Dear Anonymous Person,
I have to admit, it was a very interesting read, even though I am not
too sure I agree completely. It seems as if your threat model has
encompassed every single tiny thing that could possibly (theoretically)
go wrong, without much thought given to real-world randomness and
i
May i give you some hints about the future scenarios for which we could
see diffusion in 2013 about the two topic you underlined:
- Anonymous Publishing
One of the new frontieer of Anonymous Publishing is given by the Tor2web
Project that is growing and making important progress, has a plan
(http
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 30/06/12 20:29, Jerzy Łogiewa wrote:
>>> After all, SR is on TOR. Maybe reading their FAQ helps. Hint:
>>> Use a Tumbler.
>> I've no idea what "SR" is. "Tumbler" sounds like some sort of
>> mixing/laundering service. Which would require a *lot*
Apologies and Thank You for reading even though the line breaks were
lost.Apparently even 7bit ASCII is difficult to publish in.In case it happens
again, I will include paragraph breaks at the #, and repeat the initial email
between ==='s.#
On Sun, Jul 1, 2012, at 14:20, Edward Thompson wrote:
> 2. Email. I signed up for mailoo.org through Tor, I believe. But for all
> practical purposes, you could easily get a disposable e-mail address
> through a Firefox plugin called Bloody Vikings. Otherwise, pretty much
> any web mail will do...
On Sun, Jul 1, 2012, at 12:34, Fabio Pietrosanti (naif) wrote:
> You may even place in front of your TorHS, internet-exposed via Tor2web,
> a CloudFare.net frontend or other "cloudizer" to improve performance
> improved caches.
What is cloudfare? I tried and got pushed to some facebook page so I
c
On Sat, Jun 30, 2012 at 3:17 PM, || ΣΖΟ || wrote:
> So spammers abuse tor...
Yes, they always have, and probably always will.
>
> I wonder how the tor community thinks about this is this accepted, or
> will know spammers be blocked or anything?
Tor is designed to keep people anonymous; this wor
On Sat, Jun 30, 2012 at 4:15 PM, Anonymous Person
wrote:
> I know it is dead, because I have tried to do it, and I can assure you it is
> dead.
I had a similar experience.
When I decided to publish a large collection (30gb) of previously
paywalled (but public domain) JSTOR documents[1] I initi
On Sun, Jul 1, 2012 at 3:32 PM, Sam Whited wrote:
> Tor is designed to keep people anonymous; this works for both the good
> guys, and the bad. This isn't something the Tor Project needs to fix
There are things the tor project and surrounding community could do to
help here.
For example, If I co
On Sun, Jul 1, 2012, at 15:38, Gregory Maxwell wrote:
> When I decided to publish a large collection (30gb) of previously
> paywalled (but public domain) JSTOR documents[1] I initially planned
> to do so anonymously— simply to mitigate the risk of harassment via
> the courts. Ultimately, after more
On Sun, Jul 1, 2012, at 15:32, Sam Whited wrote:
> On Sat, Jun 30, 2012 at 3:17 PM, || ΣΖΟ || wrote:
> > So spammers abuse tor...
>
> Yes, they always have, and probably always will.
I feel there is a need to dispell some wonderful magic of the modern
society: the World has always been large. Ev
30gb is a lot. what about using i2p?
for smaller data, you could always host it yourself on your home connection.
with tor hidden service, anonymously.
--
Jerzy Łogiewa -- jerz...@interia.eu
On Jul 1, 2012, at 3:38 PM, Gregory Maxwell wrote:
> I perused anonymous publication for some days prio
2012/7/1 Edward Thompson
> And if your threat model
> encompasses an organisation with vast resources, like the NSA for
> example, consider that they haven't yet managed to track down the guys
> running the Silk Road drug site (http://silkroadvb5piz3r.onion)... ;)
The Dutch secretest agency had
The conversation has landed on cryptome.org and hackerne.ws . The last comment
at cryptome.org is interesting for the discussion.
http://hackerne.ws/item?id=4184850
Gregory Maxwell wrote:
>On Sat, Jun 30, 2012 at 4:15 PM, Anonymous Person
> wrote:
>> I know it is dead, because I have tried to
> anonymously donate
Well, very few places take cash or money order in the mail. Call
them stupid to not take the money. Then there's AML with bitcoin,
etc.
> a persistent nym
Building a persistent nym is handy if you wish to establish such a
personage for compartemented tasks, etc. However, the
>> like the NSA for example, consider that they haven't yet managed to track
>> down the guys running the Silk Road drug site (http://silkroadvb5piz3r.onion)
Call me stupid, but I actually think the NSA does have the capability to
locate Tor hidden services, even if only those existing within the
On Sun, Jul 1, 2012 at 11:48 PM, grarpamp wrote:
> Do NOT penalize those who need multiple random unlinked accounts
> by blocking ip's, making up nym systems, etc. Penalize the accounts
> that act up. They are the bad ones, not the former.
It's this kind of thinking that will result in the web co
17 matches
Mail list logo