• Re: QSL Still Works - and is definitely not simpler than Nym Mailer

    From Fritz Wuehler@fritz@spamexpire-202601.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy on Wed Jan 7 18:16:00 2026
    From Newsgroup: alt.privacy

    On Wed, 07 Jan 2026 14:17:53 +0000, you wrote:

    Fritz Wuehler in alt.privacy.anon-server:

    This post template =
    Fcc: alt.privacy.anon-server
    Host: dizum
    From: anonymous@anonymous.com
    Chain: dizum,*,*,frell; copies=3;
    To: mail2news@dizum.com, mail2news@neodome.net
    Newsgroups: alt.privacy.anon-server
    Subject:

    Nym Mailer is 1000 times better than QSL, crybaby!

    Nobody has yet hacked a QSL poster's id or ip.

    Who except you Super-Anti-Social Paranoids gives a bleep about the
    other 999 ways your unproven Nym Nonsense is better?

    Notice the word "unproven"? QSL HAS been proven over the years.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nym Mailer@noreply@oc2mx.net to alt.privacy.anon-server,alt.privacy on Wed Jan 7 17:46:53 2026
    From Newsgroup: alt.privacy

    Fritz Wuehler in alt.privacy.anon-server:
    On Wed, 07 Jan 2026 14:17:53 +0000, you wrote:

    Fritz Wuehler in alt.privacy.anon-server:

    This post template =
    Fcc: alt.privacy.anon-server
    Host: dizum
    From: anonymous@anonymous.com
    Chain: dizum,*,*,frell; copies=3;
    To: mail2news@dizum.com, mail2news@neodome.net
    Newsgroups: alt.privacy.anon-server
    Subject:

    Nym Mailer is 1000 times better than QSL, crybaby!

    Nobody has yet hacked a QSL poster's id or ip.

    Who except you Super-Anti-Social Paranoids gives a bleep about the
    other 999 ways your unproven Nym Nonsense is better?

    Notice the word "unproven"? QSL HAS been proven over the years.


    What you fail to understand or better said not know, Nym is a proven technology, with academic research over the years and is audited by
    different companies. George Danezis (Mixminion) [1] was, or still is,
    an advisor.

    You can be happy that your IP address was probably not yet discovered
    when using QSL with Tor. But this will change in 2026 due to advancements
    with AI surveillance. Users themselves can test this already, if they know
    how to do that, to see what an ISP can see when you send always fixed
    size remailer packets through the Tor Network. An ISP, if they are doing
    so, can with hundert percent certainty say that you are using QSL+Tor!

    [1] https://en.wikipedia.org/wiki/George_Danezis

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202601.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy on Wed Jan 7 21:56:51 2026
    From Newsgroup: alt.privacy

    In article <2oz0rf2yb5yhjsbe888kp@oc2mx.net>
    Nym Mailer <noreply@oc2mx.net> wrote:

    Fritz Wuehler in alt.privacy.anon-server:
    On Wed, 07 Jan 2026 14:17:53 +0000, you wrote:

    Fritz Wuehler in alt.privacy.anon-server:

    This post template =
    Fcc: alt.privacy.anon-server
    Host: dizum
    From: anonymous@anonymous.com
    Chain: dizum,*,*,frell; copies=3;
    To: mail2news@dizum.com, mail2news@neodome.net
    Newsgroups: alt.privacy.anon-server
    Subject:

    Nym Mailer is 1000 times better than QSL, crybaby!

    Nobody has yet hacked a QSL poster's id or ip.

    Who except you Super-Anti-Social Paranoids gives a bleep about the
    other 999 ways your unproven Nym Nonsense is better?

    Notice the word "unproven"? QSL HAS been proven over the years.


    What you fail to understand or better said not know, Nym is a proven technology, with academic research over the years and is audited by
    different companies. George Danezis (Mixminion) [1] was, or still is,
    an advisor.

    As Schneier pointed out, some software author can use AES or PGP in
    his software, but that doesn't mean that poor code writing doesn't
    prevent holes in itself which can still give away a user's ip and
    id.. The most single point which personifies a programs reliability
    is time used without failure.

    I ain't arguing about Mix-Whatever, I'm arguing about the new crap Steffasshole and Gabby Mouth are professing to be secure. Only TIME
    will show them to be right or wrong.

    The average usenet user doesn't have a clue as to understanding all
    that technical crap about how to install those pieces of complicated
    crapware. Any user can install QSL without problem. Used along with
    Tor, QSL over the years has been proven to be safe by Time itself.
    Your new tekkie crapware has so far been proven only with your mouths.

