Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-13 Thread Mirimir
On 08/13/2018 03:14 PM, juan wrote:
> On Sat, 11 Aug 2018 15:17:45 -0700
> Mirimir  wrote:
> 
> 
>>
>> Ummm, no :) There are still many extreme .onion sites. Mainly "hard
>> candy". A quick scan yielded eight that were up when I checked:
> 
> 
>   Well, I'd say most of your links show that the content is hardly 
> extreme.

Seriously, WTF? You say "hardly extreme"? Did you actually look at all
of those "hard candy" sites? If you don't consider some of that extreme,
I wonder about your criteria ;)

But whatever. I'm not going to post examples to the list :)




Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-13 Thread juan
On Sat, 11 Aug 2018 15:17:45 -0700
Mirimir  wrote:


> 
> Ummm, no :) There are still many extreme .onion sites. Mainly "hard
> candy". A quick scan yielded eight that were up when I checked:


Well, I'd say most of your links show that the content is hardly 
extreme. Four versions of the **censored** hidden wiki, a couple of discussion 
boards with barely any content as far as I can tell, one of the 'hacking' forum 
has 0 posts in all categories, another apparently requires an email address 
(...), and sites trying to sell ordinary porn for bitcoins, so more than likely 
outright scams. 

And there are a couple of sites that seem to link to 'ilegal' content 
onclearnet! So although the boards are a 'hidden' service their content 
isn't actually hosted on tor. Rather  suspicious I'd say. 

So I'll stick to my general view : tor has an extensive record of 
failure, and if the govt wants a honeypot, then some sites have to last for a 
while to provide the illusion that 'tor works'. 




Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-11 Thread Mirimir
On 08/11/2018 02:05 PM, juan wrote:
> On Fri, 10 Aug 2018 10:43:07 -0700
> Mirimir  wrote:
> 
>> On 08/09/2018 08:42 PM, juan wrote:
>>> On Thu, 9 Aug 2018 15:01:46 -0700
>>> Mirimir  wrote:
>>>
>>>
>>
>> So? Well, if they [mix networks] are not being implemented, they're not 
>> very useful. 
>
> 
>> Sure, there are better options. But they're not currently implemented at
>> useful scale. How can you use a mix network that exists only as an
>> academic paper, and perhaps some tens of people testing it?
> 
>   Oh my bad. I misread  and thought you said they were not being 
> implemented because they could not possibly be useful. Since you had said 
> that tor was 'good enough' for AP, I assumed that you further added that slow 
> mix networks were not really needed, so no demand and no supply.
> 
> 
>   But you are saying that a critical mass of users is required, which is 
> of course true, and something I never denied...So not sure how that comment 
> of yours is 'helpful'? =)

OK, I'm glad. We at least agree that better anonymity networks are
needed. In particular, higher-latency mix networks with padding. And I
think that we agree that lack of demand has stalled implementation, even
though there have been proposals.

And so, I'm going to drop the rest of the discussion about this, because
I'm tired of it ;) I was serious about Riffle, though :)



>> One of the major Russian marketplaces is (or was) on I2P.
>> Also lots of porn and CP, predictably.
> 
>   By now I'm starting to suspect that your definition of 'child porn' is 
> that of the puritan, jew-kristian, american government? Any girl under 18 
> wearing a bikini is 'child porn'? And even going by such 'definition' I don't 
> think there's "lots of CP' on i2p or tor. 
> 
>   Furthermore, you can find that sort of 'CP' on clearnet...

Ummm, no :) There are still many extreme .onion sites. Mainly "hard
candy". A quick scan yielded eight that were up when I checked:

Child a Priori - because children always come first
http://7vd5mehclc2zw4sw.onion/

Dark Scandals [pwned cam whores]
http://darksdsp6iexyidx.onion/

Hijab FUCK Girls
http://hijabxq3ctj6oufk.onion/

Little Cute Girls
http://girlsk34dlwyaqex.onion/

Loli Lust
http://lolimknaduomuzdr.onion

Sea Kitten Palace [gore, torture and Disney]
http://wtwfzc6ty2s6x4po.onion/

Teen Deepthroat
http://qa4t6wjhl4gzl5in.onion/
videos for Bitcoin

Youngest Girls
http://hq4etj553otlzb5m.onion/

Even so, the collections on Freenet are far more extensive.



>>> "in the past you could find links on reddit to .onion sites that kinda 
>>> looked 'uncensored'. Those sites do not exist anymore. But feel free to 
>>> prove me wrong and POST EVIDENCE, that is, links to content that the 
>>> 'authorities' would like to remove but can't. " 
>>
>> OK, let me see. I don't spend much time on .onion sites. Many sites did
>> disappear over the past year or two.
> 
>   Many sites disappear EVERY year or two. That is, they don't LAST more 
> than a year or two. And that's always been so. 
> 
>   And actually it's probably getting worse because there isn't any 
> upgrate to tor whereas you can expect the traffic analyisis capabilities of 
> the enemy to be upgraded all the time.

OK, so I have spent a few hours rooting around for .onion sites. There
are multiple forks of The Hidden Wiki, plus a hard candy fork:

The Hidden Wiki [semi censored version]
http://zqktlwi465r2mxfw.onion/wiki/Main_Page.php

The Uncensored Hidden Wiki [but no hard candy]
http://2zmcyrryihrpdzka.onion/wiki/index.php/Main_Page
http://uhwikih256ynt57t.onion/wiki/index.php/Main_Page
http://uhwikihjqzr5tyll.onion/wiki/index.php/Main_Page

Central Park [including some hard candy]
http://boysopidonajtogl.onion/

Then there are a few search engines:

Ahima [search, fast, doesn't return many dead sites]
http://msydqstlz2kzerdg.onion/

not Evil [search, returns many dead sites, some marked as dead]
http://hss3uro2hsxfogfq.onion/

OnionLand Search Engine [heavily censored]
http://3bbaaaccczcbdddz.onion

Also some discussion sites:

Galaxy3 [general discussion]
http://galaxy3m2mn5iqtn.onion/

Hidden Answers [very diverse]
http://answerstedhctbek.onion

The Hub [dark marketplace stuff]
http://thehub7xbw4dc5r2.onion/

I did find a few cracking/hacking sites:

0day [hacking forum, also clearnet]
http://qzbkwswfv5k2oj5d.onion/

AN0NYM0US'z F0RUM [hacking forum]
http://rhe4faeuhjs4ldc5.onion/

Codex [cracking forum]
http://codexqutu7ytbguw.onion/

Torum ["cyber security" forum]
http://gf2juatsqdph6x2h.onion/

But most of the old standards are gone, such as Dark0de, Mazafaka and
Trojanforge. And "not Evil" returns numerous dead cracking/hacking
.onion URLs.

So anyway, it's my guess that most of the cracking/hacking sites, and
lots of other weird shit, were on shared .onion hosting that's been
taken down. And conversely, it's arguable that the surviving hard candy
sites are self hosted. Survival of the fittest, you know. 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-11 Thread juan
On Fri, 10 Aug 2018 10:43:07 -0700
Mirimir  wrote:

> On 08/09/2018 08:42 PM, juan wrote:
> > On Thu, 9 Aug 2018 15:01:46 -0700
> > Mirimir  wrote:
> > 
> > 
> 
>  So? Well, if they [mix networks] are not being implemented, they're not 
>  very useful. 
> >>>

> Sure, there are better options. But they're not currently implemented at
> useful scale. How can you use a mix network that exists only as an
> academic paper, and perhaps some tens of people testing it?

Oh my bad. I misread  and thought you said they were not being 
implemented because they could not possibly be useful. Since you had said that 
tor was 'good enough' for AP, I assumed that you further added that slow mix 
networks were not really needed, so no demand and no supply.


But you are saying that a critical mass of users is required, which is 
of course true, and something I never denied...So not sure how that comment of 
yours is 'helpful'? =)

To recap : 
me : Better tools are needed.
you ; but they don't exist! 
me : well yes? THat's why they are needed...?



