• Host Your Own VPN (WireGuard)

    From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Tue Aug 26 22:01:43 2025
    From Newsgroup: alt.privacy.anon-server

    Are you sure you trust VPN providers, Would it not be better to make your own VPN?

    https://www.youtube.com/watch?v=O2mxQSqvsaM


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Tue Aug 26 23:37:28 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:

    Are you sure you trust VPN providers, Would it not be better to make your own VPN?

    https://www.youtube.com/watch?v=O2mxQSqvsaM


    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    Regards
    Stefan
    --
    -----BEGIN ECCP256 SIGNATURE----- 54a2d5a47e8ae9a788ab22a288939c006af1c716cc61de48e32a09df874f1b30 9f5c637aea91898e522e381deb03591532028b1283a937f6727ecdc7e52edf21 0f7e9ca95aeea235019762363e0be3c9ef0e959f5a4117b7d2044eb7863c1f2b 8221c4b1a8fa78bb7cefbdd11ca123453fc0621445f6914ee3c24b822a5a30fc
    -----END ECCP256 SIGNATURE-----
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Wed Aug 27 01:26:49 2025
    From Newsgroup: alt.privacy.anon-server

    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...


    Is there any reason you prefer NYM over Mullvad?

    https://www.youtube.com/watch?v=dVtw-4Eox2E&t=64s

    https://www.youtube.com/watch?v=hPrMtIXUh1s&t=311s

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Wed Aug 27 13:25:18 2025
    From Newsgroup: alt.privacy.anon-server

    On 26 Aug 2025, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> posted some news:f867f694e22609682cc3633b99c13e8b@msgid.frell.theremailer.net:

    Are you sure you trust VPN providers, Would it not be better to make
    your own VPN?

    https://www.youtube.com/watch?v=O2mxQSqvsaM

    I do. I have two in fact. SoftEther VPN and MS VPN.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server on Wed Aug 27 15:47:35 2025
    From Newsgroup: alt.privacy.anon-server

    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    In wich country is NymVpn?
    Let's suppose that mister Trump want to know who posted a post
    against the Gaza genocide.
    If the servers are in USA Donald pick the phone and after a minute
    that people is deported at Guantanamo.




    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Wed Aug 27 15:52:52 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:
    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...


    Is there any reason you prefer NYM over Mullvad?

    Yes, I know the Nym team from the beginnin and they have
    a great community, where people build projects for the
    Nym Mixnet, which is pretty awesome, due to newest Mix
    technolgy used.

    Regards
    Stefan

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server on Wed Aug 27 16:01:11 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:
    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    In wich country is NymVpn?
    Let's suppose that mister Trump want to know who posted a post
    against the Gaza genocide.
    If the servers are in USA Donald pick the phone and after a minute
    that people is deported at Guantanamo.

    NymVPN has two modes. Fast mode uses WireGuard and you choose the
    entry and exit node from a list of many countries where these
    nodes are located.

    The second mode is anonymous mode, which uses the Nym Mixnet,
    where gateways and mix nodes are also located in different
    countries.

    https://nym.com/
    https://nym.com/mixnet

    Regards
    Stefan
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From El Kabong@Quickdraw@HannaBarbera.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Wed Aug 27 07:45:12 2025
    From Newsgroup: alt.privacy.anon-server

    On Tue, 26 Aug 2025 22:01:43 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:

    Are you sure you trust VPN providers

    https://news.bitcoin.com/vp-net-the-vpn-that-doesnt-ask-for-your-trust-it-makes-tracking-you-technically-impossible/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server on Wed Aug 27 18:16:50 2025
    From Newsgroup: alt.privacy.anon-server

    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:

    Fritz Wuehler wrote:
    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    In wich country is NymVpn?
    Let's suppose that mister Trump want to know who posted a post
    against the Gaza genocide.
    If the servers are in USA Donald pick the phone and after a minute
    that people is deported at Guantanamo.

