Subject: Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not On 08/07/2018 05:04 PM, juan wrote: > On Mon, 6 Aug 2018 14:21:12 -0700 > Mirimir wrote: > >https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html >Sad but true Pictures? The postal service admitted they have ways of scanning written mail content, en masse, quite some time ago. Rr >> On 08/06/2018 02:03 PM, juan wrote: >>> On Mon, 6 Aug 2018 13:36:18 -0700 >>> Mirimir wrote: >>> >>> >>>> I bet that you use nothing. I mean, damn, you're using a Gmail account. >>> >>> yes, and I use it to order drugs via tor - after all many 'hidden' >>> services admins use their gmail accounts. That's how they get caught. >> >> Very funny :) >> >> But OK, let's say that Tor is Americunt honeypot. I mean, I have my >> doubts. But actually, the main reason why I don't order drugs from >> .onion marketplaces is not wanting to disclose my postal address. That's >> what earned DPR his first visit from the feds, after all. Fake IDs. > > > as a side note of sorts > > https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html Sad but true. >> Anyway, Tor is out of consideration. What would you have people use for >> any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots? > > > it obviously depends on what kind of 'anonimity'. Browse the web for > ordinary stuff while not being tracked by advertisers? a vpn. Or two. Or tor. lol > for other stuff...do you have to ask? What sort of system do you think > should be used for coordinating 'criminal' activity, instead of streaming > super full SHD video for retards? That's the question. I guess that you say that there is none, and we should all just organize our local cells. And maybe you're right. >> What? >> >> Or is it nothing? And if nothing, how useful is that? >> >> Or maybe you have some really cool thing, but you won't share it? >> >>>> So maybe living in Argentina is your only protection. Whatever. >>>> >>>> >>> >>> > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Tue, 7 Aug 2018 17:49:54 -0700 Mirimir wrote: > > > for other stuff...do you have to ask? What sort of system do you think > > should be used for coordinating 'criminal' activity, instead of streaming > > super full SHD video for retards? > > That's the question. And the answer is : some sort of 'high latency' mixing network. And interestingly enough such a network doesn't seem to exist, although it seems to me it would require less resources than something like tor. And nobody seems to be worried about having or not having that kind of network, which strikes me as odd... > I guess that you say that there is none, and we > should all just organize our local cells. What I was trying to say is that, if the use case is 'criminal activity', then using a 'low latency' network like tor which provides centralized 'hidden' services is a not a good idea. It's more like a recipe for disaster. > And maybe you're right. > > >> What? > >> > >> Or is it nothing? And if nothing, how useful is that? > >> > >> Or maybe you have some really cool thing, but you won't share it? > >> > So maybe living in Argentina is your only protection. Whatever. > > > >>> > >>> > > > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/07/2018 05:04 PM, juan wrote: > On Mon, 6 Aug 2018 14:21:12 -0700 > Mirimir wrote: > >> On 08/06/2018 02:03 PM, juan wrote: >>> On Mon, 6 Aug 2018 13:36:18 -0700 >>> Mirimir wrote: >>> >>> I bet that you use nothing. I mean, damn, you're using a Gmail account. >>> >>> yes, and I use it to order drugs via tor - after all many 'hidden' >>> services admins use their gmail accounts. That's how they get caught. >> >> Very funny :) >> >> But OK, let's say that Tor is Americunt honeypot. I mean, I have my >> doubts. But actually, the main reason why I don't order drugs from >> .onion marketplaces is not wanting to disclose my postal address. That's >> what earned DPR his first visit from the feds, after all. Fake IDs. > > > as a side note of sorts > > https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html Sad but true. >> Anyway, Tor is out of consideration. What would you have people use for >> any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots? > > > it obviously depends on what kind of 'anonimity'. Browse the web for > ordinary stuff while not being tracked by advertisers? a vpn. Or two. Or tor. lol > for other stuff...do you have to ask? What sort of system do you think > should be used for coordinating 'criminal' activity, instead of streaming > super full SHD video for retards? That's the question. I guess that you say that there is none, and we should all just organize our local cells. And maybe you're right. >> What? >> >> Or is it nothing? And if nothing, how useful is that? >> >> Or maybe you have some really cool thing, but you