> OK, that helps maybe a little. But you've been online for many years,
> and I'm sure that you have friends and associates. So organize some
> cutting-edge mix network. 

Ha. I have tried to sell(metaphorically speaking) more secure channels 
to friends and wasn't too succesful. They don't believe it's worthwhile because 
in the grand scheme of things  we are fucked anyway, they say.

At any rate, that has little to do with my comments about tor and what 
sort of comms are needed for AP. 



> Maybe Riffle, developed by Young Hyun Kwon.[1]
> Or whatever you think better. And damn, I'll even help, if you like :)
> 
> 1)
> https://dspace.mit.edu/bitstream/handle/1721.1/99859/927718269-MIT.pdf?sequence=1

Thanks. Let me see...


> > 
> > 
> > And yet you seem to be very uncritical of a flagship project of the US 
> > military like tor.
> 
> Maybe to you I seem insufficiently critical. But maybe ask Tor devs ;)


When I was on tor-talk I saw little if any criticism. But meh...



> 
> >> Or in this case, I2P. 
> > 
> > From what I've seen of i2p content(or complete lack of it) it's a lot 
> > worse than tor. Which is saying a lot...
> 
> That's because I2P has very few clearnet exits, so all you see is stuff
> hosted on I2P. 

Yes, that's what I looked at and that's the basic data to look at. What 
sort of content is hosted inside i2p.

> One of the major Russian marketplaces is (or was) on I2P.
> Also lots of porn and CP, predictably.

By now I'm starting to suspect that your definition of 'child porn' is 
that of the puritan, jew-kristian, american government? Any girl under 18 
wearing a bikini is 'child porn'? And even going by such 'definition' I don't 
think there's "lots of CP' on i2p or tor. 

Furthermore, you can find that sort of 'CP' on clearnet...




> 
> >> For decentralized storage generally, I like IPFS. 
> >> For example, a year or
> >> two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though
> >> I'm not currently running any IPFS nodes, it's still there. Because
> >> enough people pinned it. If I hadn't disclosed that, it would be
> >> nontrivial for adversaries to link it to me.
> >>
> >> 0) https://ipfs.io/ipfs/QmUDV2KHrAgs84oUc7z9zQmZ3whx1NB6YDPv8ZRuf4dutN/
> > 
> > 
> > Hm. OK. Looking at IPFS...So it's a lot newer than tor and freenet! NEW 
> > AND IMPROVED. Meaning, untested. And they have a 'filecoin' and 200 
> > millions through an ICO...
> 
> So whatever. It's the thing now, for kids. But it does seem to work
> pretty well.

there's also maidsafe and storj which are well funded too (or at least 
maidsafe is) and they are not going anywhwere as far as I can tell (though 
admitedly I haven't looked into them).

Anyway, I might take a look at ipfs though for starters the reference 
client uses fucking go from fucking google...Not encouraging at all.




> >>
> >> Really? Gotta a link for that?
> > 
> > 
> > you never heard of gnutella...? 
> 
> Sure, but didn't know that it was still up. Is it?

...you can find out for yourself? =) But yeah, although it has (a lot) 
less users than in the good old days it still works.


> 
> I mean, damn, I can't find any music on TPB! That sucks.

I haven't had much trouble getting some stuff off tpb but I don't use 
it too much so...


 



> > If augur's interface is a shitty website accessed through tor, then I'm 
> > going to be skeptical about its success. And lo and behold, augur's web 
> > interface uses JAVASHIT, number one security hole for 'web applications'. 
> 
> The root issue isn't where Augur's website runs. The issue is trading
> Ethereum anonymously.

I expect all parts of the system need to be secured...




> > If you want to run a full node you need to download some 200gb, but 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-10 Thread Mirimir
On 08/09/2018 08:42 PM, juan wrote:
> On Thu, 9 Aug 2018 15:01:46 -0700
> Mirimir  wrote:
> 
> 

 So? Well, if they [mix networks] are not being implemented, they're not 
 very useful. 
>>>
>>> not useful for what? 
>>
>> Huh? Are you retarded? Sure, you and your friends can setup some super
>> duper mix network, but it won't do you any fucking good. Because, you
>> know, you're the only people using it. And once an adversary gets
>> access, you're totally screwed.
> 
>   Sure, but now you jumped to something else. What about keeping track of 
> the topic at hand? 
>   
>   Topic : there are no secure mix networks because people (stupidly) use 
> more 'convenient' stuff. And while the faster, less secure stuff does have 
> its use cases, so do the other systems. 
> 
>   So what's retarded here is your  line of thinking "there are no better 
> options cause they are not useful'

Sure, there are better options. But they're not currently implemented at
useful scale. How can you use a mix network that exists only as an
academic paper, and perhaps some tens of people testing it?



>> And unless you actually
>> mobilize some support and participation for whatever you want. I haven't
>> heard much of that from you.
> 
> 
>   It should be self evident that explaining that tor is mostly useful to 
> watch jewtube has the implicit goal of 'mobilizing support' for better 
> alternatives. 
> 
>   also notice that I am not an agent of the US military, but an 
> independent individual from a banana republic - so my resources to 'mobilize 
> support' are somewhat limited.

OK, that helps maybe a little. But you've been online for many years,
and I'm sure that you have friends and associates. So organize some
cutting-edge mix network. Maybe Riffle, developed by Young Hyun Kwon.[1]
Or whatever you think better. And damn, I'll even help, if you like :)

1)
https://dspace.mit.edu/bitstream/handle/1721.1/99859/927718269-MIT.pdf?sequence=1

>>> oh, that's nice =) (just in the highly unlikely case that you are 
>>> trying to mock me, bear in mind that the joke is on you =) ).
>>
>> No mocking involved. I do agree. And you know, I really don't love those
>> Americunt fascists either. Even though I'm living there now.
> 
> 
>   And yet you seem to be very uncritical of a flagship project of the US 
> military like tor.

Maybe to you I seem insufficiently critical. But maybe ask Tor devs ;)



 But not Freenet! That shit is ~20 years out of date. More below.
>>>
>>> Keep trolling. So decentralized storage is 20 years out of date whereas 
>>> using php to serve files behind a low quality proxy is the 'technology' of 
>>> the next americunt century. 
>>
>> No, Freenet is 20 years out of date. Because it makes _no_ attempt to
>> obscure IP addresses of peers. As far as I know, there is no protocol
>> for decentralized storage that does obscure IP addresses of peers. 
> 
>   uh, so everything is 20 years out of date? 
> 
>> And so you need to use some overlay network. Such as VPNs and/or Tor.
> 
>   OK. So if you add a proxy before  freenet then freenet is better than 
> php in a centralized webserver? 

Almost certainly, because it's distributed. But in my experience, the
Freenet community doesn't like people using proxies.

>> Or in this case, I2P. 
> 
>   From what I've seen of i2p content(or complete lack of it) it's a lot 
> worse than tor. Which is saying a lot...

That's because I2P has very few clearnet exits, so all you see is stuff
hosted on I2P. One of the major Russian marketplaces is (or was) on I2P.
Also lots of porn and CP, predictably.

>> Because there's no need to reach clearnet stuff.
>> However, I2P also has its issues. It's a lot smaller than Tor. And every
>> participant must be a router, analogous to a Tor relay. Which means that
>> participants attract more attention, and may get their IPs blacklisted.
> 
> 
>   That's how a decentralized network works? If you are a peer you may 
> attract attention. Not sure what kind of 'workaround' can be for that. If you 
> use an 'overlay' then you will 'attract attention' for using an overlay, etc.

What's nice about Tor is that relay operators attract the most
attention. And it's my impression that they're generally not up to any
iffy shit. Or at least, they shouldn't be, if they're smart. So people
up to iffy shit just run clients. And that doesn't attract as much
attention. Especially if they use bridges that aren't published. Or
create their own bridge, on some random VPS.

