Re: [tor-talk] Tor4

2018-03-18 Thread Wanderingnet
One solution for actual electronic device signature profiling (which is an exotic attack) would be to use a wifi dongle when you access the net securely. This delivers a completely distinct (or any number of distinct) wifi device signatures rather than mere MAC address spoofing et al since

Re: [tor-talk] Tor4

2018-03-06 Thread Matthew Finkel
On Tue, Mar 06, 2018 at 06:06:21AM -0500, Anon Hyde wrote: > I've poor slow english and apologize for any possible inaccuracies. Who is > "shill"? This isn't related to your below question, and it's not related to Tor, so this topic should be dropped. "A shill, also called a plant or a

Re: [tor-talk] Tor4

2018-03-06 Thread Anon Hyde
I've poor slow english and apologize for any possible inaccuracies. Who is "shill"? I mean the Tor has better design for secure data exchange at this moment, and any "Talk" can be build on the onion at several days, even hours. It is a surprise me almost complete absence of special (using onion

Re: [tor-talk] Tor4

2018-03-02 Thread Wanderingnet
​Sent from ProtonMail, Swiss-based encrypted email.​ ‐‐‐ Original Message ‐‐‐ On February 18, 2018 9:22 AM, Anon Hyde wrote: > ​​ > > On 2/17/18, Scfith Riseup scf...@riseup.net wrote: > > > You are already using protonmail, so you are already a shill. Sorry, but

[tor-talk] Tor4

2018-02-18 Thread Anon Hyde
On 2/17/18, Scfith Riseup wrote: > You are already using protonmail, so you are already a shill. Electronic > devices leave signatures and vulnerable to collection & traffic analysis. I actually, we have best of the best tool for secure talking and meeting. strictly from peer