Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 52:36:24 |
Calls: | 583 |
Files: | 1,139 |
D/L today: |
179 files (27,921K bytes) |
Messages: | 111,617 |
Are you sure you trust VPN providers, Would it not be better to make your own VPN?
https://www.youtube.com/watch?v=O2mxQSqvsaM
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
Are you sure you trust VPN providers, Would it not be better to make
your own VPN?
https://www.youtube.com/watch?v=O2mxQSqvsaM
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
Is there any reason you prefer NYM over Mullvad?
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
In wich country is NymVpn?
Let's suppose that mister Trump want to know who posted a post
against the Gaza genocide.
If the servers are in USA Donald pick the phone and after a minute
that people is deported at Guantanamo.
On Tue, 26 Aug 2025 22:01:43 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
Are you sure you trust VPN providers
Fritz Wuehler wrote:
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
In wich country is NymVpn?
Let's suppose that mister Trump want to know who posted a post
against the Gaza genocide.
If the servers are in USA Donald pick the phone and after a minute
that people is deported at Guantanamo.
NymVPN has two modes. Fast mode uses WireGuard and you choose the
entry and exit node from a list of many countries where these
nodes are located.
The second mode is anonymous mode, which uses the Nym Mixnet,
where gateways and mix nodes are also located in different
countries.
https://nym.com/
https://nym.com/mixnet
Regards
Stefan
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
Fritz Wuehler wrote:
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
In wich country is NymVpn?
Let's suppose that mister Trump want to know who posted a post
against the Gaza genocide.
If the servers are in USA Donald pick the phone and after a minute
that people is deported at Guantanamo.
NymVPN has two modes. Fast mode uses WireGuard and you choose the
entry and exit node from a list of many countries where these
nodes are located.
The second mode is anonymous mode, which uses the Nym Mixnet,
where gateways and mix nodes are also located in different
countries.
https://nym.com/
https://nym.com/mixnet
Regards
Stefan
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs
$12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
Fritz Wuehler wrote:
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
In wich country is NymVpn?
Let's suppose that mister Trump want to know who posted a post
against the Gaza genocide.
If the servers are in USA Donald pick the phone and after a minute
that people is deported at Guantanamo.
NymVPN has two modes. Fast mode uses WireGuard and you choose the
entry and exit node from a list of many countries where these
nodes are located.
The second mode is anonymous mode, which uses the Nym Mixnet,
where gateways and mix nodes are also located in different
countries.
https://nym.com/
https://nym.com/mixnet
Regards
Stefan
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs
$12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs
$12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your >path that are sensitive. That is, in normal cases it's 3, but for example if >you're accessing an onion service or a ".exit" address it could be more.
We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
Also, using paths longer than 3 could harm anonymity, first because it makes >denial of security attacks easier, and second because it could act as an >identifier if only a small number of users have the same path length as you. [end quote]
Should I install a new add-on or extension in Tor Browser, like AdBlock Plus or[end quote]
uBlock Origin?
gus
Community Team lead
Nov 2021
no add-ons such as Ublock, add-on antivirus etc.
It's strongly discouraged to install new add-ons in Tor Browser, because they >can compromise your privacy and security. See this Support article: Should I >install a new add-on or extension in Tor Browser, like AdBlock Plus or uBlock >Origin? | Tor Project | Support
Please read the Tor Browser Design document: 2.3 Philosophy No filters Site- specific or filter-based addons such as AdBlock Plus, Request Policy, Ghostery,
Priv3, and Sharemenot are to be avoided. We believe that these addons do not add
any real privacy to a proper implementation of the above pr...
...
2.3 Philosophy
No filters
Site-specific or filter-based addons such as AdBlock Plus, Request Policy, Ghostery, Priv3, and Sharemenot are to be avoided. We believe that these addons
do not add any real privacy to a proper implementation of the above privacy requirements, and that development efforts should be focused on general solutions
that prevent tracking by all third parties, rather than a list of specific URLs
or hosts.
