Running custom tor client configs is generally a bad idea, so use this list
wisely according to your threat model.
+-+--+-+--+---++-+
| first_seen | fingerprint
nusenu writes:
> InjureWellprepred
> ChicgoHopeful
> VillgerVenice
> FemleDiffer
> PossibilityCreture
> CrownDutchmn
> BeyondNtionl
> BridegroomDisster
> HrmonyCrown
> NurseryGreement
> RibbonUnderline
> CookbookRoundbout
> SectionPolitics
> PerfectThlete
Very odd naming convention. It's kind of
> Very odd naming convention.
There have been such constructions, as well as
other sorts of observables and lackof sufficients therein,
observed and mentioned for decade as project for whoever
wants to take up. Yet there is still no opensource node
analysis and subscription project.
--
tor-talk m