DOC - Decentralized Onion Communication

Hi all, maybe interesting for some of, on how to run his own privacy service at home to exchange messages with local friends, while not relying on third-party servers. https://groups.google.com/g/alt.privacy.anon-server/c/_Q9z83QwaV4 Regards Stefan

On Sun, 9 Jan 2022 19:44:02 +0100 Stefan Claas <spam.trap.mailing.lists@JOOGLEJEWMAIL.com> wrote:
why do you keep spamming FUCKIGN JOOGLE links Stefan? Isn't this supposed to be a list to discuss this kind of stuff? Why would you keep linking to fucking JOOGLE GROUPS? I know that usenet isn't fully owned by JOOGLE but you are using the JOOGLE 'interface' to it....while talking about 'decentralized communication'? Seriously?

i've been thinking about this a lot. stefan also uses windows, which is strange since it's so hard to hack windows unless you work for microsoft. things i've noted - people supporting libre ecosystems in public have been getting hurt - microsoft and google are doing way more open source stuff than before - i can't get off google. i don't know how. - well-funded efforts have been surrounding people, pretending to be the majority maybe those four items are related to this PS: i actually clicked the 'groups.joogle' link and was like 'wtf why won't this load'. Here's stefan's message from the other list. I don't believe you actually need to open any firewall ports, and the onion approach is quite old but always great to re-engage. I downloaded TBB to try it out but my glibc is too old for the new TBB so i might make it work later, dunno. Pasted message below: Hi all, a while ago I said that I like to set-up a Nym requester for YAMN and Mixmaster users. This requires a paid server from my side and I do not gain nothing from that, while the Nym Network made already a lot of money. I am currently investigating in running an own Tor Hidden Service on my local Windows PC, where users can do the same and then communicate with their friends, without needing to use third party servers, like Remailers, Tor email services etc. This shoud have the advantage that every a.p.a-s user can theoretically run a cheap Raspberry Pi at home 24/7 while having his own .onion URL and no need to purchase a VPS or Domain. I am currently looking around what services one can run on his own server at home. If you visit: wwfokt2ttwfbjfwlei25ue37mkemzgepxtmqb4axgecoculgzbqdwhad.onion you can see that I have there software installed on my local Windows PC which would allow you to exchange messages. There is also client software available for this so that users could via socat send files between each other. I will let run this server a little while until I go to bed so that you get an idea. Please, if you run also .onion sites on the Internet, share what else we can do to have decentralized .onion comms, without no middleman servers, besides the Tor nodes. Regards Stefan spam.tra...@gmail.com (2 hours ago) The software I use under Windows 10: The Tor Expert Bundle. https://www.torproject.org/download/tor/ Configuration tips: https://miloserdov.org/?p=1839 and the Golang server: https://github.com/schollz/cowyo And you need to open your firewall port. Regards Stefan

Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? LOL k <gmkarl@gmail.com> 9 Ocak 2022 Pazar saat 22:39 tarihinde yazdı:
i've been thinking about this a lot. stefan also uses windows, which
is strange since it's so hard to hack windows unless you work for
microsoft.
things i've noted

On 1/9/22, zeynepaydogan <zeynepaydogan@protonmail.com> wrote:
Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? LOL
to add my voice, tor has been one of the most private publicly-accessible digital networks on earth for some time now. if you don't have anything better than it, then please use it, to protect everyone.

On Sun, 9 Jan 2022 16:18:58 -0500 k <gmkarl@gmail.com> wrote:
to add my voice, tor has been one of the most private publicly-accessible digital networks on earth for some time now.
if you don't have anything better than it, then please use it, to protect everyone.
Nice article here to counter karl's pentagon propaganda. https://www.mintpressnews.com/the-open-technology-fund-makes-privacy-apps-st... "Internet freedom, according to the OTF, is explicitly defined in relation to access to U.S. state propaganda arms." In the words of pentagon criminal dingledine “We also need to think about a strategy for how to spin this move in terms of Tor’s overall direction. I would guess that we don’t want to loudly declare war on China, since this only harms our goals?” he wrote to the director of OTF parent company USAGM. “But we also don’t want to hide the existence of funding from [USAGM], since ‘they’re getting paid off by the feds and they didn’t tell anyone’ sounds like a bad Slashdot title for a security project. Is it sufficient just to always talk about Iran, or is that not subtle enough?”

