Le Ping

2023-10-16 Thread grarpamp
Ze Pong


Re: ping - Karl

2022-11-22 Thread Undescribed Horrific Abuse, One Victim & Survivor of Many
Stefan, I was looking through my history a little and wanted to
apologize for criticizing and devaluing your valuable work. This seems
to be a psychological issue I [still] strongly have.


Re: Re: ping - Karl

2022-02-19 Thread grarpamp
> an anti-imperialistic Operating System, for
> home usage, e.g. Linux

No, Linux calls for nasty imperialist governments
and their courts and apparatus to brutally enforce their
socialist "GPL" "copyright" "license" under threat of death.

Minimal Berne copyrights don't force anyone to do anything,
that is the much better voluntary way of actual freedom...

https://www.openbsd.org/policy.html
https://cvsweb.openbsd.org/src/share/misc/license.template?rev=HEAD
https://cgit.freebsd.org/src/tree/COPYRIGHT


Re: Re: Re: Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
On 2/19/22, Stefan Claas  wrote:
> Thanks,
>
> I wanted to present a way for people within the EU
> to have an option to phase out the old and non
> reliable and non trustworthy WoT, which can't, as
> you know, not been used for businesses, contracts etc.

It's great you guys are mainstreaming cryptography. I hope it is true.
It was too helter-skelter when WoT was phasing away for me to
understand any good reason for it to happen. Both our countries were
targeted by a psyop business during that.

>
> The blockchain stuff I did only mostly for Americans,
> because they like NFTs and stuff like that.

Most americans are govcorp sheep like my psychosis wants me to be,
just like in other countries.

>
> Please feel free to forge the certificate or blockchain
> proofs so that we can brainstorm about better ways to
> secure certain things digitally.

I visited the website but didn't see a quick-and-easy-to-find avenue
for independent verification, such as a concise merkle tree spec.

Anyway it comes down to trusting the private company attesting to you
either way, since they propose using their website to check. Hopefully
they offer something better than SSL to do that via.


Re: Re: Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
anyway like, clearly you have more experience with cryptography than
me, i should probably consider you a good person to have the public
key of


Re: Re: Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
On 2/19/22, Stefan Claas  wrote:
> The reason why I did it this way with a certificate:
>
> To have a *proof* of ownership and option that it
> is me who did that and the blockchain helps to
> undermine that, because at the timestamping service
> I am registered and log in there via Gmail.
>
> My pub key in the certified document is stored
> on a YubiKey for additional security and can be
> uses with rage, the Rust version of age, because
> age currently does not have this option.
>
> Two other things about my certificate.
>
> The identicon graphic represents a visual representation
> of my public key ASCII string and the QR-Code contains
> a Hashcash token, created from my pub key and De-Mail
> adress.
>
> Regards
> Stefan

It is so wonderful you did these things. But what is the point of the
putting timestamps on the blockchain in a way that can be forged
on-chain manually?


Re: Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
On 2/19/22, Stefan Claas  wrote:
> Hi Karl,
>
> the certified document's hash is in three blockchains,
> Bitcoin, ETH and Aion, which you can easily verify.
> And I did not payed any cent for the transactions.
>
> Regards
> Stefan

But why not use a direct document hash that can be verified if you
lose your proof document, on chains with dust transaction fees, or in
a cooperative of hackers who demonstrate better protection of your
data than that?


Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
> forgot to mention,
>
> IIRC when you upload my document the timestamp of my original
> document stays the same and re-upload with a new timestamp is
> not possible. Please sign up with the service to try out, you
> have 5 free timestamps per month and don't have to use their
> payed plan.

Are you aware that you can publish a merkle hash to a blockchain
whenever you want for only the transaction cost of doing so?


Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
Cryptographically I imagine there's a lot of space of different
guarantees here. I'm mostly just still sticking out for the missing
point in the service that was mentioned earlier. I'm big on detering
erasure of history, which the present service provides for.


