I mistyped. Here is the correct version.
day 1
1) Tails user regularly goes to physical place A that provide [free] WiFi.
2) The name of the wifi is FreeWifi832458252823523 with MAC address "A".
The user uses the regular way to set up a WiFi connection. Network
Manager etc.
3) Now, Tails would re
Even when you know what you are doing there can be some funny side
effects, this is really specific and not entirely related to the
original problematic of this thread but just shows that you can't master
everything even when you think you do, and anybody I believe can one day
make mistake while se
On Sun, Feb 21, 2016 at 9:30 PM, Scfith Rise up wrote:
> Mr. Andersson is assuming a lot. There are definitely tried and true methods
> to make purchases online and setup identities for these types of things. At
> the end of the day, yes the VPS provider is the weakest link. But you can use
> o
-- Forwarded message --
From: Steve Kinney
Date: Mon, 15 Feb 2016 08:59:32 -0500
Subject: Cryptopolitik and the Darknet
To: cypherpu...@cpunks.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cryptopolitik and the Darknet
"Encryption is too important to be left to true believer
Tor Weekly News Febrary 22nd, 2016
Welcome to the 2nd issue in 2016 of Tor Weekly News, the weekly
newsletter tha
Dear Tor community,
I came across this message[1] about Shari Steele wanting to bring Tor to
the mainstream. I humbly believe I have something that might assist her
in this quest. I call it Eccentric Authentication.
Philosophical:
The Eccentric Authentication protocol is designed for situations