[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Riffle: an efficient communication system with strong anonymity
On July 11, 2016 8:01:11 PM EDT, juan <email@example.com> wrote:
>On Mon, 11 Jul 2016 19:33:40 -0400
>grarpamp <firstname.lastname@example.org> wrote:
> "But the recent discovery of vulnerabilities in the most
> popular of these networks — Tor —"
> Recent? LMAO at these shitbags. On the other hand, what would
> the tor bots say, now that it's vox populi at places like mit
> that their beloved 'anonimity' scam doesn't work?
> "The heart of the system is a series of servers called a
> mixnet. "
> Go figure. I thought mixnets had been rejected by the greatest
> geniuses of the crypto world, lead by that motherfucking
> scumbag paul syverson? Or maybe that was a tor-thing too...
I run a low bandwidth tor relay (150K), just for kicks. It's not an exit node because I don't want the hassle that goes with that (my node name twentysevendollars). Sometimes I like to run network programs through torsocks for a little potential anonymity.... otherwise
I don't even use tor much myself. I never made any promises to anyone about true anonymity.
Am I a Pentagon employed duplicitous Americunt? Or just someone that likes to fuck around on his freebsd server?