
5 Sep
2001
5 Sep
'01
4:09 a.m.
On Sun, 2 Sep 2001, Nomen Nescio wrote:
Unless you run a remailer yourself. The fact that I use anonymous remailers would be hard to deny, if am a remailer operator. However, if I make my own remailer first in the chain, an attacker sitting at the second remailer will not be able to tell when I am using my remailer myself vs. when it is being used by others vs. dummy cover traffic.
8690
Age (days ago)
8690
Last active (days ago)
0 comments
1 participants
participants (1)
-
Nomen Nescio