he probably won't understand that.Yup, it's scary, but the only smart guy here is “punk” Açık Pzt, Oca 10, 2022 00:46, Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> yazdı:
On Sun, 9 Jan 2022 16:18:58 -0500 k <gmkarl@gmail.com> wrote:
to add my voice, tor has been one of the most private publicly-accessible digital networks on earth for some time now.
if you don't have anything better than it, then please use it, to protect everyone.
Nice article here to counter karl's pentagon propaganda.
https://www.mintpressnews.com/the-open-technology-fund-makes-privacy-apps-st...
"Internet freedom, according to the OTF, is explicitly defined in relation to access to U.S. state propaganda arms."
In the words of pentagon criminal dingledine
“We also need to think about a strategy for how to spin this move in terms of Tor’s overall direction. I would guess that we don’t want to loudly declare war on China, since this only harms our goals?” he wrote to the director of OTF parent company USAGM. “But we also don’t want to hide the existence of funding from [USAGM], since ‘they’re getting paid off by the feds and they didn’t tell anyone’ sounds like a bad Slashdot title for a security project. Is it sufficient just to always talk about Iran, or is that not subtle enough?”

please don't use "nothing at all" instead of tor. this would be a far less private move. but here's the mantra: things behave according to their source code. not their funding. sorry it's hard to read the source code. that may change.

On Sun, 9 Jan 2022 17:15:24 -0500 k <gmkarl@gmail.com> wrote:
please don't use "nothing at all" instead of tor. this would be a far less private move.
lawl - now karl is literally spamming pentagon tor propagada. Here's the link again for you karl https://www.mintpressnews.com/the-open-technology-fund-makes-privacy-apps-st...

I got this from the gnunet message karl forwarded https://secushare.org/ it discusses a lot of interesting stuff. (apparently gnunet has constant rate links, ha)

On Sun, Jan 9, 2022 at 10:09 PM zeynepaydogan <zeynepaydogan@protonmail.com> wrote:
Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? LOL
Hi Zeynep, if you are familiar how to edit a torrc, you can then define in their trustworthy nodes from privacy folks and privacy organizations. Or if you know how to run your own VPS server you can then use your own one as a trustworthy node. Nym is not ready yet for production, as an alternative and gives you also not more privacy by design, even if it is a Mixnet and will most like cost you money then (crypto currency) once in production. Regarding smartphones, at least you can run my proposal on your smartphone ... ;-) Best regards Stefan

On Mon, Jan 10, 2022 at 12:15 AM Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Sun, Jan 9, 2022 at 10:09 PM zeynepaydogan <zeynepaydogan@protonmail.com> wrote:
Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? LOL
Hi Zeynep,
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes from privacy folks and privacy organizations. Or if you know how to run your own VPS server you can then use your own one as a trustworthy node.
Nym is not ready yet for production, as an alternative and gives you also not more privacy by design, even if it is a Mixnet and will most like cost you money then (crypto currency) once in production.
Regarding smartphones, at least you can run my proposal on your smartphone ... ;-)
And with Tor you can run then also professional Mixnet clients, Like YAMN or Mixmaster and then send those messages to the Bitmessage Network. How cool is that? Regards Stefan

On Mon, Jan 10, 2022 at 12:19 AM Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Mon, Jan 10, 2022 at 12:15 AM Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Sun, Jan 9, 2022 at 10:09 PM zeynepaydogan <zeynepaydogan@protonmail.com> wrote:
Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? LOL
Hi Zeynep,
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes from privacy folks and privacy organizations. Or if you know how to run your own VPS server you can then use your own one as a trustworthy node.
Nym is not ready yet for production, as an alternative and gives you also not more privacy by design, even if it is a Mixnet and will most like cost you money then (crypto currency) once in production.
Regarding smartphones, at least you can run my proposal on your smartphone ... ;-)
And with Tor you can run then also professional Mixnet clients, Like YAMN or Mixmaster and then send those messages to the Bitmessage Network.
How cool is that?
BTW. Here is a list of trustworthy nodes, in German. https://www.privacy-handbuch.de/handbuch_24n.htm#03_01_22 Regards Stefan

On Mon, Jan 10, 2022 at 12:25 AM Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
And with Tor you can run then also professional Mixnet clients, Like YAMN or Mixmaster and then send those messages to the Bitmessage Network.
How cool is that?
BTW. Here is a list of trustworthy nodes, in German.
And I like to add that I do not need so much anonymity. I have recently purchased a brand new Laser Fax, for 308 €, where I can receive and send encrypted Fax, and therefore I am the boss then and do not have to rely on third parties, so to speak. Second phone number will be purchased too for that. Regards Stefan

