Hi Dennis,
In case you've been asleep under some accursed rock for the last couple
of years, let's get some things straight:
As benevolent Tor exit operators, we care a lot about our users'
privacy. We choose to log as little as possible, and to ensure the
security of the servers of our Tor relay
> So let me get this straight – Because you don’t agree with the way I’m
> marketing my network I must be malicious and this must be a “social
> engineering” attack? Seriously guys, put away the tin foil hats. I truly
> DON’T want to know what people on tor are browsing.
>
> If you ‘d like to waste
On 09.09.2017 21:54, Dennis Emory Hannon wrote:
> Because you don’t agree with the way I’m marketing my network I must
> be malicious and this must be a “social engineering” attack?
Your so-called marketing is in fact spamming harvested Tor contact
addresses, as my logs clearly show (technically
So let me get this straight - Because you don't agree with the way I'm
marketing my network I must be malicious and this must be a "social
engineering" attack? Seriously guys, put away the tin foil hats. I truly
DON'T want to know what people on tor are browsing.
If you 'd like to waste your time
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/09/2017 03:52 AM, Matt Traudt wrote:
> I just got this guy's spam too. It doesn't look like anything anyone
> said to him last month[0] stuck.
Just because never answer to a spam/troll/et al ? :-D
- --
Toralf
PGP C4EACDDE 0076E94E
-BEGIN
On Fri, Sep 08, 2017 at 09:52:09PM -0400, Matt Traudt wrote:
> His intentions are now very suspicious to me too. I will definitely not
> be pointing anything at his servers.
> https://lists.torproject.org/pipermail/tor-relays/2017-August/012735.html
Yes, I agree.
I wonder if there's a way to scan