• =?UTF-8?b?TnltVlBOJ3MgcG9zdC1xdWFudHVtIHVwZ3JhZGUgaXMgaGVyZSDigJQgQ29t?= =?UTF-8?b?bXVuaXR5IGNhbGwgIzI2MTQ=?=

    From Hermes@noreply@oc2mx.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Thu Apr 23 13:31:52 2026
    From Newsgroup: alt.privacy.anon-server

    https://www.youtube.com/watch?v=CbRWANQdQlg

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Triple-K@triple-k@mart.org to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Sat Apr 25 06:01:23 2026
    From Newsgroup: alt.privacy.anon-server

    Hermes <noreply@oc2mx.net> posted:

    https://www.youtube.com/watch?v=CbRWANQdQlg

    Subject repaired free of charge, courtesy of YAMN_Remailer_Client_v0.4.05_[build_1322] and
    OmniMix.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Hermes@noreply@oc2mx.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Sun Apr 26 11:35:31 2026
    From Newsgroup: alt.privacy.anon-server

    Triple-K wrote:
    Hermes <noreply@oc2mx.net> posted:

    https://www.youtube.com/watch?v=CbRWANQdQlg

    Subject repaired free of charge, courtesy of YAMN_Remailer_Client_v0.4.05_[build_1322] and
    OmniMix.

    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    It's time (comming hopefully soon) to release
    project Zeus. EfUCEfyeEfyyrYnN+AEfA-EfaiEfaiEfo|N+ArCiEfye

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From SEC3@admin@sec3.net to alt.privacy.anon-server on Sun Apr 26 12:12:31 2026
    From Newsgroup: alt.privacy.anon-server

    On 4/26/26 07:35, Hermes wrote:

    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    It's time (comming hopefully soon) to release
    project Zeus. EfUCEfyeEfyyrYnN+AEfA-EfaiEfaiEfo|N+ArCiEfye


    What is the "insecurity" in Zax's YAMN program?
    I've asked this before but I never receive a helpful answer.

    It doesn't safely do what it was designed to do?
    Or it doesn't do what you want it to do?
    --
    SEC3

    My PGP key:
    <https://keys.openpgp.org/vks/v1/by-keyid/C94D423355A83863>
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Hermes@noreply@oc2mx.net to alt.privacy.anon-server on Sun Apr 26 17:33:17 2026
    From Newsgroup: alt.privacy.anon-server

    SEC3 wrote:
    On 4/26/26 07:35, Hermes wrote:

    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    It's time (comming hopefully soon) to release
    project Zeus. EfUCEfyeEfyyrYnN+AEfA-EfaiEfaiEfo|N+ArCiEfye


    What is the "insecurity" in Zax's YAMN program?
    I've asked this before but I never receive a helpful answer.

    It doesn't safely do what it was designed to do?
    Or it doesn't do what you want it to do?


    Hi sec3,

    YAMN has a couple of design flaws, because Zax copied
    a 30 years old Mixmaster design and added only modern
    crypto algorithm.

    I outlined the client flaw in an GitHub issue in frell
    admin's repository a while ago.

    https://github.com/lampeh/yamn/issues

    The remailer part is not on par with modern standards
    IMHO, if you compare it to Onion Courier mix nodes.

    You can compere this by yourself, since you run a YAMN
    middleman and simply try out the Onion Courier mix node.

    https://github.com/Ch1ffr3punk/oc

    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.

    Best regards
    Stefan

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy.anon-server on Sun May 3 16:26:57 2026
    From Newsgroup: alt.privacy.anon-server

    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    It's time (comming hopefully soon) to release
    project Zeus. ???rYnN+A????N+ArCi?


    What is the "insecurity" in Zax's YAMN program?
    I've asked this before but I never receive a helpful answer.

    It doesn't safely do what it was designed to do?
    Or it doesn't do what you want it to do?

