[spam][joke] implementing a timing attack
Undiscussed Horrific Abuse, One Victim of Many
gmkarl at gmail.com
Wed Apr 20 13:26:18 PDT 2022
[ridiculous psychological patterns]
in order to deanonymise an anonymity network using timing patterns, we will
need two things:
1. newly hacked machine learning algorithms
2. use of an effective anonymity network to deanonymise
I suppose we should start with #2.
2a. add constant chaff to tor, knowing this was helpful two decades ago and
having no idea what is helpful now
2b. register an email address from a clean purposed system, dissociated
from our legal identity
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 723 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20220420/1787547c/attachment.txt>
More information about the cypherpunks
mailing list