    NymVPN has two modes. Fast mode uses WireGuard and you choose the
    entry and exit node from a list of many countries where these
    nodes are located.

    The second mode is anonymous mode, which uses the Nym Mixnet,
    where gateways and mix nodes are also located in different
    countries.

    https://nym.com/
    https://nym.com/mixnet

    Regards
    Stefan

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs
    $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server on Wed Aug 27 19:31:20 2025
    From Newsgroup: alt.privacy.anon-server

    Nomen Nescio wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:

    Fritz Wuehler wrote:
    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    In wich country is NymVpn?
    Let's suppose that mister Trump want to know who posted a post
    against the Gaza genocide.
    If the servers are in USA Donald pick the phone and after a minute
    that people is deported at Guantanamo.

    NymVPN has two modes. Fast mode uses WireGuard and you choose the
    entry and exit node from a list of many countries where these
    nodes are located.

    The second mode is anonymous mode, which uses the Nym Mixnet,
    where gateways and mix nodes are also located in different
    countries.

    https://nym.com/
    https://nym.com/mixnet

    Regards
    Stefan

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs
    $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.


    Why are you saying this? The Nym folks are pretty nice people and
    can be trusted. They are publicity known for many years, compared
    to other companies, where you do not know the folks behind a service.

    Regards
    Stefan
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server on Wed Aug 27 21:18:19 2025
    From Newsgroup: alt.privacy.anon-server

    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:

    Fritz Wuehler wrote:
    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    In wich country is NymVpn?
    Let's suppose that mister Trump want to know who posted a post
    against the Gaza genocide.
    If the servers are in USA Donald pick the phone and after a minute
    that people is deported at Guantanamo.

    NymVPN has two modes. Fast mode uses WireGuard and you choose the
    entry and exit node from a list of many countries where these
    nodes are located.

    The second mode is anonymous mode, which uses the Nym Mixnet,
    where gateways and mix nodes are also located in different
    countries.

    https://nym.com/
    https://nym.com/mixnet

    Regards
    Stefan

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs
    $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with
    their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From noreply@noreply@mixmin.net to alt.privacy.anon-server on Wed Aug 27 22:14:21 2025
    From Newsgroup: alt.privacy.anon-server

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs
    $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
    in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally, and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your >path that are sensitive. That is, in normal cases it's 3, but for example if >you're accessing an onion service or a ".exit" address it could be more.
    We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.
    Also, using paths longer than 3 could harm anonymity, first because it makes >denial of security attacks easier, and second because it could act as an >identifier if only a small number of users have the same path length as you. [end quote]

    that said, the torproject also warns against browser extensions, even though tails (https://tails.net) includes ublock origin (https://addons.mozilla.org) by default (ublock origin works so well probably everyone is using it by now anyway, so _not_ having ublock installed could be a red flag to big brother):