Implementing filter-based blocking directly into the browser, such as done with
Firefox' Tracking Protection, does not alleviate the concerns mentioned in the
previous paragraph. There is still just a list containing specific URLs and hosts
which, in this case, are assembled by Disconnect and adapted by Mozilla. Trying to resort to filter methods based on machine learning does not solve the
problem either: they donAt provide a general solution to the tracking problem as
they are working probabilistically. Even with a precision rate at 99% and a false
positive rate at 0.1% trackers would be missed and sites would be wrongly blocked.
Filter-based solutions in general can also introduce strange breakage and cause
usability nightmares. For instance, there is a trend to observe that websites start detecting filer extensions and block access to content on them. Coping with
this fallout easily leads to just whitelisting the affected domains, hoping that
this helps, defeating the purpose of the filter in the first place. Filters will
also fail to do their job if an adversary simply registers a new domain or creates a new URL path. Worse still, the unique filter sets that each user creates or installs will provide a wealth of fingerprinting targets.
As a general matter, we are also generally opposed to shipping an always-on Ad
blocker with Tor Browser. We feel that this would damage our credibility in terms
of demonstrating that we are providing privacy through a sound design alone, as
well as damage the acceptance of Tor users by sites that support themselves through advertising revenue.
Users are free to install these addons if they wish, but doing so is not recommended, as it will alter the browser request fingerprint.
3<Number of nodes that make up a general purpose circuit.
Longer chains may increase anonymity, but also make it
more difficult and time-consuming to be built and used.
Furthermore they may stress the Tor network excessively.
!! So please be careful with the usage of this parameter !!!
Default: 3
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
do what thou wilt, but i'd advise against using any more than three hops,
not only because omnimix and torproject seem to agree on that issue, but
also because anti-anonymous remailer/tor-mailer "chief evangelists" have always advocated unsafe practices e.g. use more than 3 tor circuit nodes
(but these wall street shills are only doing their duty, it's their job)
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
No need for name calling here. There comes a time when you need to pay for some services. I'm trying to decide between Mullvad VPN and NYM VPN.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
No need for name calling here. There comes a time when you need to pay for >some services.
Yes, we all use TOR but as you are aware of there are some things you just >can't do on TOR!
On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs
$12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with
their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally, and the torproject warns against using tor circuit lengths longer than three:
(using Tor Browser 14.5.6)
https://support.torproject.org/misc/misc-11/
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your
path that are sensitive. That is, in normal cases it's 3, but for example if >> you're accessing an onion service or a ".exit" address it could be more.
We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
Also, using paths longer than 3 could harm anonymity, first because it makes >> denial of security attacks easier, and second because it could act as an[end quote]
identifier if only a small number of users have the same path length as you.
Professional users, which do not use a GUI app like OmniMix with various .exe >files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
D wrote:
do what thou wilt, but i'd advise against using any more than three hops,
not only because omnimix and torproject seem to agree on that issue, but
also because anti-anonymous remailer/tor-mailer "chief evangelists" have
always advocated unsafe practices e.g. use more than 3 tor circuit nodes
(but these wall street shills are only doing their duty, it's their job)
What kind of liar are you? Danner, himself, introduced in his GUI app with
a modified tor.exe more than 3 hops. I mentioned that as discussion here in >a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.
And you have always promoted OmniMix with a modified tor.exe, until I raised >the issue!
Professional users, which do not use a GUI app like OmniMix with various .exe >files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
Claas wrote:
Professional users, which do not use a GUI app like OmniMix with various .exe
files, are using tools like Mini Mailer, either with the modern Nym Mixnet or
Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
Take your meds! Nobody uses your shitty hacks.
Stefan Claas wrote:
D wrote:
do what thou wilt, but i'd advise against using any more than three hops, not only because omnimix and torproject seem to agree on that issue, but also because anti-anonymous remailer/tor-mailer "chief evangelists" have always advocated unsafe practices e.g. use more than 3 tor circuit nodes (but these wall street shills are only doing their duty, it's their job)
What kind of liar are you? Danner, himself, introduced in his GUI app with a modified tor.exe more than 3 hops. I mentioned that as discussion here in a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.
The result would have been a simple NO by the Tor team no matter for
what reason. But haven't you yourself contacted them on this topic?
