Dishonest Tor relay math question - tor-talk is to lazy

PrivacyArms privacyarms at protonmail.com
Wed Oct 13 11:43:56 PDT 2021


1) Is there a better way for anonymous communication than Tor?

2) Is there a global adversary resistant mixnet?

3) Someone mentioned the fact, that criminals have better ways of hiding than Tor? What methods do you had in mind?


‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Tuesday, October 12, 2021 2:50 AM, PrivacyArms <privacyarms at protonmail.com> wrote:

> 1.  Is there a better way for anonymous communication than Tor?
> 2.  Is there a global adversary resistant mixnet?
> 3.  Someone mentioned the fact, that criminals have better ways of hiding than Tor? What methods do you had in mind?
>     

>     ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
>     On Monday, October 11, 2021 10:43 AM, grarpamp grarpamp at gmail.com wrote:
>     

> 

> > > Tor uses some kind of limited padding,
> > 

> > Tor Project Inc added netflow padding after someone
> > started posting on netflow, general TA, and Sybil problems.
> > Then TPI censored, banned, and booted them out after
> > they kept publicly posting about TA and other insidious and
> > inconvenient problems such as Sybil. Now with Sybil, like before
> > with padding, they never credit mention the poster's work, and try
> > to phrase claim that TPI was the natural origin self impetus source
> > to do the pad and Sybil just at those moments in time, when
> > they had decades to do that since they knew the weaknesses
> > since decades... No, they were just getting exposed is why... lol.
> > Just like their netflow padding doesn't do much,
> > neither does their current Sybil proposal.
> > Some interest in real security surely exists,
> > but it definitely gets distracted by $ponsors
> > who pay for other things, all to half of said money
> > for decades has been from Government, which many
> > define as a problematic source of conflictive influencing.
> > 

> > > Afaik all backbone routers can be configured for packet or per-flow
> > 

> > At high line rates it takes serious HW to do full spyveillance
> > capture or flows, sampled and aggregated flows are common
> > for ISP service when those aren't needed.
> > 

> > > can get packet logs whenever they want them.
> > 

> > They can "get" them, but there's no need to go external
> > for that when they can just troll the output of their own
> > private TOP-SECRET FVEY taps that feed into their
> > global internet buffers at Bluffdale and elsewhere.
> > Same for what they get from their Corp-is-aware
> > feeds obtained under different "authorities".
> > 

> > > Against the elephant? Tor's padding is totally useless.
> > 

> > Not only the elephants anymore.
> > Netflow traditionally a quaint thing used by ISP's and LEA's
> > to match up endpoints, subpoenas, abuse, bots, traffic
> > stats, etc... it can work to some percent to follow some
> > tor traffic cases, but it isn't a generalized form of TA.
> > Today really anyone with a brain and some code
> > can begin to general TA characterize streams of bytes
> > counting and timing over various size windows, and
> > hunt for that pattern where it also appeared on their
> > other boxes.
> > Good luck trying to make a factor of defense improvement
> > against general TA without trying a fulltime enforced
> > and reclocked base layer of dynamic chaff.
> > Submit papers for acceptance into tor alternatives :)
> > "Tor Stinks -- NSA"

-------------- next part --------------
A non-text attachment was scrubbed...
Name: publickey - privacyarms at protonmail.com - 0x6ECBFF11.asc
Type: application/pgp-keys
Size: 3278 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20211013/d689463e/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 855 bytes
Desc: OpenPGP digital signature
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20211013/d689463e/attachment.sig>


More information about the cypherpunks mailing list