    https://forum.torproject.org/t/should-i-install-a-new-add-on-or-extension-in-tor-browser-like-adblock-plus-or-ublock-origin/718
    Should I install a new add-on or extension in Tor Browser, like AdBlock Plus or
    uBlock Origin?
    gus
    Community Team lead
    Nov 2021
    no add-ons such as Ublock, add-on antivirus etc.
    It's strongly discouraged to install new add-ons in Tor Browser, because they >can compromise your privacy and security. See this Support article: Should I >install a new add-on or extension in Tor Browser, like AdBlock Plus or uBlock >Origin? | Tor Project | Support
    Please read the Tor Browser Design document: 2.3 Philosophy No filters Site- specific or filter-based addons such as AdBlock Plus, Request Policy, Ghostery,
    Priv3, and Sharemenot are to be avoided. We believe that these addons do not add
    any real privacy to a proper implementation of the above pr...
    ...
    2.3 Philosophy
    No filters
    Site-specific or filter-based addons such as AdBlock Plus, Request Policy, Ghostery, Priv3, and Sharemenot are to be avoided. We believe that these addons
    do not add any real privacy to a proper implementation of the above privacy requirements, and that development efforts should be focused on general solutions
    that prevent tracking by all third parties, rather than a list of specific URLs
    or hosts.
    Implementing filter-based blocking directly into the browser, such as done with
    Firefox' Tracking Protection, does not alleviate the concerns mentioned in the
    previous paragraph. There is still just a list containing specific URLs and hosts
    which, in this case, are assembled by Disconnect and adapted by Mozilla. Trying to resort to filter methods based on machine learning does not solve the
    problem either: they donAt provide a general solution to the tracking problem as
    they are working probabilistically. Even with a precision rate at 99% and a false
    positive rate at 0.1% trackers would be missed and sites would be wrongly blocked.
    Filter-based solutions in general can also introduce strange breakage and cause
    usability nightmares. For instance, there is a trend to observe that websites start detecting filer extensions and block access to content on them. Coping with
    this fallout easily leads to just whitelisting the affected domains, hoping that
    this helps, defeating the purpose of the filter in the first place. Filters will
    also fail to do their job if an adversary simply registers a new domain or creates a new URL path. Worse still, the unique filter sets that each user creates or installs will provide a wealth of fingerprinting targets.
    As a general matter, we are also generally opposed to shipping an always-on Ad
    blocker with Tor Browser. We feel that this would damage our credibility in terms
    of demonstrating that we are providing privacy through a sound design alone, as
    well as damage the acceptance of Tor users by sites that support themselves through advertising revenue.
    Users are free to install these addons if they wish, but doing so is not recommended, as it will alter the browser request fingerprint.
    [end quote]

    and the omnimix tor (0.4.9.0-alpha-dev) allows circuit length from 2 to 9: omnimix > tor > cfg > circuit length > nodes > 3 .. quoting om's tool-tip:
    3<
    Number of nodes that make up a general purpose circuit.
    Longer chains may increase anonymity, but also make it
    more difficult and time-consuming to be built and used.
    Furthermore they may stress the Tor network excessively.
    !! So please be careful with the usage of this parameter !!!
    Default: 3

    do what thou wilt, but i'd advise against using any more than three hops,
    not only because omnimix and torproject seem to agree on that issue, but
    also because anti-anonymous remailer/tor-mailer "chief evangelists" have
    always advocated unsafe practices e.g. use more than 3 tor circuit nodes
    (but these wall street shills are only doing their duty, it's their job)

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 00:25:50 2025
    From Newsgroup: alt.privacy.anon-server

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for
    some services. I'm trying to decide between Mullvad VPN and NYM VPN.

    Yes, we all use TOR but as you are aware of there are some things you just can't do on TOR!

    NYM the worldrCOs most private VPN: https://nym.com/

    Mullvad VPN: Free the internet: https://mullvad.net/en

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server on Thu Aug 28 01:17:05 2025
    From Newsgroup: alt.privacy.anon-server

    D wrote:

    do what thou wilt, but i'd advise against using any more than three hops,
    not only because omnimix and torproject seem to agree on that issue, but
    also because anti-anonymous remailer/tor-mailer "chief evangelists" have always advocated unsafe practices e.g. use more than 3 tor circuit nodes
    (but these wall street shills are only doing their duty, it's their job)

    What kind of liar are you? Danner, himself, introduced in his GUI app with
    a modified tor.exe more than 3 hops. I mentioned that as discussion here in a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.

    And you have always promoted OmniMix with a modified tor.exe, until I raised the issue!

    Professional users, which do not use a GUI app like OmniMix with various .exe files, are using tools like Mini Mailer, either with the modern Nym Mixnet or Tor Network with three hops, or yamn-proxy on mobile devices with three-hops. --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 01:58:14 2025
    From Newsgroup: alt.privacy.anon-server

    Nomen Nescio wrote:
    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for some services. I'm trying to decide between Mullvad VPN and NYM VPN.