    Hi sec3,
    YAMN has a couple of design flaws, because Zax copied
    a 30 years old Mixmaster design and added only modern
    crypto algorithm.
    I outlined the client flaw in an GitHub issue in frell
    admin's repository a while ago.
    https://github.com/lampeh/yamn/issues
    The remailer part is not on par with modern standards
    IMHO, if you compare it to Onion Courier mix nodes.
    You can compere this by yourself, since you run a YAMN
    middleman and simply try out the Onion Courier mix node. https://github.com/Ch1ffr3punk/oc
    404?
    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.
    Best regards
    Stefan
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Hermes@noreply@oc2mx.net to alt.privacy.anon-server on Sun May 3 16:28:13 2026
    From Newsgroup: alt.privacy.anon-server

    Yamn2 Remailer wrote:
    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    It's time (comming hopefully soon) to release
    project Zeus. ???rYnN+A????N+ArCi?


    What is the "insecurity" in Zax's YAMN program?
    I've asked this before but I never receive a helpful answer.

    It doesn't safely do what it was designed to do?
    Or it doesn't do what you want it to do?


    Hi sec3,

    YAMN has a couple of design flaws, because Zax copied
    a 30 years old Mixmaster design and added only modern
    crypto algorithm.

    I outlined the client flaw in an GitHub issue in frell
    admin's repository a while ago.

    https://github.com/lampeh/yamn/issues

    The remailer part is not on par with modern standards
    IMHO, if you compare it to Onion Courier mix nodes.

    You can compere this by yourself, since you run a YAMN
    middleman and simply try out the Onion Courier mix node.

    https://github.com/Ch1ffr3punk/oc

    404?

    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.

    I announced recently here that I no longer support Tor and
    it's community and that I will integrate Onion Courier in
    the Nym ecosystem, but here is the README for you:

    # Onion Courier Tor Hidden Service Mixnet

    Onion Courier is a production-ready anonymous communication system that implements a **mixnet architecture over Tor hidden services**. It provides strong anonymity guarantees against both local and global adversaries through **cryptographic layered encryption**, **traffic analysis protection**, and **systematic cover traffic integration**.

    ---

    ## Features

    - **Strong Anonymity Guarantees**: Protection against both local and global adversaries
    - **Mixnet Architecture**: Decentralized network routing through multiple intermediary nodes
    - **Forward Secrecy**: Automatic key rotation every 12 hours for pool encryption
    - **Cover Traffic Integration**: Systematic dummy message generation to obscure communication patterns
    - **Timing Attack Protection**: Randomized delays and constant-time cryptographic operations
    - **Replay Protection**: Cache-based message ID tracking with automatic expiration
    - **Tor Integration**: Operates exclusively over Tor hidden services for enhanced privacy
    - **Batch Processing**: Message batching with shuffling for traffic analysis resistance
    - **Fixed-Size Messages**: All messages 32KB in RAM to prevent size correlation attacks
    - **Encrypted Message IDs**: No metadata leakage in message identifiers

    ---

    ## Technical Architecture

    ### System Design

    Onion Courier operates as a decentralized mix network where messages are routed through multiple intermediary nodes called **mix nodes** before reaching their final destination. The system follows the classic mixnet paradigm first proposed by [**David Chaum**](https://en.wikipedia.org/wiki/David_Chaum), where each mix node sequentially peels off one layer of encryption, providing **unlinkability** between incoming and outgoing messages.

    ### Core Components

    - **Mixnode Server**: Go-based concurrent server implementation with forward secrecy
    - **Command-Line Client**: POSIX-compliant command-line interface
    - **Cover Traffic Daemon**: Automated dummy message generation system
    - **Endpoint Server**: For receiving messages from the Mixnet or directly with ocsend-client

    ---

    ## Cryptographic Implementation

    ### Asymmetric Encryption

    - **NaCl Box**: Curve25519 for key exchange, XSalsa20 for encryption, and Poly1305 for authentication
    - **Key Management**: Persistent X25519 key pairs for mixnodes
    - **Private Key Storage**: 32-byte keys stored in PEM format at `private.pem` with filesystem hardening
    - **Public Key Distribution**: 32-byte public keys distributed through `pubring.txt` public key registry

    ### Symmetric Encryption & Forward Secrecy

    - **ChaCha20-Poly1305**: For internal message storage within mixnode pools with forward secrecy
    - **Automatic Key Rotation**: Pool encryption keys rotated every 12 hours
    - **Dual-Key Support**: Support for both current and next keys during transition periods
    - **Nonce Generation**: 12-byte cryptographically random nonces for each encryption
    - **Authentication**: 16-byte Poly1305 authentication tags ensuring message integrity

    ---

    ## Message Protocol

    ### Layered Encryption Structure

    Client raA [Encryption Layer N] raA Mixnode 1 (Batch Processing + Pool + Delay) raA [Encryption Layer N-1] raA ... raA Final Recipient

    **Important**: All messages (including final recipients) go through the mixnet pool with randomized delays and batch processing.