Re: Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
On 2/19/22, Stefan Claas  wrote:
> Hi Karl,
>
> if you click on the certificate URL (Online Verrification)
> and upload the certificate to the URL, you will see that
> it is signed by an EU Trust Service Provider, for the eIDAS
> regulation within the EU. This signature is legally binding,
> and is equal to a handwritten signature on paper, for contracts,
> businesses etc. and can be verified globally, even if countries
> outside the EU have no eIDAS. Can be also verified with the free

I don't dispute this, aside from whether laws would influence anybody
likely to be able to make use of forging something like that, which
we've already made indirectly clear we have different values around.

> Adobe DC Reader. Adittionally, as you have seen, I have then
> uploaded the certificate to the time stamping service, to include
> the hash of the certificate into blockchains.

This is what I'm worried about. Is this the same timestamping service
that was earlier shared on this list? I reviewed it and found it does
not actually store the hash on the blockchain. It instead stores a
hash in the document, that can be used with a hash on the blockchain.

This means if somebody infiltrates your government and does the same
thing, the blockchain relies on you (a) retaining your document and
(b) getting your document to anybody who checks the fake document,
when they do the checking, to offer you any guarantees.

If instead the actual hash of the document were on the blockchain, it
would be easy to check what was original, without you needing to
self-preserve and self-advocate.


Re: ping - Karl

2022-02-19 Thread Undiscussed Horrific Abuse, One Victim of Many
Stefan, thanks for your inspirational transparency.

Hopefully we can migrate somehow to protocols that show that documents
are the first ones published of their kind, rather than just that they
were published at the time they say they were.

Is this something you can mention to originstamp? If I can destroy
your document and republish one of my own, I can pretend to be you,
because the public hash is rehashed by the document hash in the
protocol.


Re: [tor-dev] Relay "Ping" Functionality

2022-02-11 Thread grarpamp
Well onioncat is not "arbitrary node" but is a set up one.
Yet some timing differentiations can be divined by
selectively constructing the "circuit" to test,
looking at setup timings, pushing characterizing
traffic through them and your own nodes,
polling existing services, etc.
Please publish your results.


Re: [tor-dev] Relay "Ping" Functionality

2022-02-11 Thread grarpamp
> Right now we're exploring latency-based attacks but are having trouble
> achieving a particular goal: a way to “ping” an arbitrary node in a
> client’s already-built (“live”) circuit. One-way timing is ideal but round
> trip time would suffice. We can glean this information during circuit
> construction, but what about a “live” circuit? Ideally, this would be a
> periodic thing Tor already keeps track of, but as an on-demand or as a
> byproduct/side-effect of a different function would also work. We have not
> been able to find a way to do this within the Tor (sub)protocol specs or
> the control port spec.

Use OnionCat and ping6, it is exactly what you want.

https://www.onioncat.org/

Such "timing" attacks are in the scope of "Tor Stinks  -- NSA"
document. Users should become familiar with them, and that
slide deck, and other attacks from over a decade ago.
And with how tor does not address them.


Re: ping

2020-06-20 Thread GTI .H
I just noticed that now I started receiving Emails directly from the list
here on gmail.com.

Issue solved.

Hi friend Mirimir : )

Em sex., 19 de jun. de 2020 às 17:10, Mirimir  escreveu:

> On 06/19/2020 12:46 AM, Georgi Guninski wrote:
> > Do you read me?
> >
> > What a debugging drama, anyone has a conspiracy theory ;) ?
>
> I got this directly from Gmail, and did not get a copy via the
> cypherpunks list.
>


-- 
Regards
GTI


Re: ping

2020-06-19 Thread Mirimir
On 06/19/2020 12:46 AM, Georgi Guninski wrote:
> Do you read me?
> 
> What a debugging drama, anyone has a conspiracy theory ;) ?

I got this directly from Gmail, and did not get a copy via the
cypherpunks list.