>> For decentralized storage generally, I like IPFS. 
>> For example, a year or
>> two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though
>> I'm not currently running any IPFS nodes, it's still there. Because
>> enough people pinned it. If I hadn't disclosed that, it would be
>> nontrivial for adversaries to link it to me.
>>
>> 0) https://ipfs.io/ipfs/QmUDV2KHrAgs84oUc7z9zQmZ3whx1NB6YDPv8ZRuf4dutN/
> 
> 
>

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-09 Thread juan
On Thu, 9 Aug 2018 15:01:46 -0700
Mirimir  wrote:


> >>
> >> So? Well, if they [mix networks] are not being implemented, they're not 
> >> very useful. 
> > 
> > not useful for what? 
> 
> Huh? Are you retarded? Sure, you and your friends can setup some super
> duper mix network, but it won't do you any fucking good. Because, you
> know, you're the only people using it. And once an adversary gets
> access, you're totally screwed.

Sure, but now you jumped to something else. What about keeping track of 
the topic at hand? 

Topic : there are no secure mix networks because people (stupidly) use 
more 'convenient' stuff. And while the faster, less secure stuff does have its 
use cases, so do the other systems. 

So what's retarded here is your  line of thinking "there are no better 
options cause they are not useful'



> 
> >> You
> >> can fume all you want about some ideal that ought to exist. But that
> >> alone doesn't really help much.
> > 
> > you mean, discussing the 'technical details' doesn't 'help' whereas  US 
> > military propaganda 'helps'? Well, of course, that's true, depending on 
> > what is being 'helped'...
> 
> Sure, "discussing the 'technical details'" helps. But not if you're just
> bitching about what's wrong with existing stuff.


lol - in other words,  there's a laundry list of criticism that you are 
fully unable to counter so you call it 'bitching'. 



> And unless you actually
> mobilize some support and participation for whatever you want. I haven't
> heard much of that from you.


It should be self evident that explaining that tor is mostly useful to 
watch jewtube has the implicit goal of 'mobilizing support' for better 
alternatives. 

also notice that I am not an agent of the US military, but an 
independent individual from a banana republic - so my resources to 'mobilize 
support' are somewhat limited.




> > 
> > oh, that's nice =) (just in the highly unlikely case that you are 
> > trying to mock me, bear in mind that the joke is on you =) ).
> 
> No mocking involved. I do agree. And you know, I really don't love those
> Americunt fascists either. Even though I'm living there now.


And yet you seem to be very uncritical of a flagship project of the US 
military like tor.



> 
> >> But that's not the only reason. There's also the
> >> latency vs usability tradeoff. 
> > 
> > Which I think I acknowledged...
> 
> Yes, you did. Barely. And them you hand-waved it away ;)


Bullshit. Just in case my position isn't clear. You want to watch 
jewtube videos or control drones to murder children use tor,  a 'low latency' 
network. You want some half decent anonimity? Use something else. 

This being the cpunks mailing list, not the tor mailing list, or other 
outlet for US military propaganda, it seems to me that your constant 'bitching' 
about 'usability' is misplaced. 


 
> 
> >> Or even if it is, maybe you ought to be
> >> promoting them?
> > 
> > And what am I doing here? 
> 
> So far, you've promoted Freenet. Which is arguably _worse_ than Tor.


It's not my intention to promote freenet, and I barely promoted it. 

What needs to be done is getting rid of the tor scum =)


> 
> >> But not Freenet! That shit is ~20 years out of date. More below.
> > 
> > Keep trolling. So decentralized storage is 20 years out of date whereas 
> > using php to serve files behind a low quality proxy is the 'technology' of 
> > the next americunt century. 
> 
> No, Freenet is 20 years out of date. Because it makes _no_ attempt to
> obscure IP addresses of peers. As far as I know, there is no protocol
> for decentralized storage that does obscure IP addresses of peers. 

uh, so everything is 20 years out of date? 

> And so you need to use some overlay network. Such as VPNs and/or Tor.

OK. So if you add a proxy before  freenet then freenet is better than 
php in a centralized webserver? 


> 
> Or in this case, I2P. 

From what I've seen of i2p content(or complete lack of it) it's a lot 
worse than tor. Which is saying a lot...


> Because there's no need to reach clearnet stuff.
> However, I2P also has its issues. It's a lot smaller than Tor. And every
> participant must be a router, analogous to a Tor relay. Which means that
> participants attract more attention, and may get their IPs blacklisted.


That's how a decentralized network works? If you are a peer you may 
attract attention. Not sure what kind of 'workaround' can be for that. If you 
use an 'overlay' then you will 'attract attention' for using an overlay, etc.


> 
> For decentralized storage generally, I like IPFS. 
> For example, a year or
> two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though
> I'm not currently running any IPFS nodes, it's still there. Because
> enough people pinned it. If I hadn't disclosed that, it would be
> 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-09 Thread Mirimir
On 08/09/2018 01:09 PM, juan wrote:
> On Thu, 9 Aug 2018 10:25:12 -0700
> Mirimir  wrote:
> 
>> On 08/08/2018 11:01 PM, juan wrote:
>>> On Wed, 8 Aug 2018 20:44:53 -0700
>>> Mirimir  wrote:
>>>
>>>

 Anyway, I vaguely recall proposed higher-latency mix networks that would
 be usable for browsing, remote management, etc. But I haven't heard that
 any are actually getting implemented.
>>>
>>> so? 
>>
>> So? Well, if they're not being implemented, they're not very useful. 
> 
>   not useful for what? 

Huh? Are you retarded? Sure, you and your friends can setup some super
duper mix network, but it won't do you any fucking good. Because, you
know, you're the only people using it. And once an adversary gets
access, you're totally screwed.

>> You
>> can fume all you want about some ideal that ought to exist. But that
>> alone doesn't really help much.
> 
>   you mean, discussing the 'technical details' doesn't 'help' whereas  US 
> military propaganda 'helps'? Well, of course, that's true, depending on what 
> is being 'helped'...

Sure, "discussing the 'technical details'" helps. But not if you're just
bitching about what's wrong with existing stuff. And unless you actually
mobilize some support and participation for whatever you want. I haven't
heard much of that from you.

>> And yeah, I know that they're not being implemented because those
>> Americunt fascists are so damn good at propaganda. I do tend to agree
>> with you about that. 
> 
>   oh, that's nice =) (just in the highly unlikely case that you are 
> trying to mock me, bear in mind that the joke is on you =) ).

No mocking involved. I do agree. And you know, I really don't love those
Americunt fascists either. Even though I'm living there now.

>> But that's not the only reason. There's also the
>> latency vs usability tradeoff. 
> 
>   Which I think I acknowledged...

Yes, you did. Barely. And them you hand-waved it away ;)

>> Or even if it is, maybe you ought to be
>> promoting them?
> 
>   And what am I doing here? 

So far, you've promoted Freenet. Which is arguably _worse_ than Tor.

>> But not Freenet! That shit is ~20 years out of date. More below.
> 
>   Keep trolling. So decentralized storage is 20 years out of date whereas 
> using php to serve files behind a low quality proxy is the 'technology' of 
> the next americunt century. 

No, Freenet is 20 years out of date. Because it makes _no_ attempt to
obscure IP addresses of peers. As far as I know, there is no protocol
for decentralized storage that does obscure IP addresses of peers. And
so you need to use some overlay network. Such as VPNs and/or Tor.

Or in this case, I2P. Because there's no need to reach clearnet stuff.
However, I2P also has its issues. It's a lot smaller than Tor. And every
participant must be a router, analogous to a Tor relay. Which means that
participants attract more attention, and may get their IPs blacklisted.

For decentralized storage generally, I like IPFS. For example, a year or
two ago I put "Fast Data Transfer via Tor" on IPFS.[0] And even though
I'm not currently running any IPFS nodes, it's still there. Because
enough people pinned it. If I hadn't disclosed that, it would be
nontrivial for adversaries to link it to me.