    Each encryption layer contains:

    - **Routing Header**: `To: <next_hop_address>` specification (except outermost layer)
    - **Encrypted Payload**: Next layer's complete encrypted message
    - **Adaptive Client Padding**: Applied to plaintext layer for traffic analysis protection

    ### Binary Message Format

    The outermost layer transmitted to the first mix node follows this exact binary structure:

    [32 bytes - Client ephemeral public key]
    [24 bytes - Encryption nonce]
    [N bytes - NaCl Box ciphertext with routing header and encrypted payload]

    ---

    ## Advanced Security Features

    ### Batch Processing & Shuffling
    - **Batch Size**: 5-15 messages per batch for optimal anonymity
    - **Shuffling**: Cryptographically secure Fisher-Yates shuffle of batch messages
    - **Anonymity Set**: Up to 1.3 trillion possible message combinations per batch (15! permutations)
    - **Timeout**: 3-minute maximum batch formation time

    ### Fixed-Size Message Protection
    - **All Pool Messages**: Exactly 32KB with cryptographically secure random padding
    - **RAM Analysis Protection**: Prevents message size correlation in memory
    - **Length Prefixing**: Original message length stored for accurate padding removal

    ### Encrypted Message Identifiers
    - **Message IDs**: Generated and encrypted within message payload
    - **No Metadata Leakage**: External observers cannot correlate message IDs with content
    - **Replay Protection**: Separate external ID for replay cache using encrypted content hash

    ### Enhanced Timing Protection
    - **Per-Message Delays**: 5-20 minute cryptographically secure random delays
    - **Batch Timeouts**: 3-minute maximum wait for batch formation
    - **Constant-Time Operations**: All cryptographic operations execute in constant time

    ---

    ## Technical Specifications

    ### Message Size Parameters

    | Parameter | Value | |---------------------------|------------------------------|
    | Maximum User Payload | 20,480 bytes (20 KB) |
    | Maximum Total Message Size| 28,672 bytes (28 KB) |
    | Pool Message Storage Size | 32,768 bytes (32 KB) fixed |
    | Fixed Padding Size In Pool| 32,768 bytes (32 KB) |
    | Encryption Overhead | 56 bytes per layer |
    | Number Of Hops Per Chain | 1-5 |

    ### Mixnode Operational Parameters

    - **Maximum Pool Capacity**: 400 messages
    - **Minimum Delivery Delay**: 5 minutes (300 seconds)
    - **Maximum Delivery Delay**: 20 minutes (1,200 seconds)
    - **Batch Processing**: 5-15 messages with 3-minute timeout
    - **Key Rotation Interval**: 12 hours for forward secrecy
    - **Replay Cache Expiration**: 30 minutes with 5-minute cleanup
    - **Rate Limiting**: 30 requests per 30 seconds per IP

    ---

    ## Quick Start

    ### Prerequisites

    - Go programming language (1.16+)
    - Mix Server: Tor Hidden Service running on `localhost:8080`
    - Endpoint Server: Tor Hidden Service running on `localhost:8088`
    - Mix Client: Tor running on `localhost:9050`

    ## Compiling ocmix-server
    In line 1154 of the source code replace the .onion address with your own
    and remember that the server must use port 8080, in order to function properly, with public or anonymous Onion Courier Mixnets.
    $ go build -ldflags "-s -w"

    ## Generate key pair
    $ ./ocmix-server -g
    Key pair generated: public.pem and private.pem

    ## Start mix node server
    $ ./ocmix-server -s private.pem
    2025/10/04 11:34:55 Efoa Onion Courier mix node running EfUC
    Press CTRL-Z
    Type 'bg'
    Type 'logout'

    ## Download configuration (keys and mix nodes)
    $ ./ocmix-client -i
    Downloading config files via Tor...
    Config directory: oc
    rLo Mixnodes file created: oc/mixnodes.txt
    rLo Pubkeys file created: oc/pubring.txt
    Configuration updated successfully!