Re: ping

2020-06-19 Thread Greg Newby
Possibly useful advice for @gmail users below, also some list diagnostics:

On Thu, Jun 18, 2020 at 03:20:50PM -0700, Mirimir wrote:
> On 06/18/2020 02:29 PM, Se7en wrote:
> > On 20-06-18 14:23:02, Mirimir wrote:
> >> Thanks. I wasn't paying attention, but I did notice the warning about my
> >> list membership being disabled:
> >>
> >>> Your membership in the mailing list cypherpunks has been disabled due
> >>> to excessive bounces
> >>
> >> I'm not sure whether that was a cypherpunks server issue, or a Riseup
> >> issue, which was perhaps triggered by a cypherpunks server issue.
> > 
> > The list admin published a few days ago that the list was experiencing
> > trouble and has been rectified. You must not have recieved that
> > message. Check the public archive. 
> 
> Looking in the public archive, the first hint of a problem was Georgi
> Guninski's "pong" and Greg Newby's reply at Jun 15 05:25:59 PDT 2020:
> 
> https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081025.html
> https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081026.html
> 
> Then there's the message from Greg at Jun 16 19:39:50 PDT 2020, saying
> that the "the list was bouncing all day today (after around 9am US
> Eastern Daylight Time)" and that "[t]hings now seem to be fixed":
> 
> https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081030.html

That was a temporary 13-hour problem caused by a specific misconfiguration I 
applied. There is no indication that mail delivery problems before that are 
related.

> But GTI.H and Georgi Guninski both reported on Jun 17 that they still
> weren't getting list messages to Gmail accounts:
> 
> https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081042.html
> https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081043.html
> 
> I got the last message before today at Jun 14 14:38:29 PDT 2020:
> 
> https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081016.html
> 
> I got the membership disabled message at 18 Jun 2020 00:15:00 -0700, and
> it said:
> 
> > Your membership in the mailing list cypherpunks has been disabled due
> to excessive bounces The last bounce received from you was dated
> 18-Jun-2020.  You will not get any more messages from this list until
> you re-enable your membership.  You will receive 2 more reminders like
> this before your membership in the list is deleted.
> 
> That is, messages to me were bouncing from late Jun 14 through Jun 17.

There were a ton of bounces from @riseup.net (there are several subscribers, 
not only you).

I suspect that this WAS due to the misconfiguration I did, but I didn't save 
the 450+ bounce notifications.

You should be able to reenable your subscription as directed... let me know if 
you run into trouble.

> Anyway, it's not a big deal. I'm just curious whether bouncing started
> earlier, perhaps on Jun 14, and why Google and Riseup kept bouncing
> messages after Greg fixed the cypherpunks server.

Here's the important part (saved for the end):

For @gmail.com users, I experimented by subscribing a gmail address to the list.

I found that MOST (not quite all) messages were flagged as spam and therefore 
did not arrive in my inbox.

I flagged as "not spam" to extract them from the spam folder, which might train 
gmail.

But the approach I suggest is to create a filter in gmail. This is easy in the 
Web interface, but I don't know about other clients. Simply make a filter so 
that messages with "list:(cypherpunks.lists.cpunks.org)" or to/cc 
cypherpunks@lists.cpunks.org are never flagged as spam.

 - Greg



Re: ping

2020-06-19 Thread Georgi Guninski
On Fri, Jun 19, 2020 at 4:14 PM Greg Newby  wrote:
>
> That was a temporary 13-hour problem caused by a specific misconfiguration I 
> applied. There is no indication that mail delivery problems before that are 
> related.
>

I definitely had gmail problems for at least 3 days
and I check spam several times per day.


Re: ping

2020-06-19 Thread Georgi Guninski
Do you read me?

What a debugging drama, anyone has a conspiracy theory ;) ?


Re: ping

2020-06-18 Thread Mirimir
On 06/18/2020 02:29 PM, Se7en wrote:
> On 20-06-18 14:23:02, Mirimir wrote:
>> Thanks. I wasn't paying attention, but I did notice the warning about my
>> list membership being disabled:
>>
>>> Your membership in the mailing list cypherpunks has been disabled due
>>> to excessive bounces
>>
>> I'm not sure whether that was a cypherpunks server issue, or a Riseup
>> issue, which was perhaps triggered by a cypherpunks server issue.
> 
> The list admin published a few days ago that the list was experiencing
> trouble and has been rectified. You must not have recieved that
> message. Check the public archive. 