    This NymVPN information was just released today, which is pretty interesting.

    https://nym.com/blog/NymVPN-Roadmap-for-censorship-resistance-2025

    Regards
    Stefan
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 09:57:00 2025
    From Newsgroup: alt.privacy.anon-server

    Class wrote:

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for >some services.

    Nope.


    Yes, we all use TOR but as you are aware of there are some things you just >can't do on TOR!

    Allow others to spy on you?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 06:02:42 2025
    From Newsgroup: alt.privacy.anon-server

    In article <20250827.221421.0080eb00@mixmin.net> D wrote:

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs
    $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with
    their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes.

    Absolutely. Five has to be the new three.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally, and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your
    path that are sensitive. That is, in normal cases it's 3, but for example if >> you're accessing an onion service or a ".exit" address it could be more.
    We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.

    They just fear the higher load. That's it.

    Also, using paths longer than 3 could harm anonymity, first because it makes >> denial of security attacks easier, and second because it could act as an
    identifier if only a small number of users have the same path length as you.
    [end quote]

    There's no proof the circuit length can be identified at the exit.
    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server on Thu Aug 28 13:49:41 2025
    From Newsgroup: alt.privacy.anon-server

    Claas wrote:

    Professional users, which do not use a GUI app like OmniMix with various .exe >files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Take your meds! Nobody uses your shitty hacks.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server on Thu Aug 28 14:28:49 2025
    From Newsgroup: alt.privacy.anon-server

    Stefan Claas wrote:
    D wrote:

    do what thou wilt, but i'd advise against using any more than three hops,
    not only because omnimix and torproject seem to agree on that issue, but
    also because anti-anonymous remailer/tor-mailer "chief evangelists" have
    always advocated unsafe practices e.g. use more than 3 tor circuit nodes
    (but these wall street shills are only doing their duty, it's their job)

    What kind of liar are you? Danner, himself, introduced in his GUI app with
    a modified tor.exe more than 3 hops. I mentioned that as discussion here in >a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.

    The result would have been a simple NO by the Tor team no matter for
    what reason. But haven't you yourself contacted them on this topic?
    What exactly was their reasoning? Was it sound? Was there solid
    evidence for the insecurity of longer circuits they postulate?


    And you have always promoted OmniMix with a modified tor.exe, until I raised >the issue!

    Professional users, which do not use a GUI app like OmniMix with various .exe >files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Really?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server on Thu Aug 28 15:07:26 2025
    From Newsgroup: alt.privacy.anon-server

    Nomen Nescio wrote:
    Claas wrote:

    Professional users, which do not use a GUI app like OmniMix with various .exe
    files, are using tools like Mini Mailer, either with the modern Nym Mixnet or
    Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Take your meds! Nobody uses your shitty hacks.


    Idiot! I already made quite a bit of money with Mini Mailer.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server on Thu Aug 28 15:09:57 2025
    From Newsgroup: alt.privacy.anon-server

    Fritz Wuehler wrote:
    Stefan Claas wrote:
    D wrote:

    do what thou wilt, but i'd advise against using any more than three hops, not only because omnimix and torproject seem to agree on that issue, but also because anti-anonymous remailer/tor-mailer "chief evangelists" have always advocated unsafe practices e.g. use more than 3 tor circuit nodes (but these wall street shills are only doing their duty, it's their job)

    What kind of liar are you? Danner, himself, introduced in his GUI app with a modified tor.exe more than 3 hops. I mentioned that as discussion here in a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.

    The result would have been a simple NO by the Tor team no matter for
    what reason. But haven't you yourself contacted them on this topic?
    What exactly was their reasoning? Was it sound? Was there solid
    evidence for the insecurity of longer circuits they postulate?

    No I haven't. I only asked there once where in the source code the
    changes have to been made.

    And you have always promoted OmniMix with a modified tor.exe, until I raised
    the issue!

