Re: [tor-talk] Pittsburgh Bombing Threats and Mix-Master

2012-05-17 Thread Matthew Kaufman
Yeah, There honestly seemed to be too few and far too static remail relay servers to be highly anonymous; what if you go through only 3 and hack the out box, to the previous, to the first, back to the original sender? Matt On Thursday, May 17, 2012, wrote: > Tell me if I am wrong, but I think it

Re: [tor-talk] Pittsburgh Bombing Threats and Mix-Master

2012-05-17 Thread proper
Tell me if I am wrong, but I think it's not worth to bother with mixmaster, mixmion, remailing, etc. anymore. It's practically dead. Some remailing systems have been written by high profile people, some of them are now working on Tor. Due to high latency, remailers are theoretically more secure

Re: [tor-talk] Pittsburgh Bombing Threats and Mix-Master

2012-05-16 Thread Karsten N.
On 05/16/2012 04:35 AM, Matthew Kaufman wrote: > My last question could this work *with* tor, in combination? You can use a Mixmaster webinterface with TorBrowser: http://a5ec6f6zcxtudtch.onion/anon-email.htm https://www.cotse.net/cgi-bin/mixmail.cgi Best regards Karsten N. ___

Re: [tor-talk] Pittsburgh Bombing Threats and Mix-Master

2012-05-15 Thread David H. Lipman
From: "Matthew Kaufman" > Hello, > > I just heard that the University of Pittsburgh's bomb threats had been sent > in via Mixmaster. I had never heard of this project until tonight and it > instantly lead me to think of Tor. > > I had tried using Mixmaster myself but it rejects mail due to an un