Hello,
Michael Paoli wrote on 15/09/2025 at 01:20:23+0200:
> "extraordinary claims require extraordinary evidence".
> Please point to the evidence.
> Both Linux and Tor, OpenSource,
> and with source/version control and history, etc.
> So if they were compromised at any point, or even
> unintent
"extraordinary claims require extraordinary evidence".
Please point to the evidence.
Both Linux and Tor, OpenSource,
and with source/version control and history, etc.
So if they were compromised at any point, or even
unintentional compromising bugs introduced, one should
well be able to point that
Hi, I am an investigative journalist, whistleblower, and I use Linux, Tor, and
other privacy-preserving technologies.
I have studied cybersecurity for over 10 years, networking, Linux, and OPSEC
principles.
I used Linux and Tor to whistleblow information, on major criminals committing
crimes ag
3 matches
Mail list logo