    Professional users, which do not use a GUI app like OmniMix with various .exe
    files, are using tools like Mini Mailer, either with the modern Nym Mixnet or
    Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Really?

    Yes, sure.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 15:16:38 2025
    From Newsgroup: alt.privacy.anon-server

    Anonymous User wrote:
    In article <20250827.221421.0080eb00@mixmin.net> D wrote:

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page deviously alleging a price of $2.59 monthly when usage really costs $12.99 a month is not to be trusted. Lying advertising is the sign of a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes.

    Absolutely. Five has to be the new three.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
    in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
    and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your
    path that are sensitive. That is, in normal cases it's 3, but for example if
    you're accessing an onion service or a ".exit" address it could be more. We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.

    They just fear the higher load. That's it.

    Also, using paths longer than 3 could harm anonymity, first because it makes
    denial of security attacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.
    [end quote]

    There's no proof the circuit length can be identified at the exit.

    More hops add longer latency which can be meassured.

    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    Tell us the math equation for that, compared to more hops, which a sophisticated nation state can add.

    And then there comes NymVPN into play for 3-hop Tor users, so that
    they don't have to use a Windows GUI app with multiple .exe files,
    only a handful of people use.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn Remailer@noreply@mixmin.net to alt.privacy.anon-server on Thu Aug 28 15:57:59 2025
    From Newsgroup: alt.privacy.anon-server

    Stefan Claas wrote:
    Nomen Nescio wrote:
    Claas wrote:

    Professional users, which do not use a GUI app like OmniMix with various .exe
    files, are using tools like Mini Mailer, either with the modern Nym Mixnet or
    Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Take your meds! Nobody uses your shitty hacks.


    Idiot! I already made quite a bit of money with Mini Mailer.

    His Nym Shit friends donated him a few cents. How sweet!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From noreply@noreply@mixmin.net to alt.privacy.anon-server on Thu Aug 28 16:08:00 2025
    From Newsgroup: alt.privacy.anon-server

    On Thu, 28 Aug 2025 06:02:42 -0400, Anonymous User <noreply@dirge.harmsk.com> wrote:
    snip
    There's no proof the circuit length can be identified at the exit.
    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.
    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!
    That's a simple calculation even the FUD spreaders here can't deny.

    just curious . . .

    (using Tor Browser 14.5.6)
    https://support.torproject.org/about/entry-guards/
    What are Entry Guards?
    Tor (like all current practical low-latency anonymity designs) fails when the >attacker can see both ends of the communications channel. For example, suppose >the attacker controls or watches the Tor relay you choose to enter the network,
    and also controls or watches the website you visit. In this case, the research >community knows no practical low-latency design that can reliably stop the >attacker from correlating volume and timing information on the two sides.
    So, what should we do? Suppose the attacker controls, or can observe, C relays.
    Suppose there are N relays total. If you select new entry and exit relays each >time you use the network, the attacker will be able to correlate all traffic you
    send with probability around (c/n)^2. But profiling is, for most users, as bad as
    being traced all the time: they want to do something often without an attacker >noticing, and the attacker noticing once is as bad as the attacker noticing more
    often. Thus, choosing many random entries and exits gives the user no chance of
    escaping profiling by this kind of attacker.
    The solution is "entry guards": each Tor client selects a few relays at random >to use as entry points, and uses only those relays for their first hop. If those
    relays are not controlled or observed, the attacker can't win, ever, and the user
    is secure. If those relays are observed or controlled by the attacker, the >attacker sees a larger fraction of the user's traffic - but still the user is no
    more profiled than before. Thus, the user has some chance (on the order of (n- >c)/n) of avoiding profiling, whereas they had none before.
    You can read more at An Analysis of the Degradation of Anonymous Protocols, >Defending Anonymous Communication Against Passive Logging Attacks, and especially
    Locating Hidden Servers.
    Restricting your entry nodes may also help against attackers who want to run a >few Tor nodes and easily enumerate all of the Tor user IP addresses. (Even though
    they can't learn what destinations the users are talking to, they still might be
    able to do bad things with just a list of users.) However, that feature won't >really become useful until we move to a "directory guard" design as well.
    [end quote]

    recommend using omnimix with random anonymous remailer chains (e.g. *,*,*,*,*), as explained in the omnimix tutorial (https://www.danner-net.de/omom/index.htm)

    also recommend not cross-posting . . . any commas "," in the newsgroups header, this newsgroup, news:alt.privacy.anon-server is about anonymous remailers, and all issues related to them, e.g. how to use tor with anonymous remailers . . .