    You can be happy that your IP address was probably not yet discovered
    when using QSL with Tor. But this will change in 2026 due to advancements with AI surveillance. Users themselves can test this already, if they know how to do that, to see what an ISP can see when you send always fixed
    size remailer packets through the Tor Network. An ISP, if they are doing
    so, can with hundert percent certainty say that you are using QSL+Tor!

    [1] https://en.wikipedia.org/wiki/George_Danezis

    The above mess of verbiage shows - admits - that QSL/Tor is safe.

    The rest of the garbage is not proof of anything except a big maybe
    that someone using AI in the future will break QSS/Tor - MAYBE.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Radio Eriwan@bounce.me@radio-eriwan.ru to alt.privacy.anon-server,alt.privacy on Thu Jan 8 23:59:10 2026
    From Newsgroup: alt.privacy

    Fritz Wuehler once wrote:

    The rest of the garbage is not proof of anything except a big maybe
    that someone using AI in the future will break QSS/Tor - MAYBE.

    Not MAYBE but for sure!!! If you would be smart, which your are clearly
    not, you could test it by yourself. An ISP can clearly and exactly see
    that *you* are sending TypeII payloads over Tor and their sophisticated
    TLAs are doing the rest to identify your clear net smtp/pools traveling
    paths, not to mention with possible help of bribed? remops, which you
    don't know personally, but which are known to them!

    So, next time you speak about crap etc., remember that *you* are using
    outdated tech (not even easier to use than Nym Mailer), which in >2026
    can no longer protect *you*, or other users!
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202601.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy on Fri Jan 9 01:29:13 2026
    From Newsgroup: alt.privacy

    On Thu, 08 Jan 2026 23:59:10 +0300, you wrote:

    Fritz Wuehler once wrote:

    The rest of the garbage is not proof of anything except a big maybe
    that someone using AI in the future will break QSS/Tor - MAYBE.

    Not MAYBE but for sure!!! If you would be smart, which your are clearly
    not, you could test it by yourself. An ISP can clearly and exactly see
    that *you* are sending TypeII payloads over Tor

    Oh, big deal that they can see I'm using Tor. Again, Big Deal about
    nothing except that I 'm using Tor.

    and their sophisticated
    TLAs are doing the rest to identify your clear net smtp/pools traveling paths, not to mention with possible help of bribed? remops, which you
    don't know personally, but which are known to them!

    So, they are watching my paths. How do they distinguish me from the
    other Tor users on their network?

    You are so full of "supposed" shit.

    Bribed remops? You mean the likes of ellbash, frog, The GabberMouth,
    and possibly yourself? I use only the few who have been proven
    honest and dependable over years of usage.

    Keep making up more MAYBE , COULD BE, and SUPPOSED CRAP about QSL and
    Tor. It ain't impressing us QSL/Tor users.


    So, next time you speak about crap etc., remember that *you* are using outdated tech (not even easier to use than Nym Mailer), which in >2026
    can no longer protect *you*, or other users!

    We'll see what 2026 brings in real time and not in your fantasy world.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nym Mailer@noreply@oc2mx.net to alt.privacy.anon-server,alt.privacy on Sat Jan 10 15:19:26 2026
    From Newsgroup: alt.privacy

    Fritz Wuehler wrote:

    So, they are watching my paths. How do they distinguish me from the
    other Tor users on their network?

    They can see that you always send Type II packets in the Tor
    network,
    as consecutive packets in streams.
    The size is always the same, which
    is not shown by the profiles of other Tor users.

    Type II was excellent back in the '90s when we had no Tor.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202601.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.privacy on Mon Jan 12 10:23:04 2026
    From Newsgroup: alt.privacy

    On 10 Jan 2026, Nym Mailer <noreply@oc2mx.net> posted some news:57kek18bpguzdznxce61y@oc2mx.net:

    Fritz Wuehler wrote:

    So, they are watching my paths. How do they distinguish me from the
    other Tor users on their network?

    They can see that you always send Type II packets in the Tor
    network,
    as consecutive packets in streams.
    The size is always the same, which
    is not shown by the profiles of other Tor users.

    Type II was excellent back in the '90s when we had no Tor.

    So what? Unless I fuck up during entry, which by my posting procedure
    design can't happen even by accident, they can't see who the originator
    was, nor can they identify who I am.

    All packets have a set payload, size isn't unique unless traversing a
    VPN where additional header info is added and payload reduced
    accordingly.

    --- Synchronet 3.21a-Linux NewsLink 1.2