    ## Create your message for an endpoint server

    To: vztrzrdafvnjegctrltkv6azyrjqawqmrwnhe7kvaqnj5vvnwhoiq7id.onion:8088

    Hello World!

    Regards
    Bob

    or

    To: ugf7olo27n5nq2jr6yoai2j5jo24ogx6yemjaozsgxg3byfpcpwdg7id.onion:8088

    Subject: Test
    Newsgroups: alt.test.test

    Hello World!

    Regards
    Bob

    When using an email or Usenet gateway and you like to insert UTF-8
    characters in your From: and Subject: header I recommend using [mbe](https://github.com/Ch1ffr3punk/mbe).

    ## Send through 2-5 random nodes
    $ ./ocmix-client -r < msg.txt

    ## Send through specific nodes
    $ ./ocmix-client node1,node2,node3 < msg.txt

    ## Send cover traffic
    $ ./ocmix-client -c

    ## Ping mix nodes to see their status
    $ ./ocmix-client -p
    ```
    Checking mix node status via Tor...

    bob OK
    hal OK
    len OK
    ulf OK
    wau OK
    ```

    If you are a respected member of a privacy community and would
    like your public mix node been listed, just mail me the public key
    and mix node address along with the nickname of your mix node to: stefanDOTclaasATmailDOTru

    ## Start endpoint server
    $ ./ochome-server -p inbox

    If you plan to run ochome-server on a remote server, I suggest using [oget](https://github.com/Ch1ffr3punk/oget), to download messages.

    ## Send files directly to an endpoint server
    $ ./ocsend-client address:port < file

    ## Security Features
    **Forward Secrecy**
    **Automatic Key Rotation:** Pool encryption keys rotated every 12 hours

    **Dual-Key Support:** Support for current + next key during transition periods

    **ChaCha20-Poly1305:** For pool message encryption with forward secrecy

    **Replay Protection:**
    Cache-based: Uses in-memory cache with automatic cleanup

    **30-minute Expiration:** Message IDs automatically deleted after 30 minutes

    **Automatic Cleanup:** Removes expired entries every 5 minutes

    **Timing Attack Protection:**
    Randomized Delays: 5-20 minute random delays per hop using cryptographic RNG

    **Constant-Time Processing:** All cryptographic operations in constant time

    **Timing Obfuscation:** Cryptographically secure random delays for responses

    **Batch Processing:** Message batching with shuffling breaks timing correlations

    **Advanced Anonymity Features:**
    **Batch Processing:** 5-15 messages per batch with secure shuffling

    **Fixed-Size Messages:** All pool messages exactly 32KB to prevent RAM analysis

    **Encrypted Message IDs:** No metadata leakage in message identifiers

    **Traffic Analysis Resistance:** Batch shuffling creates 1.3 trillion possible combinations

    **Size Correlation Protection:** Fixed padding prevents message size tracking

    ## Anonymity Guarantees
    **Sender Anonymity:** Hidden among multiple legitimate users and cover traffic sources

    **Receiver Anonymity:** Final destination concealed through multiple routing hops

    **Relationship Anonymity:** Computational difficulty correlating message senders and receivers

    **Temporal Anonymity:** Randomized delays prevent timing-based correlation attacks

    **Global Adversary Protection:** Mixnet architecture protects against network-wide surveillance

    **Traffic Analysis Resistance:** Batch processing and shuffling break message correlations

    ## Attack Resistance
    **Traffic Analysis Resistance:** Batch processing, shuffling, and adaptive padding

    **Timing Attack Mitigation:** Randomized delays and batch timeouts

    **Partial Node Compromise:** Forward secrecy protects older messages

    **Size Correlation Protection:** Fixed 32KB messages prevent RAM analysis

    **Replay Attack Prevention:** Cache-based message ID tracking

    **Network Analysis:** Tor hidden services + mixnet provide layered protection

    **RAM Analysis Protection:** All messages identical 32KB size in memory

    **Metadata Protection:** Encrypted message IDs prevent correlation attacks

    ## Network Protocol - HTTP API Endpoints
    Mixnodes
    Port: 8080

    Endpoint: POST /upload

    Response: Always "OK" with random timing

    Final Recipients
    Port: 8088 (or other service port)

    Format: Accepts raw POST data

    Response: Always "OK" for consistent responses

    Message Flow
    All messages go through enhanced mixnet processing:

    Client raA Mixnode 1 (Batch Processing + Pool + 5-20min Delay) raA Mixnode 2 (Batch Processing + Pool + 5-20min Delay) raA Final Recipient

    Pool Management
    **Batch Processing:** 5-15 messages with 3-minute timeout and secure shuffling

    **Individual Scheduling:** Each message has individual random delay after batch processing

    **Fixed-Size Storage:** All messages stored as exactly 32KB in pool

    **Secure Randomization:** Cryptographically secure random selection and shuffling

    ## Threat Model
    ### Protected Against
    **Traffic Analysis:** Through batch processing, shuffling, and adaptive padding
    **Timing Attacks:** Through randomized delays and batch timeouts
    **Replay Attacks:** Through message-ID cache with expiration
    **Node Compromise:** Forward secrecy protects older messages
    **Size Correlation:** Fixed 32KB messages prevent RAM analysis
    **Partial Network Observation:** Mixnet architecture provides unlinkability **Global Adversary:** Multi-hop routing breaks end-to-end correlation **Metadata Analysis:** Encrypted message IDs prevent correlation
    **RAM Analysis:** Fixed-size messages prevent memory analysis

    ### Security Assumptions
    Tor Hidden Services provide sufficient network-level anonymity
    At least one mix node in the path is trustworthy
    Cryptographic primitives (Curve25519, ChaCha20, Poly1305) are secure Operating system provides secure random number generation

    ## Dependencies
    memguard: Secure memory handling for cryptographic key protection golang.org/x/crypto/nacl/box: Standardized NaCl Box implementation golang.org/x/crypto/chacha20poly1305: Standardized ChaCha20+Poly1305 golang.org/x/net/proxy: SOCKS5 proxy support for Tor integration patrickmn/go-cache: In-memory cache for replay protection


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Yamn Remailer@noreply@mixmin.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Tue May 12 14:25:14 2026
    From Newsgroup: alt.privacy.anon-server

    Hermes wrote:

    Triple-K wrote:
    Hermes <noreply@oc2mx.net> posted:

    https://www.youtube.com/watch?v=CbRWANQdQlg

    Subject repaired free of charge, courtesy of
    YAMN_Remailer_Client_v0.4.05_build_1322 and
    OmniMix.

    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    The inwtx client is so simple it's almost impossible
    to be insecure. Try to discourage the users again.

    It's time (comming hopefully soon) to release
    project Zeus. |#+++ire4|#++-L+a|#++-L-L|o-Y-n|>-+-A|#++rCO--|#++rCy-i|#++rCy+A|#++rCo-||>-+-A|ore4-i|#++-LrC#
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Hermes@noreply@oc2mx.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Tue May 12 16:23:37 2026
    From Newsgroup: alt.privacy.anon-server

    Yamn Remailer wrote:
    Hermes wrote:

    Triple-K wrote:
    Hermes <noreply@oc2mx.net> posted:

    https://www.youtube.com/watch?v=CbRWANQdQlg

    Subject repaired free of charge, courtesy of YAMN_Remailer_Client_v0.4.05_build_1322 and
    OmniMix.

    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    The inwtx client is so simple it's almost impossible
    to be insecure.

    Ah, ha... I am pretty sure you can't explain to the
    a.p.a-s community why inwtx is not hosting his YAMN
    client on GitHub https://github.com/inwtx or asking
    frell admin for help https://github.com/lampeh/yamn


    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Yamn3 Remailer@noreply@mixmin.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Tue May 12 22:50:22 2026
    From Newsgroup: alt.privacy.anon-server

    On 03 May 2026, Hermes <noreply@oc2mx.net> posted some

    Yamn2 Remailer wrote:
    Your are still using inwtx's YAMN client, which
    was IIRC not updated in the past and therefore
    is insecure as Zax's YAMN client, along with
    the horrible OmniMix GUI, for Windows only...

    It's time (comming hopefully soon) to release
    project Zeus. ???|o-Y-n|>-+-A????|>-+-A|ore4-i?


    What is the "insecurity" in Zax's YAMN program?
    I've asked this before but I never receive a helpful answer.

    It doesn't safely do what it was designed to do?
    Or it doesn't do what you want it to do?


