Fritz Wuehler in alt.privacy.anon-server:
This post template =
Fcc: alt.privacy.anon-server
Host: dizum
From: anonymous@anonymous.com
Chain: dizum,*,*,frell; copies=3;
To: mail2news@dizum.com, mail2news@neodome.net
Newsgroups: alt.privacy.anon-server
Subject:
Nym Mailer is 1000 times better than QSL, crybaby!
On Wed, 07 Jan 2026 14:17:53 +0000, you wrote:
Fritz Wuehler in alt.privacy.anon-server:
This post template =
Fcc: alt.privacy.anon-server
Host: dizum
From: anonymous@anonymous.com
Chain: dizum,*,*,frell; copies=3;
To: mail2news@dizum.com, mail2news@neodome.net
Newsgroups: alt.privacy.anon-server
Subject:
Nym Mailer is 1000 times better than QSL, crybaby!
Nobody has yet hacked a QSL poster's id or ip.
Who except you Super-Anti-Social Paranoids gives a bleep about the
other 999 ways your unproven Nym Nonsense is better?
Notice the word "unproven"? QSL HAS been proven over the years.
Fritz Wuehler in alt.privacy.anon-server:
On Wed, 07 Jan 2026 14:17:53 +0000, you wrote:
Fritz Wuehler in alt.privacy.anon-server:
This post template =
Fcc: alt.privacy.anon-server
Host: dizum
From: anonymous@anonymous.com
Chain: dizum,*,*,frell; copies=3;
To: mail2news@dizum.com, mail2news@neodome.net
Newsgroups: alt.privacy.anon-server
Subject:
Nym Mailer is 1000 times better than QSL, crybaby!
Nobody has yet hacked a QSL poster's id or ip.
Who except you Super-Anti-Social Paranoids gives a bleep about the
other 999 ways your unproven Nym Nonsense is better?
Notice the word "unproven"? QSL HAS been proven over the years.
What you fail to understand or better said not know, Nym is a proven technology, with academic research over the years and is audited by
different companies. George Danezis (Mixminion) [1] was, or still is,
an advisor.
You can be happy that your IP address was probably not yet discovered
when using QSL with Tor. But this will change in 2026 due to advancements with AI surveillance. Users themselves can test this already, if they know how to do that, to see what an ISP can see when you send always fixed
size remailer packets through the Tor Network. An ISP, if they are doing
so, can with hundert percent certainty say that you are using QSL+Tor!
[1] https://en.wikipedia.org/wiki/George_Danezis
The rest of the garbage is not proof of anything except a big maybe
that someone using AI in the future will break QSS/Tor - MAYBE.
Fritz Wuehler once wrote:
The rest of the garbage is not proof of anything except a big maybe
that someone using AI in the future will break QSS/Tor - MAYBE.
Not MAYBE but for sure!!! If you would be smart, which your are clearly
not, you could test it by yourself. An ISP can clearly and exactly see
that *you* are sending TypeII payloads over Tor
and their sophisticated
TLAs are doing the rest to identify your clear net smtp/pools traveling paths, not to mention with possible help of bribed? remops, which you
don't know personally, but which are known to them!
So, next time you speak about crap etc., remember that *you* are using outdated tech (not even easier to use than Nym Mailer), which in >2026
can no longer protect *you*, or other users!
So, they are watching my paths. How do they distinguish me from the
other Tor users on their network?
Fritz Wuehler wrote:
So, they are watching my paths. How do they distinguish me from the
other Tor users on their network?
They can see that you always send Type II packets in the Tor
network,
as consecutive packets in streams.
The size is always the same, which
is not shown by the profiles of other Tor users.
Type II was excellent back in the '90s when we had no Tor.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 54 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 14:04:31 |
| Calls: | 742 |
| Files: | 1,218 |
| D/L today: |
3 files (2,681K bytes) |
| Messages: | 183,733 |
| Posted today: | 1 |