Aaaaaaa On Sun, Jan 9, 2022 at 3:20 PM, Stefan Claas<spam.trap.mailing.lists@gmail.com> wrote:
On Sun, Jan 9, 2022 at 10:09 PM zeynepaydogan <zeynepaydogan@protonmail.com> wrote:
Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? LOL
Hi Zeynep,
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes from privacy folks and privacy organizations. Or if you know how to run your own VPS server you can then use your own one as a trustworthy node.
Nym is not ready yet for production, as an alternative and gives you also not more privacy by design, even if it is a Mixnet and will most like cost you money then (crypto currency) once in production.
Regarding smartphones, at least you can run my proposal on your smartphone ... ;-)__________________
And with Tor you can run then also professional Mixnet clients, Like YAMN or Mixmaster and then send those messages to the Bitmessage Network.
How cool is that?
Jim Bell's comment: Do you recall my suggestion from about 2 years ago that a new anonymity network be built, akin to TOR, but hosted by 1000+ people out of their homes and small businesses? I mentioned using Raspberry Pi. The main desirable thing is that unlimited-data Internet be available, which even then was true for 940 Mb/sec $65 month service. (CenturyLink service). I believe they are now offering 100 Mbits/sec for $30/month, which should be plenty for an anonymzation network. I suggested that all nodes be able to act as output nodes, and that to facilitate this, all outputs be subject to mild (or better?) encryption, to ensure than plaintext never appears on any output node. (To avoid inadvertently providing 'probable cause' to justify a search warrant.) Is somebody ready to talk about this?

On Mon, 10 Jan 2022 00:27:36 +0000 (UTC) jim bell <jdb10987@yahoo.com> wrote:
Jim Bell's comment: Do you recall my suggestion from about 2 years ago that a new anonymity network be built, akin to TOR, but hosted by 1000+ people out of their homes and small businesses?
A network with 1000 'small' routers would be even worse than tor. Your suggestion is idiotic nonsense, as usual.
I mentioned using Raspberry Pi.
more garbage. The rpi is probably the less trustworthy single board computer you can buy
The main desirable thing is that unlimited-data Internet be available, which even then was true for 940 Mb/sec $65 month service. (CenturyLink service).
so what do we have here? MORE FUCKING SPAM. Centurylink spam in this case.
Is somebody ready to talk about this?
yes, everything you said is wrong.

hi jim On Sun, Jan 9, 2022, 7:28 PM jim bell <jdb10987@yahoo.com> wrote:
Aaaaaaa
On Sun, Jan 9, 2022 at 3:20 PM, Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Sun, Jan 9, 2022 at 10:09 PM zeynepaydogan <zeynepaydogan@protonmail.com> wrote:
Stefan, do you really recommend the Tor network here? Google users
don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor?
LOL
Hi Zeynep,
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes from privacy folks and privacy organizations. Or if you know how to run your own VPS server you can then use your own one as a trustworthy node.
Nym is not ready yet for production, as an alternative and gives you also not more privacy by design, even if it is a Mixnet and will most like cost you money then (crypto currency) once in production.
Regarding smartphones, at least you can run my proposal on your smartphone ... ;-)
And with Tor you can run then also professional Mixnet clients, Like YAMN or Mixmaster and then send those messages to the Bitmessage Network.
How cool is that?
Jim Bell's comment:
Do you recall my suggestion from about 2 years ago that a new anonymity network be built, akin to TOR, but hosted by 1000+ people out of their homes and small businesses? I mentioned using Raspberry Pi.
I recall this a little. I was feeling discouraged at the time. Why worry
about hosting when everyone has a device already they are using to email with? Why start a new project rather than forking an old -- unless the old ones are overcomplicated and unweildy.
The main desirable thing is that unlimited-data Internet be available, which even then was true for 940 Mb/sec $65 month service. (CenturyLink service). I believe they are now offering 100 Mbits/sec for $30/month, which should be plenty for an anonymzation network.
I suggested that all nodes be able to act as output nodes, and that to facilitate this
Tor used to function with everyone an exit by default, of course.
, all outputs be subject to mild (or better?) encryption, to ensure than
plaintext never appears on any output node. (To avoid inadvertently providing 'probable cause' to justify a search warrant.)
Good idea. A little similar to tor's exit node filtering for ssl (which is mostly unused I believe).
Is somebody ready to talk about this?
How do my questions land?

