Pixel Dust Is Futile

John Young jya at pipeline.com
Thu Feb 5 05:10:21 PST 2015

Peter Gutmann's pixel dust protection of privacy works as
an update for faith in elaborately futile shenanigans to evade
and to nab evaders inherently implanted in fetuses then re-implanted
in corpses: dust to dust.

Logs are as deceptive and who, what and how they log.
Machine designers and sysadmins artfully possessive
documentaries inherently evasive and capturing.

At 12:04 AM 2/5/2015, coderman wrote:
>On 2/4/15, John Young <jya at pipeline.com> wrote:
> > Darknet is hardly dark,  or no more than Tor anonymizes,
> > ...
>true; perhaps best quantified as: "no ISP asshattery".
>  but fails like all earth human technology in face of capable attacker
>with significant resources.
>[ specifically, onion overlay avoids TCP RST, DNS redir, local network
>ARP poisoning, IPv4/IPv6 BGP route jacking, transport privacy and
>authenticity** attacks (rewrite proxy) ]
>** key management, someone has to do it. and it is always cumbersome...
>but that is nary a sliver in the sky of surface exposed, in typical
>"rich web service" context, full of javascript and media handlers and
>plug-ins, oh my!
>tell us John, do your server logs show mostly complete or incomplete
>downloads of Cfour? :P

More information about the cypherpunks mailing list