    but "fud"? exactly how do these corporate evangelists define their fud acronym:

    (using Tor Browser 14.5.6) https://duckduckgo.com/?q=fud+meaning&ia=web&assist=true
    Search Assist
    FUD stands for "fear, uncertainty, and doubt," which is a tactic used to >manipulate opinions by spreading negative or misleading information. It is >commonly seen in marketing, politics, and investing, particularly in the context
    of stocks and cryptocurrency. Wikipedia bankrate.com
    Definition of FUD
    FUD stands for "Fear, Uncertainty, and Doubt." It is a tactic used to influence
    opinions and perceptions by spreading negative or misleading information. >Usage in Different Contexts
    Marketing and Sales
    FUD is often employed in marketing to create doubt about competitors' products.
    It can manipulate consumer behavior by instilling fear about potential risks
    or shortcomings.
    Public Policy
    In public policy, FUD can manifest as "manufactured uncertainty," where doubts
    are cast on scientific findings to create confusion.
    This tactic is used to undermine trust in established research or regulations.
    Financial Markets
    In investing, particularly in stocks and cryptocurrencies, FUD refers to
    negative sentiment that can lead to impulsive selling.
    It often arises from rumors, negative news, or exaggerated claims about market
    conditions.
    Impact of FUD
    FUD can lead to significant market volatility, as investors may react
    emotionally to negative information.
    It can create a cycle of panic selling, which may not reflect the actual value
    of an asset.
    Understanding FUD is crucial for navigating both consumer choices and investment
    decisions, as it highlights the influence of emotions on market behavior. >ledger.com Wikipedia
    [end quoted "search assist"]

    clearly, they're on a mission from god, they themselves are god, or god sent them

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Mr. Man-wai Chang@toylet.toylet@gmail.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 23:55:56 2025
    From Newsgroup: alt.privacy.anon-server

    On 27/8/2025 4:01 am, Fritz Wuehler wrote:
    Are you sure you trust VPN providers, Would it not be better to make your own VPN?


    What did you mean by "make your own VPN"? You are still using someone's
    VPN software.
    --
    @~@ Simplicity is Beauty! Remain silent! Drink, Blink, Stretch!
    / v \ May the Force and farces be with you! Live long and prosper!!
    /( _ )\ https://sites.google.com/site/changmw/
    ^ ^ https://github.com/changmw/changmw
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn3 Remailer@noreply@mixmin.net to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 17:23:03 2025
    From Newsgroup: alt.privacy.anon-server

    Stefan Claas wrote:
    Anonymous User wrote:
    In article <20250827.221421.0080eb00@mixmin.net> D wrote:

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs >> > > > $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >> > > their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes. >>
    Absolutely. Five has to be the new three.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
    in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
    and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your
    path that are sensitive. That is, in normal cases it's 3, but for example if
    you're accessing an onion service or a ".exit" address it could be more. >> > > We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.

    They just fear the higher load. That's it.

    Also, using paths longer than 3 could harm anonymity, first because it makes
    denial of security attacks easier, and second because it could act as an >> > > identifier if only a small number of users have the same path length as you.
    [end quote]

    There's no proof the circuit length can be identified at the exit.

    More hops add longer latency which can be meassured.

    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    Tell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.

    You know about <https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-relay-activities-part-ii-85c80875c5df>?
    A quarter of exit nodes infiltrated and compromized by one entity!

