did i say anything about owners or operators??? ... c'mon stop trying to catch me at being an idiot its reverb is low sound wave quality - i am massively sure i am not the smartest person ever but i aint really stupid k?
yay in syria and lotsa other places you gotta give ur passport to get a sim ... not all places though ...spain could give a fuck who you are
On Wed, Aug 5, 2015 at 4:14 AM, Paul Lambert
<nymble@gmail.com> wrote:
Interesting … the ISO NLSP-C did not call it’self an ‘opinion’, but about 1993 it supported multiple tunnel encapsulations that could be used for anonymity services ( https://goo.gl/CG9Koc ). It was derived from the 89 vintage NSA defined SP3-C protocol ( http://goo.gl/QEp67F ).
paul i love it
'Traffic Flow Confidentiality is a service provided by either mode of NLSP to deter traffic flow analysis. The benefits of this feature have long been known by the military community'
hahhahhahahhahaha ....peeling the layers back of the onion
'That was enough for a judge to grant the FBI a warrant and permission to secretly install what’s known as a pen/trap device, which allowed for the monitoring of Hammond’s Internet activity at the end of February 2012. That, coupled with the physical surveillance, allowed the agency to see when he was home. What they found correlated with his Tor usage...'
++++++++++++++
just found this cute little mitish qatarian hack
just found this cute little mitish qatarian hack
The boffins showed that "simply by looking for patterns in the number of packets passing in each direction through a guard, machine-learning algorithms could, with 99 per cent accuracy, determine whether the circuit was an ordinary Web-browsing circuit, an introduction-point circuit or a rendezvous-point circuit."
They were able to do this through simple traffic correlation, which is available even when the traffic is encrypted.
Furthermore, by using a Tor-enabled computer to connect to a range of different hidden services, they showed that a similar analysis of traffic patterns could identify those services with 88 per cent accuracy. That means that an adversary who lucked into the position of guard for a computer hosting a hidden service, could, with 88 per cent certainty, identify it as the service’s host.