[spam][joke] implementing a timing attack

Undiscussed Horrific Abuse, One Victim of Many gmkarl at gmail.com
Wed Apr 20 13:26:18 PDT 2022


[ridiculous psychological patterns]

in order to deanonymise an anonymity network using timing patterns, we will
need two things:

1. newly hacked machine learning algorithms
2. use of an effective anonymity network to deanonymise

I suppose we should start with #2.

2a. add constant chaff to tor, knowing this was helpful two decades ago and
having no idea what is helpful now
2b. register an email address from a clean purposed system, dissociated
from our legal identity
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 723 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20220420/1787547c/attachment.txt>


More information about the cypherpunks mailing list