Looking in the public archive, the first hint of a problem was Georgi
Guninski's "pong" and Greg Newby's reply at Jun 15 05:25:59 PDT 2020:

https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081025.html
https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081026.html

Then there's the message from Greg at Jun 16 19:39:50 PDT 2020, saying
that the "the list was bouncing all day today (after around 9am US
Eastern Daylight Time)" and that "[t]hings now seem to be fixed":

https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081030.html

But GTI.H and Georgi Guninski both reported on Jun 17 that they still
weren't getting list messages to Gmail accounts:

https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081042.html
https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081043.html

I got the last message before today at Jun 14 14:38:29 PDT 2020:

https://lists.cpunks.org/pipermail/cypherpunks/2020-June/081016.html

I got the membership disabled message at 18 Jun 2020 00:15:00 -0700, and
it said:

> Your membership in the mailing list cypherpunks has been disabled due
to excessive bounces The last bounce received from you was dated
18-Jun-2020.  You will not get any more messages from this list until
you re-enable your membership.  You will receive 2 more reminders like
this before your membership in the list is deleted.

That is, messages to me were bouncing from late Jun 14 through Jun 17.

Anyway, it's not a big deal. I'm just curious whether bouncing started
earlier, perhaps on Jun 14, and why Google and Riseup kept bouncing
messages after Greg fixed the cypherpunks server.


Re: ping

2020-06-18 Thread Se7en
On 20-06-18 14:23:02, Mirimir wrote:
> Thanks. I wasn't paying attention, but I did notice the warning about my
> list membership being disabled:
> 
>> Your membership in the mailing list cypherpunks has been disabled due
>> to excessive bounces
> 
> I'm not sure whether that was a cypherpunks server issue, or a Riseup
> issue, which was perhaps triggered by a cypherpunks server issue.

The list admin published a few days ago that the list was experiencing
trouble and has been rectified. You must not have recieved that
message. Check the public archive. 

-- 
|-/   | Se7en
 /  The One and Only! | se7en@cock.email
/ | 0x0F83F93882CF6116
   /  | https://se7en-site.neocities.org


Re: ping

2020-06-18 Thread Mirimir
On 06/18/2020 01:04 PM, Sangy wrote:
> Yes
> On Thu, Jun 18, 2020 at 12:55:21PM -0700, Mirimir wrote:
>> Is this thing on?

Thanks. I wasn't paying attention, but I did notice the warning about my
list membership being disabled:

> Your membership in the mailing list cypherpunks has been disabled due
to excessive bounces

I'm not sure whether that was a cypherpunks server issue, or a Riseup
issue, which was perhaps triggered by a cypherpunks server issue.

A postmortem would be cool.


Re: ping

2020-06-18 Thread Sangy
Yes
On Thu, Jun 18, 2020 at 12:55:21PM -0700, Mirimir wrote:
> Is this thing on?


ping

2020-06-18 Thread Mirimir
Is this thing on?


Re: high latency low b/w ping circles: random vs clocked

2019-10-26 Thread Zenaan Harkness
On Sun, Oct 27, 2019 at 01:51:36PM +1100, Zenaan Harkness wrote:

> > If the ping is not clocked, but is timed (clocked) to a statistically
> > random time within a configured window, the GPA cannot know when to
> > conduct their latency injection attack, and any dropout by me, would
> > be seen by those who failed to receive my ping or received a delayed
> > ping, as nothing but white noise, since every ping is randomly timed
> > anyway.
> 
> 
> The ability to hide ping recipients when I and or they are only
> intermittently connected (i.e., we all live on mobile phones), is in
> serious doubt.
> 
> The reasonable (excepting further analysis) operating mode is to, at
> least, have a node which is permanently connected - but again, we
> need consider each use case in due course...


That said, friends expose their friend connections daily these days -
sms, text, phone calls, facebook, "likes" and endless more social
virtue signalling signals.

"You and your friends, who live only on mobile phones" are often
connected around the same time.  In these circumstances, fixed base
rate links provide hiding of whether or not we are chatting, voice
talking, or surfing through one another's nodes.  This is useful
"content, and type of" comms hiding.


  "Just because we cannot hide who we are communicating with,
   does not mean we should not exercise our right to hide the
   content and frequency of our communications."