    With a quarter of all nodes compromized every 64th circuit is a win for
    the attacker. And now think of the number of connections you make every
    day. With 6 hops you raise the stakes from 64 to 4096, and with only 10
    percent of the nodes, just about 700 of them, compromized from 1000 to a million. That makes a big difference. You must be stupid to ignore that.


    And then there comes NymVPN into play for 3-hop Tor users, so that
    they don't have to use a Windows GUI app with multiple .exe files,
    only a handful of people use.

    VPNs with everything in one hand right from the start? Are you nuts?

    I run my OmniMix and TorBrowser with no less than 6-node circuits. And I
    doubt any expert in this field with more than a handful of brain cells
    between his ears takes the risk to rely on standard 3-hop Tor circuits.

    Just don't!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 19:14:38 2025
    From Newsgroup: alt.privacy.anon-server

    Claas wrote:
    Anonymous User wrote:

    There's no proof the circuit length can be identified at the exit.

    More hops add longer latency which can be meassured.
    How will you measure latency without getting hold of both ends?
    And you've no idea how latency varies tremendously dependent on
    factors like routing and computer processing power.


    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    Tell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.
    Too stupid to do your math? Hint: It's an exponential function.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 19:28:22 2025
    From Newsgroup: alt.privacy.anon-server

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for >>some services.

    Nope.


    Yes, we all use TOR but as you are aware of there are some things you just >>can't do on TOR!

    Allow others to spy on you?

    So, you only need TOR and remailers? All I can take from that is that you're
    a usenet newsgroup spammer. Do you only use TOR for browsing and only use remailers to contact family and friends etc???

    If we say that something is free then you say we are the product and if we say something has to be paid for then you call us salesmen. Wake up man, this isn't 1994!

    I suggest you eat this: https://www.youtube.com/watch?v=Z7AqBuc8Nrk


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy.anon-server on Thu Aug 28 23:15:05 2025
    From Newsgroup: alt.privacy.anon-server

    I guess that no one in here knows about bridges.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@remailer.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 23:29:27 2025
    From Newsgroup: alt.privacy.anon-server

    On Thu, 28 Aug 2025 14:28:49 +0200, Fritz Wuehler wrote:
    Stefan Claas wrote:
    D wrote:

    do what thou wilt, but i'd advise against using any more than three hops, >>> not only because omnimix and torproject seem to agree on that issue, but >>> also because anti-anonymous remailer/tor-mailer "chief evangelists" have >>> always advocated unsafe practices e.g. use more than 3 tor circuit nodes >>> (but these wall street shills are only doing their duty, it's their job)

    What kind of liar are you? Danner, himself, introduced in his GUI app with >>a modified tor.exe more than 3 hops. I mentioned that as discussion here in >>a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.

    The result would have been a simple NO by the Tor team no matter for
    what reason. But haven't you yourself contacted them on this topic?
    What exactly was their reasoning? Was it sound? Was there solid
    evidence for the insecurity of longer circuits they postulate?

    There is no evidence. It's all about not stressing the network.
    IOW, don't put strain on the Tor network, as due to the inherence
    of further unfixable weaknesses it isn't worth it to remedy that
    single all-in-one-hand risk.



    And you have always promoted OmniMix with a modified tor.exe, until I raised >>the issue!

    Professional users, which do not use a GUI app like OmniMix with various .exe >>files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >>Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Really?

    Nope. He's joking.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Fri Aug 29 00:12:05 2025
    From Newsgroup: alt.privacy.anon-server

    Class wrote:

    Yes, we all use TOR but as you are aware of there are some things you just >>>can't do on TOR!

    Allow others to spy on you?

    So, you only need TOR and remailers? All I can take from that is that you're >a usenet newsgroup spammer.

    Everyone who doesn't praise your BS hacks is a spammer, we know. Well, actually it's you who continuously spams us with commercial Tuta and Nym nonsense.