What exactly was their reasoning? Was it sound? Was there solid
evidence for the insecurity of longer circuits they postulate?
And you have always promoted OmniMix with a modified tor.exe, until I raised
the issue!
Professional users, which do not use a GUI app like OmniMix with various .exe
files, are using tools like Mini Mailer, either with the modern Nym Mixnet or
Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
Really?
In article <20250827.221421.0080eb00@mixmin.net> D wrote:
On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page deviously alleging a price of $2.59 monthly when usage really costs $12.99 a month is not to be trusted. Lying advertising is the sign of a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
Absolutely. Five has to be the new three.
anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
and the torproject warns against using tor circuit lengths longer than three:
(using Tor Browser 14.5.6)
https://support.torproject.org/misc/misc-11/
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your
path that are sensitive. That is, in normal cases it's 3, but for example if
you're accessing an onion service or a ".exit" address it could be more. We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
They just fear the higher load. That's it.
Also, using paths longer than 3 could harm anonymity, first because it makes[end quote]
denial of security attacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.
There's no proof the circuit length can be identified at the exit.
But there's an immense risk to get three nodes run by a single
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
Nomen Nescio wrote:
Claas wrote:
Professional users, which do not use a GUI app like OmniMix with various .exe
files, are using tools like Mini Mailer, either with the modern Nym Mixnet or
Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
Take your meds! Nobody uses your shitty hacks.
Idiot! I already made quite a bit of money with Mini Mailer.
There's no proof the circuit length can be identified at the exit.
But there's an immense risk to get three nodes run by a single
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
What are Entry Guards?[end quote]
Tor (like all current practical low-latency anonymity designs) fails when the >attacker can see both ends of the communications channel. For example, suppose >the attacker controls or watches the Tor relay you choose to enter the network,
and also controls or watches the website you visit. In this case, the research >community knows no practical low-latency design that can reliably stop the >attacker from correlating volume and timing information on the two sides.
So, what should we do? Suppose the attacker controls, or can observe, C relays.
Suppose there are N relays total. If you select new entry and exit relays each >time you use the network, the attacker will be able to correlate all traffic you
send with probability around (c/n)^2. But profiling is, for most users, as bad as
being traced all the time: they want to do something often without an attacker >noticing, and the attacker noticing once is as bad as the attacker noticing more
often. Thus, choosing many random entries and exits gives the user no chance of
escaping profiling by this kind of attacker.
The solution is "entry guards": each Tor client selects a few relays at random >to use as entry points, and uses only those relays for their first hop. If those
relays are not controlled or observed, the attacker can't win, ever, and the user
is secure. If those relays are observed or controlled by the attacker, the >attacker sees a larger fraction of the user's traffic - but still the user is no
more profiled than before. Thus, the user has some chance (on the order of (n- >c)/n) of avoiding profiling, whereas they had none before.
You can read more at An Analysis of the Degradation of Anonymous Protocols, >Defending Anonymous Communication Against Passive Logging Attacks, and especially
Locating Hidden Servers.
Restricting your entry nodes may also help against attackers who want to run a >few Tor nodes and easily enumerate all of the Tor user IP addresses. (Even though
they can't learn what destinations the users are talking to, they still might be
able to do bad things with just a list of users.) However, that feature won't >really become useful until we move to a "directory guard" design as well.
Search Assist[end quoted "search assist"]
FUD stands for "fear, uncertainty, and doubt," which is a tactic used to >manipulate opinions by spreading negative or misleading information. It is >commonly seen in marketing, politics, and investing, particularly in the context
of stocks and cryptocurrency. Wikipedia bankrate.com
Definition of FUD
FUD stands for "Fear, Uncertainty, and Doubt." It is a tactic used to influence
opinions and perceptions by spreading negative or misleading information. >Usage in Different Contexts
Marketing and Sales
FUD is often employed in marketing to create doubt about competitors' products.
It can manipulate consumer behavior by instilling fear about potential risks
or shortcomings.
Public Policy
In public policy, FUD can manifest as "manufactured uncertainty," where doubts
are cast on scientific findings to create confusion.
