hi jim On Sun, Jan 9, 2022, 7:28 PM jim bell <[1]jdb10987@yahoo.com> wrote: Aaaaaaa On Sun, Jan 9, 2022 at 3:20 PM, Stefan Claas <[2]spam.trap.mailing.lists@gmail.com> wrote: > > On Sun, Jan 9, 2022 at 10:09 PM zeynepaydogan > <[3]zeynepaydogan@protonmail.com> wrote: > > > > Stefan, do you really recommend the Tor network here? Google users don't expect privacy, but the Tor network is deceiating people who expect "privacy".The ex Tor developer here might say that the US government is funding the Tor.Don't use smartphone but use Tor? > > LOL > > Hi Zeynep, > > if you are familiar how to edit a torrc, you can then define in their > trustworthy nodes > from privacy folks and privacy organizations. Or if you know how to run your own > VPS server you can then use your own one as a trustworthy node. > > Nym is not ready yet for production, as an alternative and gives you > also not more > privacy by design, even if it is a Mixnet and will most like cost you > money then (crypto > currency) once in production. > > Regarding smartphones, at least you can run my proposal on your > smartphone ... ;-) __________________ >And with Tor you can run then also professional Mixnet clients, Like YAMN or Mixmaster and then send those messages to the Bitmessage Network. >How cool is that? Jim Bell's comment: Do you recall my suggestion from about 2 years ago that a new anonymity network be built, akin to TOR, but hosted by 1000+ people out of their homes and small businesses? I mentioned using Raspberry Pi. I recall this a little. I was feeling discouraged at the time. Why worry about hosting when everyone has a device already they are using to email with? Why start a new project rather than forking an old -- unless the old ones are overcomplicated and unweildy. The main desirable thing is that unlimited-data Internet be available, which even then was true for 940 Mb/sec $65 month service. (CenturyLink service). I believe they are now offering 100 Mbits/sec for $30/month, which should be plenty for an anonymzation network. I suggested that all nodes be able to act as output nodes, and that to facilitate this Tor used to function with everyone an exit by default, of course. , all outputs be subject to mild (or better?) encryption, to ensure than plaintext never appears on any output node. (To avoid inadvertently providing 'probable cause' to justify a search warrant.) Good idea. A little similar to tor's exit node filtering for ssl (which is mostly unused I believe). Is somebody ready to talk about this? How do my questions land? References 1. mailto:jdb10987@yahoo.com 2. mailto:spam.trap.mailing.lists@gmail.com 3. mailto:zeynepaydogan@protonmail.com