won't share it? >> So maybe living in Argentina is your only protection. Whatever. >>> >>> > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Tuesday, August 7, 2018, 5:05:46 PM PDT, juan wrote: as a side note of sorts https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html × "But Mr. Donahoe said that the images had been used “a couple of times” by law enforcement to trace letters in criminal cases, including one involving ricin-laced letters sent to President Obama and Mayor Michael R. Bloomberg of New York. The images of letters and packages are generally stored for a week to 30 days and then destroyed, he told the A.P." [end of quote from article] About that article. I think it's curious that they claim to "destroy' the images after "a week to 30 days". If there are about 1 billion mailed items each year, and it takes 50 kilobytes to store an image (wild ass guess, and assuming some compression), that would amount to 50 terabytes of data: A bit more than 4 of the largest-capacity of hard drives currently sold. https://www.wdc.com/products/internal-storage/wd-gold-enterprise-class-hard-drive.html?gclid=CjwKCAjwhqXbBRAREiwAucoo-yp9zBDxr1hrojtP7nXAw8Trmtx4-9N8m5DAecI3hqQeTEyGeHWYjBoCg_IQAvD_BwE Think about it. If YOU had access to this data, would YOU erase it, if the storage only cost about $2000 per year? Jim Bell
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Mon, 6 Aug 2018 14:21:12 -0700 Mirimir wrote: > On 08/06/2018 02:03 PM, juan wrote: > > On Mon, 6 Aug 2018 13:36:18 -0700 > > Mirimir wrote: > > > > > >> I bet that you use nothing. I mean, damn, you're using a Gmail account. > > > > yes, and I use it to order drugs via tor - after all many 'hidden' > > services admins use their gmail accounts. That's how they get caught. > > Very funny :) > > But OK, let's say that Tor is Americunt honeypot. I mean, I have my > doubts. But actually, the main reason why I don't order drugs from > .onion marketplaces is not wanting to disclose my postal address. That's > what earned DPR his first visit from the feds, after all. Fake IDs. as a side note of sorts https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html > > Anyway, Tor is out of consideration. What would you have people use for > any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots? it obviously depends on what kind of 'anonimity'. Browse the web for ordinary stuff while not being tracked by advertisers? a vpn. Or two. Or tor. for other stuff...do you have to ask? What sort of system do you think should be used for coordinating 'criminal' activity, instead of streaming super full SHD video for retards? > > What? > > Or is it nothing? And if nothing, how useful is that? > > Or maybe you have some really cool thing, but you won't share it? > > >> So maybe living in Argentina is your only protection. Whatever. > >> > >> > > > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/06/2018 02:03 PM, juan wrote: > On Mon, 6 Aug 2018 13:36:18 -0700 > Mirimir wrote: > > >> I bet that you use nothing. I mean, damn, you're using a Gmail account. > > yes, and I use it to order drugs via tor - after all many 'hidden' > services admins use their gmail accounts. That's how they get caught. Very funny :) But OK, let's say that Tor is Americunt honeypot. I mean, I have my doubts. But actually, the main reason why I don't order drugs from .onion marketplaces is not wanting to disclose my postal address. That's what earned DPR his first visit from the feds, after all. Fake IDs. Anyway, Tor is out of consideration. What would you have people use for any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots? What? Or is it nothing? And if nothing, how useful is that? Or maybe you have some really cool thing, but you won't share it? >> So maybe living in Argentina is your only protection. Whatever. >> >> > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On Mon, 6 Aug 2018 13:36:18 -0700 Mirimir wrote: > I bet that you use nothing. I mean, damn, you're using a Gmail account. yes, and I use it to order drugs via tor - after all many 'hidden' services admins use their gmail accounts. That's how they get caught. > So maybe living in Argentina is your only protection. Whatever. > >
Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not
On 08/06/2018 01:21 PM, juan wrote: > On Mon, 6 Aug 2018 12:30:50 -0700 > Mirimir wrote: >> But seriously, if Tor is just Americunt honeypot, what do _you_ use for >> anonymity? > > whatever I use, or don't use, has exactly FUCK to do with any half > sensible analysis of the US military tor network. So why do you even ask? And > whatever I use, or don't, you think I would comment on it here? I bet that you use nothing. I mean, damn, you're using a Gmail account. So maybe living in Argentina is your only protection. Whatever.