0) https://ipfs.io/ipfs/QmUDV2KHrAgs84oUc7z9zQmZ3whx1NB6YDPv8ZRuf4dutN/

>   by the way, freenet is 18 years old and your employer the tor 
> corporation is 15 years old. So I guess tor is 'almost' ~20 years out of 
> date? 
> 
> 
>   And you know, there's even older stuff than freenet, like the p2p 
> networks based on gnutella and they are of course superior to bittorrent, let 
> alone to 'web based' 'solutions'.

Really? Gotta a link for that? I've been wondering where to get some
current music at a decent price. I will _not_ use Spotify!

>>> Not sure if you are keeping track of the 'issue' here. As far as I'm 
>>> concerned the 'issue' is not BROWSING THE FUCKING WEB but doing 
>>> 'cryptoanarchy' 'stuff'
>>
>> Huh? Just what the fuck else is "'cryptoanarchy' 'stuff'" then? 
> 
> 
>   We were talking about assasination politics. And you barefacedly 
> declared that tor was 'good enough' for end users, 'good enough' for hidden 
> services, and 'good enough' for killing trump. So here the 'crypto anarchy 
> stuff' is AP. 
> 
>   Now, are you trolling or what? You can't remember the topic of the 
> discussion from one message to the next? Or?

OK, so how are you planning to use Augur or whatever without revealing
your IP address? And actually, if I said that Tor would work with Augur,
I was wrong. Because Ethereum wallets use UDP, which Tor doesn't handle.
So you're left with nested VPN chains. Unless someone forks to I2P. But
that too seems iffy, given how small I2P is.

>> There
>> are web sites. There's email. There are various more-or-less P2P
>> messaging systems. There's SSH for managing servers.
>>
>> I agree that email and messaging would better resist 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-09 Thread juan
On Thu, 9 Aug 2018 10:25:12 -0700
Mirimir  wrote:

> On 08/08/2018 11:01 PM, juan wrote:
> > On Wed, 8 Aug 2018 20:44:53 -0700
> > Mirimir  wrote:
> > 
> > 
> >>
> >> Anyway, I vaguely recall proposed higher-latency mix networks that would
> >> be usable for browsing, remote management, etc. But I haven't heard that
> >> any are actually getting implemented.
> > 
> > so? 
> 
> So? Well, if they're not being implemented, they're not very useful. 

not useful for what? 

> You
> can fume all you want about some ideal that ought to exist. But that
> alone doesn't really help much.

you mean, discussing the 'technical details' doesn't 'help' whereas  US 
military propaganda 'helps'? Well, of course, that's true, depending on what is 
being 'helped'...


> 
> And yeah, I know that they're not being implemented because those
> Americunt fascists are so damn good at propaganda. I do tend to agree
> with you about that. 

oh, that's nice =) (just in the highly unlikely case that you are 
trying to mock me, bear in mind that the joke is on you =) ).




> But that's not the only reason. There's also the
> latency vs usability tradeoff. 

Which I think I acknowledged...


> Or even if it is, maybe you ought to be
> promoting them?

And what am I doing here? 


> 
> But not Freenet! That shit is ~20 years out of date. More below.

Keep trolling. So decentralized storage is 20 years out of date whereas 
using php to serve files behind a low quality proxy is the 'technology' of the 
next americunt century. 


by the way, freenet is 18 years old and your employer the tor 
corporation is 15 years old. So I guess tor is 'almost' ~20 years out of date? 


And you know, there's even older stuff than freenet, like the p2p 
networks based on gnutella and they are of course superior to bittorrent, let 
alone to 'web based' 'solutions'.



> 
> > Not sure if you are keeping track of the 'issue' here. As far as I'm 
> > concerned the 'issue' is not BROWSING THE FUCKING WEB but doing 
> > 'cryptoanarchy' 'stuff'
> 
> Huh? Just what the fuck else is "'cryptoanarchy' 'stuff'" then? 


We were talking about assasination politics. And you barefacedly 
declared that tor was 'good enough' for end users, 'good enough' for hidden 
services, and 'good enough' for killing trump. So here the 'crypto anarchy 
stuff' is AP. 

Now, are you trolling or what? You can't remember the topic of the 
discussion from one message to the next? Or?



> There
> are web sites. There's email. There are various more-or-less P2P
> messaging systems. There's SSH for managing servers.
> 
> I agree that email and messaging would better resist compromise if they
> used higher-latency mix networks. Even very high-latency ones, with lots
> of padding. 


Not just email, but any protocol that doesn't require 'instant' 
messages. Which I imagine includes AP.


> But SSH via nested VPN chains plus Tor is painful enough as
>  it is. I can't imagine waiting minutes between typing and remote action.
> 
> >> What have I missed?
> > 
> > good thing that at least you are asking. Now try to answer your 
> > question. 
> 
> Well, I was hoping for some constructive discussion. But that's hard
> with you. But whatever, we are what we are.


You are expecting me to provide something that doesn't exist and can't 
exist?  And since nobody can provide a fast and secure network, you just keep 
parroting tor propganda? 

Well I guess that's your job description?


> 
> >> Yes, basically. Tor was developed by the US military. But that's not
> >> likely why privacy activists embraced it.
> > 
> > yes it is - 'privacy' 'activists' 'embraced' it because the fucking US 
> > military promoted it. 
> > 
> > again, here's a link for you 
> > 
> > http://www.monitor.upeace.org/innerpg.cfm?id_article=816
> > 
> > that's commie 'anarchist' appelbaum who got US$ 100k per year to 
> > promote a tool used by the US govt to promote coups in the middle east. 
> 
> Indeed. Tor was announced on _this list_ :)

...not entirely sure what your remark means? Anyway, hopefully the 
reason why tor is so 'popular' is clear enough by now.

But I guess you are still ignoring the reason for tor to exist. It is 
for americunt nazis to promote 'democracy' in 'repressive' regimes. 




> 
> And seriously, are you following the published literature on overlay
> networks? 

No. I'm following tor propaganda by you and grarpamp in lists like this 
one. 



> > 
> > yes, ask all the people who are in jail thanks to tor. Or dead. 
> 
> Yeah, yeah. But nothing's perfect. And consider how many more would be
> jailed or dead if they _hadn't_ used Tor.

Less people. You don't do stupidly risky things if you know you are 
getting caught. You do them when you drink the koolaid from the US military 
like Ulbricht did.



> 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-09 Thread Mirimir
On 08/08/2018 11:01 PM, juan wrote:
> On Wed, 8 Aug 2018 20:44:53 -0700
> Mirimir  wrote:
> 
> 
>>
>> Anyway, I vaguely recall proposed higher-latency mix networks that would
>> be usable for browsing, remote management, etc. But I haven't heard that
>> any are actually getting implemented.
> 
>   so? 

So? Well, if they're not being implemented, they're not very useful. You
can fume all you want about some ideal that ought to exist. But that
alone doesn't really help much.

And yeah, I know that they're not being implemented because those
Americunt fascists are so damn good at propaganda. I do tend to agree
with you about that. But that's not the only reason. There's also the
latency vs usability tradeoff. Or even if it is, maybe you ought to be
promoting them?

But not Freenet! That shit is ~20 years out of date. More below.

>   Not sure if you are keeping track of the 'issue' here. As far as I'm 
> concerned the 'issue' is not BROWSING THE FUCKING WEB but doing 
> 'cryptoanarchy' 'stuff'

Huh? Just what the fuck else is "'cryptoanarchy' 'stuff'" then? There
are web sites. There's email. There are various more-or-less P2P
messaging systems. There's SSH for managing servers.

I agree that email and messaging would better resist compromise if they
used higher-latency mix networks. Even very high-latency ones, with lots
of padding. But SSH via nested VPN chains plus Tor is painful enough as
it is. I can't imagine waiting minutes between typing and remote action.