If my phone always connects to the same peer nodes when I turn my
phone on, and vice versa, and we always establish certain base rate
links, we may not even be communicating and no one would know,
assuming we always reserve a minimum base rate load as "chaff or
wheat" between our phones, and such that when we accept additional
circuit requests, those exist above the private "always reserved"
base link.

This is the headroom concept, but always chaff filled, and reserved
between me and my primary first hop peers.



Re: high latency low b/w ping circles: random vs clocked

2019-10-26 Thread Zenaan Harkness
high latency ping circle pings, should effectively disappear in the
"usual mix" of traffic between standard peers.

1-hr +/- 15 minutes ping circle with immediate peer nodes ("friend")
could be a mandatory base load.

Even just coordinating links between peer nodes is an order of
magnitude greater b/w - the pings "as wheat" will disappear "in the
chaff of normal net/switch coord traffic", and automatically provide
for high-value and hidden (to onlookers) text messages to be sent
around.

Imagining a UI element:

  HiddenMessageService
  - send message to friend
  - choose latency:
- "std (up to 1.5 hrs to arrive)"
- "half hour max"
- "1 minute max"
- "10 seconds max"

  - I type text and choose "1 minute max option"
- app pops up saying "Enable 1 minute max messages to friend
  Blah, this will incur up to a 12MiB per month b/w overhead"
- I click yes.
- the app negotiates such a link with my friend
- every time we are both connected, we maintain this link
  - until we optionally disable that link

  - because peer nodes must negotiate and regularly communicate re
switching and routes and b/w, in order to anything at all,
the overhead of that "1 minute max" link might almost disappear
completely into regular network control packets (remember, we
combine packets up to MTU or "configged normalized packet size"
anyway, and we reserve the required b/w for such control packets
as well - always keep a little headroom
- i.e. that 12MiB/month might end up being much closer to the
  marginal size of the actual text messages only.



Re: high latency low b/w ping circles: random vs clocked

2019-10-26 Thread Zenaan Harkness
On Sun, Oct 27, 2019 at 01:15:56PM +1100, Zenaan Harkness wrote:
> Here's an obvious in hindsight thought:
> 
> Use case: A (hidden, encrypted etc) ping circle (some combo of star
> or token ring yet to be designed) amongst a group of friends who may
> at random points in time, wish to send wheat txt sms in the chaff of
> the regular circle ping.
> 
> Usually the ping is chaff.
> 
> Any particular ping can be wheat (an sms/txt/email).
> 
> If the ping is clocked, and there is any leakage of the clocking,
> then a GPA jamming my ISP link for say 5 seconds, right at the time
> I'm about to send my regular ping, would expose the other node(s) I
> am pinging.

Even the above statement is not necessarily true, may be not true at
all:

So I ping my 1st hop peer set, who have also these fixed low b/w ping
links to their peers, etc, and some subset of all these are part of
my ping circle of trusted friends. The earlier postulate (see OP
email below) holds, namely that:

  "The b/w of the ping is so low, that there is little to incentive
   to not maintain such (virtual) links, even if an incoming ping
   fails to arrive;
   and the value of such hidden communications is far greater (and
   the anonymity of your circle), and so there is abundant incentive
   to maintain such low-cost links."

So, even in the case of a clocked ping, the targets of my low b/w
high latency ping are perhaps unlikely to be exposed, using active
latency injection attacks.

Notwithstanding this fact, the high latency nature of such ping
circles suggests that statistically random clocking --within a
specified window-- (e.g. 1hr ping, +/- 15 minutes window), would
presumably not detract from the security of such links, and may well
mitigate unforeseen future attacks.

With a shout out to the pipe-net punks and others from ~1995.


  https://en.wikipedia.org/wiki/David_Chaum
  https://en.wikipedia.org/wiki/Mix_network



> If the ping is not clocked, but is timed (clocked) to a statistically
> random time within a configured window, the GPA cannot know when to
> conduct their latency injection attack, and any dropout by me, would
> be seen by those who failed to receive my ping or received a delayed
> ping, as nothing but white noise, since every ping is randomly timed
> anyway.


The ability to hide ping recipients when I and or they are only
intermittently connected (i.e., we all live on mobile phones), is in
serious doubt.