Do you recall my suggestion from about 2 years ago that a new anonymity
network be built, akin to TOR, but hosted by 1000+ people out of their homes and small businesses? I mentioned using Raspberry Pi.
I recall this a little. I was feeling discouraged at the time. Why worry about hosting when everyone has a device already they are using
I thought about this further and realise the reason to normalise the routing device would be to move toward protecting against sybil attacks via normalising device security. to email with? Why start a new project rather than forking an old --
unless the old ones are overcomplicated and unweildy.
Question still stands. The main desirable thing is that unlimited-data Internet be available,
which even then was true for 940 Mb/sec $65 month service. (CenturyLink service). I believe they are now offering 100 Mbits/sec for $30/month, which should be plenty for an anonymzation network.
I suggested that all nodes be able to act as output nodes, and that to facilitate this
Tor used to function with everyone an exit by default, of course.
, all outputs be subject to mild (or better?) encryption, to ensure than
plaintext never appears on any output node. (To avoid inadvertently providing 'probable cause' to justify a search warrant.)
Good idea. A little similar to tor's exit node filtering for ssl (which is mostly unused I believe).
Is somebody ready to talk about this?
How do my questions land?

On Mon, 10 Jan 2022 00:15:11 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes
that's a ridiculous comment because you do NOT know which nodes are 'trustworthy' And even if you did, the comment is still wholly misleading because the typical attack against tor is based on 'traffic analysis' based on packet/byte counts and timing. And those data are not 'encrypted'. So you can choose all the 'trustworthy' nodes you want, you are still fucked.

On Mon, Jan 10, 2022 at 12:40 AM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 10 Jan 2022 00:15:11 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes
that's a ridiculous comment because you do NOT know which nodes are 'trustworthy'
Well, I can only speak for myself, because I know some operators of those nodes and ran in the past my own.
And even if you did, the comment is still wholly misleading because the typical attack against tor is based on 'traffic analysis' based on packet/byte counts and timing. And those data are not 'encrypted'. So you can choose all the 'trustworthy' nodes you want, you are still fucked.
Quote: MULTI-LAYERED ENCRYPTION Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. And when setting up a Tor Hidden Service, like I did, you have also a key pair for your .onion site. Regards Stefan

On Mon, 10 Jan 2022 00:49:28 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Mon, Jan 10, 2022 at 12:40 AM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
that's a ridiculous comment because you do NOT know which nodes are 'trustworthy'
Well, I can only speak for myself, because I know some operators of those nodes and ran in the past my own.
that still means nothing. Notice also that one of the basic ideas behind tor is to use routers in different 'jurisdictions'. The chances that you know 'trustworthy' routers in 3 different countries are...zero.
And even if you did, the comment is still wholly misleading because the typical attack against tor is based on 'traffic analysis' based on packet/byte counts and timing. And those data are not 'encrypted'. So you can choose all the 'trustworthy' nodes you want, you are still fucked.
Quote:
MULTI-LAYERED ENCRYPTION
Your traffic is relayed and encrypted three times as it passes over
That has nothing to do with what I said. Encryption does not prevent traffic analysis at all. Those three layers of encryption are stripped off at the end, and if you connect to an http: server for instance, then the server's ISP sees all the plaintext. On the other hand, connections to 'hidden services' are end-to-end encrypted and you know you're talking to the 'right' service because the url is the public key so that's good, but it's a property that's independent of any node selection you can do. So...the 'hidden services' infrastructure does provide end to end encryption and some kind of public key management but that's about it. (I need to take a look again at the details of the DNS system, because it's probably another surveillance/weak point)