>> What have I missed?
> 
>   good thing that at least you are asking. Now try to answer your 
> question. 

Well, I was hoping for some constructive discussion. But that's hard
with you. But whatever, we are what we are.

>> Yes, basically. Tor was developed by the US military. But that's not
>> likely why privacy activists embraced it.
> 
>   yes it is - 'privacy' 'activists' 'embraced' it because the fucking US 
> military promoted it. 
> 
>   again, here's a link for you 
> 
>   http://www.monitor.upeace.org/innerpg.cfm?id_article=816
>   
>   that's commie 'anarchist' appelbaum who got US$ 100k per year to 
> promote a tool used by the US govt to promote coups in the middle east. 

Indeed. Tor was announced on _this list_ :)

And seriously, are you following the published literature on overlay
networks? I was, but I'm maybe 2-3 years out of date. So if any y'all
know about something that's getting traction, or seriously ought to be,
please do point to it.

>> It became popular because it
>> provided a better mix of security and usability.
> 
> 
>   yes, ask all the people who are in jail thanks to tor. Or dead. 

Yeah, yeah. But nothing's perfect. And consider how many more would be
jailed or dead if they _hadn't_ used Tor.

 Also very slow. And I can't imagine how it could have
 scaled. Although I suppose that some of the binary newsgroups did get
 pretty fucking huge. But anyway, overhead is a key problem with mix
 networks.
>>>
>>>
>>> That's how they work as far as I understand them. So saying it's a 
>>> problem really misses the point. 
>>
>> What's a problem is _too much_ overhead.
> 
> 
>   you are just bullshiting and hand waving. 

No, I'm not. Go read the fucking papers, if you don't believe me.

>> That is, total traffic grows
>> more or less exponentially with the number of users.
> 
> 
>>
 Development of the Web was part of it, I'm sure. 
>>>
>>> Yep. And the 'culture' behind it. Allow retards to stream super ultra 
>>> SHD videos. But I wouldn't like to blame the victims too much, so of course 
>>> the problem is the assholes at the top who dictate how 'technology' is 
>>> developed. 
>>
>> Open-source software is hardly driven by "assholes at the top".
> 
>   
>   what - are you referring to the fact that tor is open source? So 
> fucking what. It is developed and controlled by military scum like syverson 
> and the little tor mafia. Who by now must have gotten 10 MILLION DOLLARS for 
> their 'work'.

So what? Is poverty your ideal or something?

>> Trust me, dude. Stay away from Freenet. Sure, you think Tor is pwned.
>> But Freenet is so pwned that I'd never use it ;) Except through Tor ;)
>> It's a joke. 
> 
>   yes I agree. What you say is a joke. 
>   
>   You are confirming from the nth time that you are if not a paid agent, 
> an 'amateur' one. 
> 
> 
>> As soon as an adversary joins your network, they can trace
>> data movement. So they can show that your node has handled pieces of
>> illegal files, identified by hash. 
> 
>   uh yeah, that's how freenet works. You have encripted pieces of stuff 
> that can be anything. 

That's where you're wrong. If an adversary is in your Freenet network,
they see all those encrypted pieces of stuff. And if they're running a
suitably modified version of the Freenet software, they know which of
those pieces are part of which files. Because they can fetch each file
of interest, and decompose 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-09 Thread Zenaan Harkness
On Wed, Aug 08, 2018 at 08:44:53PM -0700, Mirimir wrote:
> On 08/08/2018 11:21 AM, juan wrote:
> > On Tue, 7 Aug 2018 20:42:37 -0700
> > Mirimir  wrote:

> >> But even so, people who want anonymity, some of them
> >> doing illegal stuff, _will_ end up using Tor. So why not help them use
> >> it more safely?
> > 
> > Oh, but I do. Whenver I have the chance, I tell darm markets
> > operators to not post their contact information on facebook. 
> 
> Is that the best you can do?

Frankly, educating folks to not put their personal contact details on
Facebook is quite a useful thing - there are some pretty uneducated
folks out there.

Also, letting pepes know that Tor is essentially the NSA/CIA network
is also, presumably, useful education material to those who are
otherwise swamp-indoctrinated.



Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-09 Thread juan
On Wed, 8 Aug 2018 20:44:53 -0700
Mirimir  wrote:


> 
> Anyway, I vaguely recall proposed higher-latency mix networks that would
> be usable for browsing, remote management, etc. But I haven't heard that
> any are actually getting implemented.

so? 

Not sure if you are keeping track of the 'issue' here. As far as I'm 
concerned the 'issue' is not BROWSING THE FUCKING WEB but doing 'cryptoanarchy' 
'stuff'

> 
> What have I missed?

good thing that at least you are asking. Now try to answer your 
question. 


 


> Yes, basically. Tor was developed by the US military. But that's not
> likely why privacy activists embraced it.

yes it is - 'privacy' 'activists' 'embraced' it because the fucking US 
military promoted it. 

again, here's a link for you 

http://www.monitor.upeace.org/innerpg.cfm?id_article=816

that's commie 'anarchist' appelbaum who got US$ 100k per year to 
promote a tool used by the US govt to promote coups in the middle east. 






> It became popular because it
> provided a better mix of security and usability.


yes, ask all the people who are in jail thanks to tor. Or dead. 


> >> Also very slow. And I can't imagine how it could have
> >> scaled. Although I suppose that some of the binary newsgroups did get
> >> pretty fucking huge. But anyway, overhead is a key problem with mix
> >> networks.
> > 
> > 
> > That's how they work as far as I understand them. So saying it's a 
> > problem really misses the point. 
> 
> What's a problem is _too much_ overhead.


you are just bullshiting and hand waving. 


> That is, total traffic grows
> more or less exponentially with the number of users.


> 
> >> Development of the Web was part of it, I'm sure. 
> > 
> > Yep. And the 'culture' behind it. Allow retards to stream super ultra 
> > SHD videos. But I wouldn't like to blame the victims too much, so of course 
> > the problem is the assholes at the top who dictate how 'technology' is 
> > developed. 
> 
> Open-source software is hardly driven by "assholes at the top".


what - are you referring to the fact that tor is open source? So 
fucking what. It is developed and controlled by military scum like syverson and 
the little tor mafia. Who by now must have gotten 10 MILLION DOLLARS for their 
'work'.




> Trust me, dude. Stay away from Freenet. Sure, you think Tor is pwned.
> But Freenet is so pwned that I'd never use it ;) Except through Tor ;)
> It's a joke. 

yes I agree. What you say is a joke. 

You are confirming from the nth time that you are if not a paid agent, 
an 'amateur' one. 


> As soon as an adversary joins your network, they can trace
> data movement. So they can show that your node has handled pieces of
> illegal files, identified by hash. 

uh yeah, that's how freenet works. You have encripted pieces of stuff 
that can be anything. 


> And even though they can't really
> prove that you accessed those files, they can say in court that they
> can, and you'll be hard pressed to convince a jury otherwise.


that may be how your nazi legal system works - you can be charged with 
anything and convicted without proof. That's not freenet's fault. 

anyway, it's quite funny that you robotically ignore all of tor's 
problems and are barefaced enough to badmouth the competition



> I keep repeating that Tor is what we have now for working ~anonymously
> online because it just fucking is! Sure, there's JonDoNym, but it's a
> tiny network, and not many people use it. And it's not really that
> friendly to anonymity, in any case. I2P is interesting, I admit, but
> it's mainly a closed system. There are some clearnet exits, but the rest
> of I2P doesn't like them.


are you drunk or something? Again WHO gives a fuck about 'browsing the 
web'? Why would  cypherpunks be interested in 'anonymously' reading the jew 
york times? Which is something you can do with any free vpn anyway.




> 
> So it's not that I'm saying Tor is the best, or whatever. It's literally
> that there's nothing else that's widely enough used to provide any real
> anonymity. Or at least, that I know of.
> 
> So again, what super anonymous overlay networks have I missed? I'm all
> ears :)


maybe taking too much psychoactive substances isn't good for you. 

go back and try to grasp what the topic of the discussion is. 