    Do you only use TOR for browsing and only use
    remailers to contact family and friends etc???

    I use free software with source code access as well as free networks and services wherever possible. And no, I'm not using Tor for banking transactions, Internet shopping or other individual stuff.


    If we say that something is free then you say we are the product

    No way, that's not my opinion. Where are we the product with these
    tools I frequently use:

    GnuPG / Kleopatra, Tor / Browser, Firefox, OmniMix, Thunderbird, Gajim,
    Libre Office, VLC, DarkTable, Gimp, IrfanView, Linux (Debian, Mint,
    Ubuntu), LineageOS, F-Droid Apps like Conversations, OSMand

    just to name a few.

    And where am I the product while using the Tor network to access XMPP
    servers, the Mixmaster or YAMN remailer network, a nymserver, or join
    the Mastodon network anonymously?

    You're so clueless!

    Get a job. Your shameful appearances here won't make you rich.

    and if we say
    something has to be paid for then you call us salesmen. Wake up man, this isn't
    1994!

    1994? Golly gosh! You're a left-behind of your own Me-Too movement.


    I suggest you eat this: https://www.youtube.com/watch?v=Z7AqBuc8Nrk

    90 minutes of blathering with trivial information that can be told in
    less than 3 minutes. They're obviously paid per minute.

    <https://youtu.be/Z7AqBuc8Nrk?t=2599>

    | Tor is really, is such an interesting tool, because there are different
    | trade-offs, right, ahm. If I am using the Internet, I, first of all the
    | exit node is not encrypted, right, it's always unencrypted. And so I
    | don't have the same guarantees as perhaps like a VPN that is encrypting
    | that tunnel all the way through.

    What??? She's all at sea here, a blank slate that has absolutely no
    idea! That's tabloid journalism, yello press, just enough to impress inexperienced viewers like you, but a waste of time for the rest of us.

    Finally, Claas, the next time we expect a Refereeces header. Got it?
    BTW, with OmniMix assisting your newsreader that wouldn't have happened.
    We can help you install and use it. It's so easy. Just give it a try!

    I suggest you start here: <https://www.danner-net.de/om.htm>

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@remailer.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Fri Aug 29 01:09:27 2025
    From Newsgroup: alt.privacy.anon-server

    On 28/08/2025 00:25:50 +0200 (CEST) Nomen Nescio wrote:

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.
    +1

    No need to use anything but remailers and Tor with circuits of 5+ nodes.
    +1

    There comes a time when you need to pay for some services.
    The wet dream of all commercial VPN providers ... but NO!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From shaw@shaw@placer.com to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Fri Aug 29 15:49:36 2025
    From Newsgroup: alt.privacy.anon-server

    On Fri, 29 Aug 2025 01:09:27 +0000 (UTC), Anonymous <nobody@remailer.paranoici.org> wrote:

    On 28/08/2025 00:25:50 +0200 (CEST) Nomen Nescio wrote:

    Claas is known as an ignorant Nym Corp salesman. As we already >>>demonstrated in this group their only goal is to make lots of money with >>>their snakeoil business ripping off clueless customers.
    +1

    No need to use anything but remailers and Tor with circuits of 5+ nodes.
    +1


    The Authors or Tor disagree with the notion of using more than 3 nodes.
    -----
    https://support.torproject.org/misc/misc-11/

    Can I change the number of hops Tor uses?

    Right now the path length is hard-coded at 3 plus the number of nodes in
    your path that are sensitive. That is, in normal cases it's 3, but for
    example if you're accessing an onion service or a ".exit" address it
    could be more.

    We don't want to encourage people to use paths longer than this as it
    increases load on the network without (as far as we can tell) providing
    any more security. Also, using paths longer than 3 could harm anonymity,
    first because it makes denial of security attacks easier, and second
    because it could act as an identifier if only a small number of users
    have the same path length as you.
    --- Synchronet 3.21a-Linux NewsLink 1.2