One solution for actual electronic device signature profiling (which is an
exotic attack) would be to use a wifi dongle when you access the net securely.
This delivers a completely distinct (or any number of distinct) wifi device
signatures rather than mere MAC address spoofing et al since
On Tue, Mar 06, 2018 at 06:06:21AM -0500, Anon Hyde wrote:
> I've poor slow english and apologize for any possible inaccuracies. Who is
> "shill"?
This isn't related to your below question, and it's not related to Tor,
so this topic should be dropped.
"A shill, also called a plant or a
I've poor slow english and apologize for any possible inaccuracies. Who is
"shill"?
I mean the Tor has better design for secure data exchange at this moment,
and any "Talk" can be build on the onion at several days, even hours. It is
a surprise me almost complete absence of special (using onion
Sent from ProtonMail, Swiss-based encrypted email.
‐‐‐ Original Message ‐‐‐
On February 18, 2018 9:22 AM, Anon Hyde wrote:
>
>
> On 2/17/18, Scfith Riseup scf...@riseup.net wrote:
>
> > You are already using protonmail, so you are already a shill.
Sorry, but
On 2/17/18, Scfith Riseup wrote:
> You are already using protonmail, so you are already a shill. Electronic
> devices leave signatures and vulnerable to collection & traffic analysis. I
actually, we have best of the best tool for secure talking and meeting.
strictly from peer