> 
> >> But even so, people who want anonymity, some of them
> >> doing illegal stuff, _will_ end up using Tor. So why not help them use
> >> it more safely?
> > 
> > 
> > Oh, but I do. Whenver I have the chance, I tell darm markets operators 
> > to not post their contact information on facebook. 
> 
> Is that the best you can do?


yes. I can directly tell you to go fuck yourself. That's actually 
better. 






Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-08 Thread Mirimir
On 08/08/2018 11:21 AM, juan wrote:
> On Tue, 7 Aug 2018 20:42:37 -0700
> Mirimir  wrote:
> 
>> On 08/07/2018 06:14 PM, juan wrote:
>>> On Tue, 7 Aug 2018 17:49:54 -0700
>>> Mirimir  wrote:
>>>
>>>

>   for other stuff...do you have to ask? What sort of system do you think 
> should be used for coordinating 'criminal' activity, instead of streaming 
> super full SHD video for retards? 

 That's the question. 
>>>
>>> And the answer is : some sort of 'high latency' mixing network. And 
>>> interestingly enough such a network doesn't seem to exist, although it 
>>> seems to me it would require less resources than something like tor. And 
>>> nobody seems to be worried about having or not having that kind of  
>>> network, which strikes me as odd...
>>
>> Well, as I'm sure you know, high-latency mix networks -- Cypherpunk and
>> Mixmaster remailers.[0] -- predate Tor. 
> 
> 
>   Right. In other words, the state of anonymous comms in the last 20 
> years has gone a long wayBACKWARDS.

I suppose. But to me it just seems that users voted with their activity.
Sure, high-latency remailer mix networks are arguably more secure
against traffic analysis. But they're not very useful for anything
except email and Usenet posting. They're not even workable for reading
Usenet anonymously.

So basically, Tor came along as the Web took over. So more and more
people started running Tor relays, and fewer and fewer ran remailers, or
even used them.

Anyway, I vaguely recall proposed higher-latency mix networks that would
be usable for browsing, remote management, etc. But I haven't heard that
any are actually getting implemented.

What have I missed?

>> That's how I used the original
>> cypherpunks list, way back when. A few years ago, I played with them a
>> little. I got QuickSilver Lite running in Wine.[1] Basically, all email
>> goes to alt.anonymous.messages, you download everything, and then your
>> client finds stuff that you can decrypt. 
> 
>   Yes, that's a 'brute force' technique that works. Steve Kinney 
> mentioned it as well. 
> 
> 
> 
>> Some resources were (are?)
>> available as .onion services. I probably have notes somewhere, if you're
>> interested.
>>
>> I'm not sure why that all died. It _was_ bloody complicated, even with
>> QuickSilver Lite. 
> 
>   Well, a few guesses : 
> 
>   1) not enough people thought it was important enough because 
> surveillance wasn't as bad as it is today
> 
>   2) ...so the tradeoff security/usability didn't seem worthwhile
> 
>   3) those systems were displaced by worse, 'fast' solutions provided by 
> the US military.

Yes, basically. Tor was developed by the US military. But that's not
likely why privacy activists embraced it. It became popular because it
provided a better mix of security and usability.

>> Also very slow. And I can't imagine how it could have
>> scaled. Although I suppose that some of the binary newsgroups did get
>> pretty fucking huge. But anyway, overhead is a key problem with mix
>> networks.
> 
> 
>   That's how they work as far as I understand them. So saying it's a 
> problem really misses the point. 

What's a problem is _too much_ overhead. That is, total traffic grows
more or less exponentially with the number of users.

>> Development of the Web was part of it, I'm sure. 
> 
>   Yep. And the 'culture' behind it. Allow retards to stream super ultra 
> SHD videos. But I wouldn't like to blame the victims too much, so of course 
> the problem is the assholes at the top who dictate how 'technology' is 
> developed. 

Open-source software is hardly driven by "assholes at the top".

>> Although I recall
>> seeing a crude hack that pulled stuff from alt.anonymous.messages, and
>> massaged it into a web page.
>>
 I guess that you say that there is none, and we
 should all just organize our local cells. 
>>>
>>> What I was trying to say is that, if the use case is 'criminal 
>>> activity', then using a 'low latency' network like tor which provides 
>>> centralized 'hidden' services is a not a good idea. It's more like a recipe 
>>> for disaster.
>>
>> Well, if you exclude low-latency networks, you're pretty much left with
>> nothing to use. 
> 
> 
>   THat is not true. Although I don't know how robust it is, I think 
> freenet comes closer to being a mix network of sorts, and it's a 
> decentralized storage by design. See? Unlike the garbage produced by the 
> pentagon nazis in which 'hidden' services are a hack, freenet was designed 
> with censorship resistance as a key property. 

Trust me, dude. Stay away from Freenet. Sure, you think Tor is pwned.
But Freenet is so pwned that I'd never use it ;) Except through Tor ;)
It's a joke. As soon as an adversary joins your network, they can trace
data movement. So they can show that your node has handled pieces of
illegal files, identified by hash. And even though they can't really
prove that you accessed those files, they can 

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-08 Thread juan
On Tue, 7 Aug 2018 20:42:37 -0700
Mirimir  wrote:

> On 08/07/2018 06:14 PM, juan wrote:
> > On Tue, 7 Aug 2018 17:49:54 -0700
> > Mirimir  wrote:
> > 
> > 
> >>
> >>>   for other stuff...do you have to ask? What sort of system do you think 
> >>> should be used for coordinating 'criminal' activity, instead of streaming 
> >>> super full SHD video for retards? 
> >>
> >> That's the question. 
> > 
> > And the answer is : some sort of 'high latency' mixing network. And 
> > interestingly enough such a network doesn't seem to exist, although it 
> > seems to me it would require less resources than something like tor. And 
> > nobody seems to be worried about having or not having that kind of  
> > network, which strikes me as odd...
> 
> Well, as I'm sure you know, high-latency mix networks -- Cypherpunk and
> Mixmaster remailers.[0] -- predate Tor. 


Right. In other words, the state of anonymous comms in the last 20 
years has gone a long wayBACKWARDS.


> That's how I used the original
> cypherpunks list, way back when. A few years ago, I played with them a
> little. I got QuickSilver Lite running in Wine.[1] Basically, all email
> goes to alt.anonymous.messages, you download everything, and then your
> client finds stuff that you can decrypt. 

Yes, that's a 'brute force' technique that works. Steve Kinney 
mentioned it as well. 



> Some resources were (are?)
> available as .onion services. I probably have notes somewhere, if you're
> interested.
> 
> I'm not sure why that all died. It _was_ bloody complicated, even with
> QuickSilver Lite. 

Well, a few guesses : 

1) not enough people thought it was important enough because 
surveillance wasn't as bad as it is today

2) ...so the tradeoff security/usability didn't seem worthwhile

3) those systems were displaced by worse, 'fast' solutions provided by 
the US military.



> Also very slow. And I can't imagine how it could have
> scaled. Although I suppose that some of the binary newsgroups did get
> pretty fucking huge. But anyway, overhead is a key problem with mix
> networks.


That's how they work as far as I understand them. So saying it's a 
problem really misses the point. 


> 
> Development of the Web was part of it, I'm sure. 

Yep. And the 'culture' behind it. Allow retards to stream super ultra 
SHD videos. But I wouldn't like to blame the victims too much, so of course the 
problem is the assholes at the top who dictate how 'technology' is developed. 



> Although I recall
> seeing a crude hack that pulled stuff from alt.anonymous.messages, and
> massaged it into a web page.
> 
> >> I guess that you say that there is none, and we
> >> should all just organize our local cells. 
> > 
> > What I was trying to say is that, if the use case is 'criminal 
> > activity', then using a 'low latency' network like tor which provides 
> > centralized 'hidden' services is a not a good idea. It's more like a recipe 
> > for disaster.
> 
> Well, if you exclude low-latency networks, you're pretty much left with
> nothing to use. 


