From Newsgroup: alt.privacy.anon-server
In article <
2oz0rf2yb5yhjsbe888kp@oc2mx.net>
Nym Mailer <
noreply@oc2mx.net> wrote:
Fritz Wuehler in alt.privacy.anon-server:
On Wed, 07 Jan 2026 14:17:53 +0000, you wrote:
Fritz Wuehler in alt.privacy.anon-server:
This post template =
Fcc: alt.privacy.anon-server
Host: dizum
From: anonymous@anonymous.com
Chain: dizum,*,*,frell; copies=3;
To: mail2news@dizum.com, mail2news@neodome.net
Newsgroups: alt.privacy.anon-server
Subject:
Nym Mailer is 1000 times better than QSL, crybaby!
Nobody has yet hacked a QSL poster's id or ip.
Who except you Super-Anti-Social Paranoids gives a bleep about the
other 999 ways your unproven Nym Nonsense is better?
Notice the word "unproven"? QSL HAS been proven over the years.
What you fail to understand or better said not know, Nym is a proven technology, with academic research over the years and is audited by
different companies. George Danezis (Mixminion) [1] was, or still is,
an advisor.
As Schneier pointed out, some software author can use AES or PGP in
his software, but that doesn't mean that poor code writing doesn't
prevent holes in itself which can still give away a user's ip and
id.. The most single point which personifies a programs reliability
is time used without failure.
I ain't arguing about Mix-Whatever, I'm arguing about the new crap Steffasshole and Gabby Mouth are professing to be secure. Only TIME
will show them to be right or wrong.
The average usenet user doesn't have a clue as to understanding all
that technical crap about how to install those pieces of complicated
crapware. Any user can install QSL without problem. Used along with
Tor, QSL over the years has been proven to be safe by Time itself.
Your new tekkie crapware has so far been proven only with your mouths.
You can be happy that your IP address was probably not yet discovered
when using QSL with Tor. But this will change in 2026 due to advancements with AI surveillance. Users themselves can test this already, if they know how to do that, to see what an ISP can see when you send always fixed
size remailer packets through the Tor Network. An ISP, if they are doing
so, can with hundert percent certainty say that you are using QSL+Tor!
[1] https://en.wikipedia.org/wiki/George_Danezis
The above mess of verbiage shows - admits - that QSL/Tor is safe.
The rest of the garbage is not proof of anything except a big maybe
that someone using AI in the future will break QSS/Tor - MAYBE.
--- Synchronet 3.21a-Linux NewsLink 1.2