The reasonable (excepting further analysis) operating mode is to, at
least, have a node which is permanently connected - but again, we
need consider each use case in due course...


> [To state what ought be obvious, the pings, though high priority when
>  they are sent at extreme high (compared to normal web traffic)
>  latency intervals, are still sent through 'regular' chaff-filled
>  links, and so except for my local links temporarily dropping out, a
>  GPA stalker should not be able to determine destination nodes for my
>  ping, with any latency injection attack.


There is an unnamed assumption in the above - my ping circle includes
only known friends.

If my ping circle includes unknown destination nodes, detecting
network dropout is trivial (I only have to be actively taken offline
for a duration longer than the ping interval (+rand window), for the
target to identify me.

  "Don't talk to strangers about highly important things."

  "Know your peer."

  "High value communications (and therefore network links/ routes)
   with unknown peers, exposes you to active stalker (e.g.
   government) attacks."



>  The reasons we can make such an assertion and believe this holds
>  true:
> 
>   - active latency injection attacks operate on the principle of
> statistically modifying the distribution of packets across a
> route (in time (for latency) or some other metric e.g. size)
> 
>   - in the case of extremely high latency packets (say, 1 hour
> between packets) at least when sent between nodes trusting one
> another or via nodes which, if they introduce a few seconds or
> minutes of latency, cannot meaningfully impact the ping, the
> relevant statistical "distribution of packets across time" is in
> the order of (in this example) hours
> 
>   - the b/w consumed by such ping circles very low
> - those in my ping circle, have little incentive to close such
>   low b/w "chaff filled links" on the outgoing side
> - and in fact, those who want to see freedom of anonymous speech,
>   will actively support such links (again, due to their low
>   network costs)
> - and so those nodes which do NOT maintain such links when
>   requested, naturally increase their stalker score (as viewed by
>   others).
> ]
> 
> 
>   "Treat each use case for its unique snowflake characteristics,
>and we provide for the possibility to optimize that particular
>use case."
> 


high latency low b/w ping circles: random vs clocked

2019-10-26 Thread Zenaan Harkness
Here's an obvious in hindsight thought:

Use case: A (hidden, encrypted etc) ping circle (some combo of star
or token ring yet to be designed) amongst a group of friends who may
at random points in time, wish to send wheat txt sms in the chaff of
the regular circle ping.

Usually the ping is chaff.

Any particular ping can be wheat (an sms/txt/email).

If the ping is clocked, and there is any leakage of the clocking,
then a GPA jamming my ISP link for say 5 seconds, right at the time
I'm about to send my regular ping, would expose the other node(s) I
am pinging.

If the ping is not clocked, but is timed (clocked) to a statistically
random time within a configured window, the GPA cannot know when to
conduct their latency injection attack, and any dropout by me, would
be seen by those who failed to receive my ping or received a delayed
ping, as nothing but white noise, since every ping is randomly timed
anyway.

[To state what ought be obvious, the pings, though high priority when
 they are sent at extreme high (compared to normal web traffic)
 latency intervals, are still sent through 'regular' chaff-filled
 links, and so except for my local links temporarily dropping out, a
 GPA stalker should not be able to determine destination nodes for my
 ping, with any latency injection attack.

 The reasons we can make such an assertion and believe this holds
 true:

  - active latency injection attacks operate on the principle of
statistically modifying the distribution of packets across a
route (in time (for latency) or some other metric e.g. size)

  - in the case of extremely high latency packets (say, 1 hour
between packets) at least when sent between nodes trusting one
another or via nodes which, if they introduce a few seconds or
minutes of latency, cannot meaningfully impact the ping, the
relevant statistical "distribution of packets across time" is in
the order of (in this example) hours

  - the b/w consumed by such ping circles very low
- those in my ping circle, have little incentive to close such
  low b/w "chaff filled links" on the outgoing side
- and in fact, those who want to see freedom of anonymous speech,
  will actively support such links (again, due to their low
  network costs)
- and so those nodes which do NOT maintain such links when
  requested, naturally increase their stalker score (as viewed by
  others).
]


  "Treat each use case for its unique snowflake characteristics,
   and we provide for the possibility to optimize that particular
   use case."