THat is not true. Although I don't know how robust it is, I think 
freenet comes closer to being a mix network of sorts, and it's a decentralized 
storage by design. See? Unlike the garbage produced by the pentagon nazis in 
which 'hidden' services are a hack, freenet was designed with censorship 
resistance as a key property. 


But another point is, if at the moment there only are fast, low quality 
networks, then what's needed is...something else. 

You keep repeating we only have tor - why? My answer is that you are 
just a tor propagandist which in turns makes you as US military propagandist. 
That's what the EVIDENCE  points to. 


> But even so, people who want anonymity, some of them
> doing illegal stuff, _will_ end up using Tor. So why not help them use
> it more safely?


Oh, but I do. Whenver I have the chance, I tell darm markets operators 
to not post their contact information on facebook. 




> 
> 0) https://remailer.paranoici.org/clist.html
> 1) https://www.quicksilvermail.net/qslite/



Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-08 Thread jim bell
 On Tuesday, August 7, 2018, 8:47:46 PM PDT, Kurt Buff  
wrote:
 
 >And, USPS might (or might not) destroy the data, but they don't
mention whether or not they pass it all on the some TLA or other as
well as passing on to LEO's on-demand. Wouldn't put it past them...

>Kurt

I thought about this in late 2013, I think when they busted the original Silk 
Road.  I wondered, what precautions a seller on such a black-net market would 
want to take.  They have a big advantage, they can toss their mailings into 
just about any mailbox, and use different phony return-addresses (actually 
genuine addresses, but randomly-selected) with each mailing.  But, I concluded 
they'd want to make their mailings have dozens of different looks, to ensure 
that even a recorded scan of all mailings could not easily be used to notice 
similarities.   Different colors, different shapes, different fonts.
              Jim Bell  

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread Kurt Buff
On Tue, Aug 7, 2018 at 5:21 PM, jim bell  wrote:
> https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html
>
> "But Mr. Donahoe said that the images had been used “a couple of times” by
> law enforcement to trace letters in criminal cases, including one involving
> ricin-laced letters sent to President Obama and Mayor Michael R. Bloomberg
> of New York. The images of letters and packages are generally stored for a
> week to 30 days and then destroyed, he told the A.P."
> [end of quote from article]
>
>
> About that article.
>
> I think it's curious that they claim to "destroy' the images after "a week
> to 30 days".   If there are about 1 billion mailed items each year, and it
> takes 50 kilobytes to store an image (wild ass guess, and assuming some
> compression), that would amount to 50 terabytes of data:  A bit more than 4
> of the largest-capacity of hard drives currently sold.
>
>
> https://www.wdc.com/products/internal-storage/wd-gold-enterprise-class-hard-drive.html?gclid=CjwKCAjwhqXbBRAREiwAucoo-yp9zBDxr1hrojtP7nXAw8Trmtx4-9N8m5DAecI3hqQeTEyGeHWYjBoCg_IQAvD_BwE
>
> Think about it.  If YOU had access to this data, would YOU erase it, if the
> storage only cost about $2000 per year?
>
>   Jim Bell

It's going to be about an order of magnitude more than that - not
because of the size of the images, but because they're going to OCR
and index all of it, but I'm sure they're already OCRing already,
because automation.

The images are pretty useless without it the indexing.

But still - let's say that you're off by three orders of magnitude,
and it costs $2m/year to store it, that's chump change for a very good
surveillance system, and if you do network graphs and frequency
analyses, etc, well, now you're cooking with gas.

And, USPS might (or might not) destroy the data, but they don't
mention whether or not they pass it all on the some TLA or other as
well as passing on to LEO's on-demand. Wouldn't put it past them...

Kurt


Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread Mirimir
On 08/07/2018 06:14 PM, juan wrote:
> On Tue, 7 Aug 2018 17:49:54 -0700
> Mirimir  wrote:
> 
> 
>>
>>> for other stuff...do you have to ask? What sort of system do you think 
>>> should be used for coordinating 'criminal' activity, instead of streaming 
>>> super full SHD video for retards? 
>>
>> That's the question. 
> 
>   And the answer is : some sort of 'high latency' mixing network. And 
> interestingly enough such a network doesn't seem to exist, although it seems 
> to me it would require less resources than something like tor. And nobody 
> seems to be worried about having or not having that kind of  network, which 
> strikes me as odd...

Well, as I'm sure you know, high-latency mix networks -- Cypherpunk and
Mixmaster remailers.[0] -- predate Tor. That's how I used the original
cypherpunks list, way back when. A few years ago, I played with them a
little. I got QuickSilver Lite running in Wine.[1] Basically, all email
goes to alt.anonymous.messages, you download everything, and then your
client finds stuff that you can decrypt. Some resources were (are?)
available as .onion services. I probably have notes somewhere, if you're
interested.

I'm not sure why that all died. It _was_ bloody complicated, even with
QuickSilver Lite. Also very slow. And I can't imagine how it could have
scaled. Although I suppose that some of the binary newsgroups did get
pretty fucking huge. But anyway, overhead is a key problem with mix
networks.

Development of the Web was part of it, I'm sure. Although I recall
seeing a crude hack that pulled stuff from alt.anonymous.messages, and
massaged it into a web page.

>> I guess that you say that there is none, and we
>> should all just organize our local cells. 
> 
>   What I was trying to say is that, if the use case is 'criminal 
> activity', then using a 'low latency' network like tor which provides 
> centralized 'hidden' services is a not a good idea. It's more like a recipe 
> for disaster.

Well, if you exclude low-latency networks, you're pretty much left with
nothing to use. But even so, people who want anonymity, some of them
doing illegal stuff, _will_ end up using Tor. So why not help them use
it more safely?

0) https://remailer.paranoici.org/clist.html
1) https://www.quicksilvermail.net/qslite/


Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread Razer

 Original message From: Mirimir  Date: 
8/7/18  5:49 PM  (GMT-08:00) To: cypherpunks@lists.cpunks.org Subject: Re: the 
tor scam - Re: AP deconstructed: Why it has not happened yet, 
  and will not 
On 08/07/2018 05:04 PM, juan wrote:
> On Mon, 6 Aug 2018 14:21:12 -0700
> Mirimir  wrote:

> 
>https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html

>Sad but true

Pictures? The postal service admitted they have ways of scanning written mail 
content, en masse, quite some time ago. 
Rr

>> On 08/06/2018 02:03 PM, juan wrote:
>>> On Mon, 6 Aug 2018 13:36:18 -0700
>>> Mirimir  wrote:
>>>
>>>
>>>> I bet that you use nothing. I mean, damn, you're using a Gmail account.
>>>
>>> yes, and I use it to order drugs via tor - after all many 'hidden' 
>>> services admins use their gmail accounts. That's how they get caught. 
>>
>> Very funny :)
>>
>> But OK, let's say that Tor is Americunt honeypot. I mean, I have my
>> doubts. But actually, the main reason why I don't order drugs from
>> .onion marketplaces is not wanting to disclose my postal address. That's
>> what earned DPR his first visit from the feds, after all. Fake IDs.
> 
> 
>   as a side note of sorts 
>   
> https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html

Sad but true.

>> Anyway, Tor is out of consideration. What would you have people use for
>> any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots?
> 
> 
>   it obviously depends on what kind of 'anonimity'. Browse the web for 
> ordinary stuff while not being tracked by advertisers? a vpn. Or two. Or tor.

lol

>   for other stuff...do you have to ask? What sort of system do you think 
> should be used for coordinating 'criminal' activity, instead of streaming 
> super full SHD video for retards? 

That's the question. I guess that you say that there is none, and we
should all just organize our local cells. And maybe you're right.