On Mon, Jan 10, 2022 at 1:20 AM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 10 Jan 2022 00:49:28 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Mon, Jan 10, 2022 at 12:40 AM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
that's a ridiculous comment because you do NOT know which nodes are 'trustworthy'
Well, I can only speak for myself, because I know some operators of those nodes and ran in the past my own.
that still means nothing. Notice also that one of the basic ideas behind tor is to use routers in different 'jurisdictions'. The chances that you know 'trustworthy' routers in 3 different countries are...zero.
And even if you did, the comment is still wholly misleading because the typical attack against tor is based on 'traffic analysis' based on packet/byte counts and timing. And those data are not 'encrypted'. So you can choose all the 'trustworthy' nodes you want, you are still fucked.
Quote:
MULTI-LAYERED ENCRYPTION
Your traffic is relayed and encrypted three times as it passes over
That has nothing to do with what I said. Encryption does not prevent traffic analysis at all. Those three layers of encryption are stripped off at the end, and if you connect to an http: server for instance, then the server's ISP sees all the plaintext.
On the other hand, connections to 'hidden services' are end-to-end encrypted and you know you're talking to the 'right' service because the url is the public key so that's good, but it's a property that's independent of any node selection you can do.
So...the 'hidden services' infrastructure does provide end to end encryption and some kind of public key management but that's about it. (I need to take a look again at the details of the DNS system, because it's probably another surveillance/weak point)
Please forget for one moment the encryption and anonymity people like when using Tor. What I proposed and can do with such a set-up is run with my friends in a local community a Network, once we all come home and exchange (encrypted) messages or files, with whatever device we like to use and without relying on a third party client-server model so to speak, let alone that we do not need a static IP address, or external email service and what not and it is super simple to use and the Golang software is small and easy to use compared to setting up an Apache2 or Nginx web server etc. Regarding using Gougle Groups etc. which you hate or do not like ... I use Usenet since 1985 and the reason why I use Google Groups links is that Google Groups has a retention Usenet Servers do not have, and the URLs can be inserted everywhere. Regards Stefan

On Mon, 10 Jan 2022 16:46:19 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
we all come home and exchange (encrypted) messages or files, with whatever
you can use tox, or retroshare to do that, or freenet - off the top of my head. you don't need to use pentagon trash like tor.
it is super simple to use and the Golang software
fuck anything written using a piece of shit language from joogle. Oh wait, Stefan. You are pimping MORE JOOGLE TRASH. You wouldn't be doing it on purpose would you.
JOOGLE URLs can be inserted everywhere.
stop promoting joogle trash Stefan.
Regards Stefan

On Mon, Jan 10, 2022 at 5:19 PM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 10 Jan 2022 16:46:19 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
it is super simple to use and the Golang software
fuck anything written using a piece of shit language from joogle. Oh wait, Stefan. You are pimping MORE JOOGLE TRASH. You wouldn't be doing it on purpose would you.
stop promoting joogle trash Stefan.
Punk, what you probably overlook, Golang and Rust are both modern Programming Languages used by many thousands of people worldwide and are definitely in, compared to good old and buggy C or C++ software *and* in the case of Golang I can cross-compile for 26 different platforms, i.e. if I compile under Linux I can give friends a copy for Windows or Mac etc. Try that when you write software in other Programming languages. Another plus is IMHO that Golang source code you write is much shorter than C code, due to the fact that there are tons of libraries available you can use. Let alone that Zeynep, for example, with her smartphone can install and compile their Golang programs for her friends too. Not to mention that a lot and I mean a lot of cool projects, regarding crypto and anonymity, etc. are mostly written in Golang or in Rust. You would be amazed. Google, which you 'like so much' has done an awesome job. Regards Stefan

On Mon, 10 Jan 2022 17:59:00 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
On Mon, Jan 10, 2022 at 5:19 PM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 10 Jan 2022 16:46:19 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
it is super simple to use and the Golang software
fuck anything written using a piece of shit language from joogle. Oh wait, Stefan. You are pimping MORE JOOGLE TRASH. You wouldn't be doing it on purpose would you.
stop promoting joogle trash Stefan.
Punk, what you probably overlook, Golang
go fuck yourself Stefan.

i feel a lot of pain when I read insults from punk, and I then struggle more to find ways I can contribute helpfully to the world, while feeling that pain On Sun, Jan 9, 2022, 6:40 PM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
On Mon, 10 Jan 2022 00:15:11 +0100 Stefan Claas <spam.trap.mailing.lists@gmail.com> wrote:
if you are familiar how to edit a torrc, you can then define in their trustworthy nodes
that's a ridiculous comment because you do NOT know which nodes are 'trustworthy'
And even if you did, the comment is still wholly misleading because the typical attack against tor is based on 'traffic analysis' based on packet/byte counts and timing. And those data are not 'encrypted'. So you can choose all the 'trustworthy' nodes you want, you are still fucked.
relating around traffic analysis, just to restate that for a long time the recommended deterrent of this was to run local cover traffic over tor, so that one's bandwidth is constant. this makes it much much harder to correlate the traffic (but places a burden on the network). I don't usually mention this because I understand there are further unaddressed concerns and it is a larger unsolved problem, that anyone can freely attempt engaging by trying to resolve the cover traffic issue on a wide scale.
participants (5)
-
jim bell
-
k
-
Punk-BatSoup-Stasi 2.0
-
Stefan Claas
-
zeynepaydogan