[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
so called onion routing
did i say anything about owners or operators??? ... c'mon stop trying to
catch me at being an idiot its reverb is low sound wave quality - i am
massively sure i am not the smartest person ever but i aint really stupid k?
yay in syria and lotsa other places you gotta give ur passport to get a sim
... not all places though ...spain could give a fuck who you are
On Wed, Aug 5, 2015 at 4:14 AM, Paul Lambert <[email protected]> wrote:
>
>
>
> Interesting â?¦ the ISO NLSP-C did not call itâ??self an â??opinionâ??, but about
> 1993 it supported multiple tunnel encapsulations that could be used for
> anonymity services ( https://goo.gl/CG9Koc ). It was derived from the 89
> vintage NSA defined SP3-C protocol ( http://goo.gl/QEp67F ).
paul i love it
'Traffic Flow Confidentiality is a service provided by either mode of NLSP
to deter traffic flow analysis. The benefits of this feature have long been
known by the military community'
hahhahhahahhahaha ....peeling the layers back of the onion
http://kernelmag.dailydot.com/issue-sections/headline-story/9895/jeremy-hammond-fbi-surveillance-bust/
'That was enough for a judge to grant the FBI a warrant and permission to
> secretly install whatâ??s known as a pen/trap device, which allowed for the
> monitoring of Hammondâ??s Internet activity at the end of February 2012.
> That, coupled with the physical surveillance, allowed the agency to see
> when he was home. What they found correlated with his Tor usage...'
++++++++++++++
just found this cute little mitish qatarian hack
http://www.theregister.co.uk/2015/07/29/mit_boffins_identify_tor_hidden_services_with_88_per_cent_accuracy/
just found this cute little mitish qatarian hack
The boffins showed that "simply by looking for patterns in the number of
> packets passing in each direction through a guard, machine-learning
> algorithms could, with 99 per cent accuracy, determine whether the circuit
> was an ordinary Web-browsing circuit, an introduction-point circuit or a
> rendezvous-point circuit."
> They were able to do this through simple traffic correlation, which is
> available even when the traffic is encrypted.
> Furthermore, by using a Tor-enabled computer to connect to a range of
> different hidden services, they showed that a similar analysis of traffic
> patterns could identify those services with 88 per cent accuracy. That
> means that an adversary who lucked into the position of guard for a
> computer hosting a hidden service, could, with 88 per cent certainty,
> identify it as the serviceâ??s host.
On Wed, Aug 5, 2015 at 11:36 PM, Razer <[email protected]> wrote:
>
>
> On Wed, Aug 5, 2015, 9:24 AM Cari Machet wrote:
> > i like to think about satelites
>
> You don't trust tor but DO trust the satellite owners and operators?
>
> > i know that when i was in syria i could get a fucking video call in
> > the desert where there was nothing
>
> ...and the NRO was logging it, as they say in Southern California,
> 'fershure!'.\
>
> RR
>
>
>
--
Cari Machet
NYC 646-436-7795
[email protected]
AIM carismachet
Syria +963-099 277 3243
Amman +962 077 636 9407
Berlin +49 152 11779219
Reykjavik +354 894 8650
Twitter: @carimachet <https://twitter.com/carimachet>
7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187
Ruh-roh, this is now necessary: This email is intended only for the
addressee(s) and may contain confidential information. If you are not the
intended recipient, you are hereby notified that any use of this
information, dissemination, distribution, or copying of this email without
permission is strictly prohibited.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20150806/c414ff46/attachment-0001.html>