>> What?
>>
>> Or is it nothing? And if nothing, how useful is that?
>>
>> Or maybe you have some really cool thing, but you won't share it?
>>
>>>> So maybe living in Argentina is your only protection. Whatever.
>>>>
>>>> 
>>>
>>>
> 
> 


Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread juan
On Tue, 7 Aug 2018 17:49:54 -0700
Mirimir  wrote:


> 
> > for other stuff...do you have to ask? What sort of system do you think 
> > should be used for coordinating 'criminal' activity, instead of streaming 
> > super full SHD video for retards? 
> 
> That's the question. 

And the answer is : some sort of 'high latency' mixing network. And 
interestingly enough such a network doesn't seem to exist, although it seems to 
me it would require less resources than something like tor. And nobody seems to 
be worried about having or not having that kind of  network, which strikes me 
as odd...



> I guess that you say that there is none, and we
> should all just organize our local cells. 

What I was trying to say is that, if the use case is 'criminal 
activity', then using a 'low latency' network like tor which provides 
centralized 'hidden' services is a not a good idea. It's more like a recipe for 
disaster.





> And maybe you're right.
> 
> >> What?
> >>
> >> Or is it nothing? And if nothing, how useful is that?
> >>
> >> Or maybe you have some really cool thing, but you won't share it?
> >>
>  So maybe living in Argentina is your only protection. Whatever.
> 
>  
> >>>
> >>>
> > 
> > 



Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread Mirimir
On 08/07/2018 05:04 PM, juan wrote:
> On Mon, 6 Aug 2018 14:21:12 -0700
> Mirimir  wrote:
> 
>> On 08/06/2018 02:03 PM, juan wrote:
>>> On Mon, 6 Aug 2018 13:36:18 -0700
>>> Mirimir  wrote:
>>>
>>>
 I bet that you use nothing. I mean, damn, you're using a Gmail account.
>>>
>>> yes, and I use it to order drugs via tor - after all many 'hidden' 
>>> services admins use their gmail accounts. That's how they get caught. 
>>
>> Very funny :)
>>
>> But OK, let's say that Tor is Americunt honeypot. I mean, I have my
>> doubts. But actually, the main reason why I don't order drugs from
>> .onion marketplaces is not wanting to disclose my postal address. That's
>> what earned DPR his first visit from the feds, after all. Fake IDs.
> 
> 
>   as a side note of sorts 
>   
> https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html

Sad but true.

>> Anyway, Tor is out of consideration. What would you have people use for
>> any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots?
> 
> 
>   it obviously depends on what kind of 'anonimity'. Browse the web for 
> ordinary stuff while not being tracked by advertisers? a vpn. Or two. Or tor.

lol

>   for other stuff...do you have to ask? What sort of system do you think 
> should be used for coordinating 'criminal' activity, instead of streaming 
> super full SHD video for retards? 

That's the question. I guess that you say that there is none, and we
should all just organize our local cells. And maybe you're right.

>> What?
>>
>> Or is it nothing? And if nothing, how useful is that?
>>
>> Or maybe you have some really cool thing, but you won't share it?
>>
 So maybe living in Argentina is your only protection. Whatever.

 
>>>
>>>
> 
> 


Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread jim bell
 

On Tuesday, August 7, 2018, 5:05:46 PM PDT, juan  
wrote:  

    as a side note of sorts 
https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html
 ×

"But Mr. Donahoe said that the images had been used “a couple of times” by law 
enforcement to trace letters in criminal cases, including one involving 
ricin-laced letters sent to President Obama and Mayor Michael R. Bloomberg of 
New York. The images of letters and packages are generally stored for a week to 
30 days and then destroyed, he told the A.P."
[end of quote from article]

About that article.
I think it's curious that they claim to "destroy' the images after "a week to 
30 days".   If there are about 1 billion mailed items each year, and it takes 
50 kilobytes to store an image (wild ass guess, and assuming some compression), 
that would amount to 50 terabytes of data:  A bit more than 4 of the 
largest-capacity of hard drives currently sold.
 
https://www.wdc.com/products/internal-storage/wd-gold-enterprise-class-hard-drive.html?gclid=CjwKCAjwhqXbBRAREiwAucoo-yp9zBDxr1hrojtP7nXAw8Trmtx4-9N8m5DAecI3hqQeTEyGeHWYjBoCg_IQAvD_BwE
Think about it.  If YOU had access to this data, would YOU erase it, if the 
storage only cost about $2000 per year?
  Jim Bell

  

Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-07 Thread juan
On Mon, 6 Aug 2018 14:21:12 -0700
Mirimir  wrote:

> On 08/06/2018 02:03 PM, juan wrote:
> > On Mon, 6 Aug 2018 13:36:18 -0700
> > Mirimir  wrote:
> > 
> > 
> >> I bet that you use nothing. I mean, damn, you're using a Gmail account.
> > 
> > yes, and I use it to order drugs via tor - after all many 'hidden' 
> > services admins use their gmail accounts. That's how they get caught. 
> 
> Very funny :)
> 
> But OK, let's say that Tor is Americunt honeypot. I mean, I have my
> doubts. But actually, the main reason why I don't order drugs from
> .onion marketplaces is not wanting to disclose my postal address. That's
> what earned DPR his first visit from the feds, after all. Fake IDs.


as a side note of sorts 

https://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html


> 
> Anyway, Tor is out of consideration. What would you have people use for
> any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots?


it obviously depends on what kind of 'anonimity'. Browse the web for 
ordinary stuff while not being tracked by advertisers? a vpn. Or two. Or tor.


for other stuff...do you have to ask? What sort of system do you think 
should be used for coordinating 'criminal' activity, instead of streaming super 
full SHD video for retards? 




> 
> What?
> 
> Or is it nothing? And if nothing, how useful is that?
> 
> Or maybe you have some really cool thing, but you won't share it?
> 
> >> So maybe living in Argentina is your only protection. Whatever.
> >>
> >> 
> > 
> > 



Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-06 Thread Mirimir
On 08/06/2018 02:03 PM, juan wrote:
> On Mon, 6 Aug 2018 13:36:18 -0700
> Mirimir  wrote:
> 
> 
>> I bet that you use nothing. I mean, damn, you're using a Gmail account.
> 
>   yes, and I use it to order drugs via tor - after all many 'hidden' 
> services admins use their gmail accounts. That's how they get caught. 

Very funny :)

But OK, let's say that Tor is Americunt honeypot. I mean, I have my
doubts. But actually, the main reason why I don't order drugs from
.onion marketplaces is not wanting to disclose my postal address. That's
what earned DPR his first visit from the feds, after all. Fake IDs.

Anyway, Tor is out of consideration. What would you have people use for
any sort of anonymity? JonDonym? I2P? Cruising public WiFi hotspots?

What?

Or is it nothing? And if nothing, how useful is that?

Or maybe you have some really cool thing, but you won't share it?

>> So maybe living in Argentina is your only protection. Whatever.
>>
>> 
> 
> 


Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-06 Thread juan
On Mon, 6 Aug 2018 13:36:18 -0700
Mirimir  wrote:


> I bet that you use nothing. I mean, damn, you're using a Gmail account.

yes, and I use it to order drugs via tor - after all many 'hidden' 
services admins use their gmail accounts. That's how they get caught. 

> So maybe living in Argentina is your only protection. Whatever.
> 
> 



Re: the tor scam - Re: AP deconstructed: Why it has not happened yet, and will not

2018-08-06 Thread Mirimir
On 08/06/2018 01:21 PM, juan wrote:
> On Mon, 6 Aug 2018 12:30:50 -0700
> Mirimir  wrote:



>> But seriously, if Tor is just Americunt honeypot, what do _you_ use for
>> anonymity?
> 
>   whatever I use, or don't use, has exactly FUCK to do with any half 
> sensible analysis of the US military tor network. So why do you even ask? And 
> whatever I use, or don't, you think I would comment on it here? 

I bet that you use nothing. I mean, damn, you're using a Gmail account.
So maybe living in Argentina is your only protection. Whatever.