This tactic is used to undermine trust in established research or regulations.
Financial Markets
In investing, particularly in stocks and cryptocurrencies, FUD refers to
negative sentiment that can lead to impulsive selling.
It often arises from rumors, negative news, or exaggerated claims about market
conditions.
Impact of FUD
FUD can lead to significant market volatility, as investors may react
emotionally to negative information.
It can create a cycle of panic selling, which may not reflect the actual value
of an asset.
Understanding FUD is crucial for navigating both consumer choices and investment
decisions, as it highlights the influence of emotions on market behavior. >ledger.com Wikipedia
Are you sure you trust VPN providers, Would it not be better to make your own VPN?
Anonymous User wrote:
In article <20250827.221421.0080eb00@mixmin.net> D wrote:
On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:Absolutely. Five has to be the new three.
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs >> > > > $12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >> > > their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes. >>
anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
and the torproject warns against using tor circuit lengths longer than three:
(using Tor Browser 14.5.6)
https://support.torproject.org/misc/misc-11/
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your
path that are sensitive. That is, in normal cases it's 3, but for example if
you're accessing an onion service or a ".exit" address it could be more. >> > > We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
They just fear the higher load. That's it.
Also, using paths longer than 3 could harm anonymity, first because it makes[end quote]
denial of security attacks easier, and second because it could act as an >> > > identifier if only a small number of users have the same path length as you.
There's no proof the circuit length can be identified at the exit.
More hops add longer latency which can be meassured.
But there's an immense risk to get three nodes run by a singleTell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
And then there comes NymVPN into play for 3-hop Tor users, so that
they don't have to use a Windows GUI app with multiple .exe files,
only a handful of people use.
Anonymous User wrote:How will you measure latency without getting hold of both ends?
There's no proof the circuit length can be identified at the exit.
More hops add longer latency which can be meassured.
Too stupid to do your math? Hint: It's an exponential function.But there's an immense risk to get three nodes run by a singleTell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
No need for name calling here. There comes a time when you need to pay for >>some services.
Nope.
Yes, we all use TOR but as you are aware of there are some things you just >>can't do on TOR!
Allow others to spy on you?
Stefan Claas wrote:
D wrote:
do what thou wilt, but i'd advise against using any more than three hops, >>> not only because omnimix and torproject seem to agree on that issue, but >>> also because anti-anonymous remailer/tor-mailer "chief evangelists" have >>> always advocated unsafe practices e.g. use more than 3 tor circuit nodes >>> (but these wall street shills are only doing their duty, it's their job)
What kind of liar are you? Danner, himself, introduced in his GUI app with >>a modified tor.exe more than 3 hops. I mentioned that as discussion here in >>a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.
The result would have been a simple NO by the Tor team no matter for
what reason. But haven't you yourself contacted them on this topic?
What exactly was their reasoning? Was it sound? Was there solid
evidence for the insecurity of longer circuits they postulate?
And you have always promoted OmniMix with a modified tor.exe, until I raised >>the issue!
Professional users, which do not use a GUI app like OmniMix with various .exe >>files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >>Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
Really?
Yes, we all use TOR but as you are aware of there are some things you just >>>can't do on TOR!
Allow others to spy on you?
So, you only need TOR and remailers? All I can take from that is that you're >a usenet newsgroup spammer.
Do you only use TOR for browsing and only use
remailers to contact family and friends etc???
If we say that something is free then you say we are the product
and if we say
something has to be paid for then you call us salesmen. Wake up man, this isn't
1994!
I suggest you eat this: https://www.youtube.com/watch?v=Z7AqBuc8Nrk
+1Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.
+1No need to use anything but remailers and Tor with circuits of 5+ nodes.
There comes a time when you need to pay for some services.The wet dream of all commercial VPN providers ... but NO!
On 28/08/2025 00:25:50 +0200 (CEST) Nomen Nescio wrote:
+1Claas is known as an ignorant Nym Corp salesman. As we already >>>demonstrated in this group their only goal is to make lots of money with >>>their snakeoil business ripping off clueless customers.
+1No need to use anything but remailers and Tor with circuits of 5+ nodes.