    Hi sec3,

    YAMN has a couple of design flaws, because Zax copied
    a 30 years old Mixmaster design and added only modern
    crypto algorithm.

    You shouldn't use Ethernet any longer then either because
    it's over 50 years old.

    I outlined the client flaw in an GitHub issue in frell
    admin's repository a while ago.

    https://github.com/lampeh/yamn/issues

    The remailer part is not on par with modern standards
    IMHO, if you compare it to Onion Courier mix nodes.

    You can compere this by yourself, since you run a YAMN
    middleman and simply try out the Onion Courier mix node.

    https://github.com/Ch1ffr3punk/oc

    404?

    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.

    I announced recently here that I no longer support Tor and
    it's community and that I will integrate Onion Courier in
    the Nym ecosystem, but here is the README for you:

    Was that before or after you got caught spinning the story about
    the Tor control port being a security flaw?
    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Hermes@noreply@oc2mx.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Tue May 12 23:06:38 2026
    From Newsgroup: alt.privacy.anon-server

    Yamn3 Remailer wrote:
    On 03 May 2026, Hermes <noreply@oc2mx.net> posted some

    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.

    I announced recently here that I no longer support Tor and
    it's community and that I will integrate Onion Courier in
    the Nym ecosystem, but here is the README for you:

    Was that before or after you got caught spinning the story about
    the Tor control port being a security flaw?

    On Windows it is a security flaw and an open Tor control port
    is absolutely not needed, for using an up-to-date tor.exe,
    which of course Danner can't deliver...

    But why to worry, there is the awesome Nym Mixnet available,
    which an outdated GUI wrapper like OmniMix can't use at all
    with it's third-party components...


    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Radio Eriwan@bounce.me@radio-eriwan.ru to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Fri May 15 06:24:00 2026
    From Newsgroup: alt.privacy.anon-server

    On 12 May 2026, Hermes <noreply@oc2mx.net> posted:

    Yamn3 Remailer wrote:
    On 03 May 2026, Hermes <noreply@oc2mx.net> posted some

    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.

    I announced recently here that I no longer support Tor and
    it's community and that I will integrate Onion Courier in
    the Nym ecosystem, but here is the README for you:

    Was that before or after you got caught spinning the story about
    the Tor control port being a security flaw?

    On Windows it is a security flaw and an open Tor control port
    is absolutely not needed, for using an up-to-date tor.exe,
    which of course Danner can't deliver...

    The Tor he does deliver is completely functional for intended
    usage.

    The control port is not "open".

    "To protect Tor's control port from unauthorized access there are two authentication methods, both supported by OmniMix. Switching between
    them requires editing the 'torrc' configuration file manually."

    But why to worry, there is the awesome Nym Mixnet available,
    which an outdated GUI wrapper like OmniMix can't use at all
    with it's third-party components...

    One app, one unproven service.

    Dozens of common apps can use the functionality of Omnimix
    and Tor with little effort.

    --- Synchronet 3.22a-Linux NewsLink 1.2
  • From Anne Frank@bounce.me@n2n.oc2mx.net to alt.privacy.anon-server,alt.cypherpunks,sci.crypt on Sun May 17 18:07:05 2026
    From Newsgroup: alt.privacy.anon-server

    On 12 May 2026, Hermes <noreply@oc2mx.net> posted:

    Yamn3 Remailer wrote:
    On 03 May 2026, Hermes <noreply@oc2mx.net> posted some

    Onion Courier is very much hated by some a.p.a-s LEA/TLA
    folks because of it's superiority over YAMN.

    I announced recently here that I no longer support Tor and
    it's community and that I will integrate Onion Courier in
    the Nym ecosystem, but here is the README for you:

    Was that before or after you got caught spinning the story about
    the Tor control port being a security flaw?

    On Windows it is a security flaw and an open Tor control port
    is absolutely not needed, for using an up-to-date tor.exe,
    which of course Danner can't deliver...

    The Tor he does deliver is completely functional for intended
    usage.

    The control port is not "open".

    It was open last time I downloaded OmniMix and a little Windows
    Trojan, written in Assembly Language and not detectable by AV
    software can then record and send all destination addresses, thanks
    to the untrustworthy Control Port setting.

    "To protect Tor's control port from unauthorized access there are two authentication methods, both supported by OmniMix. Switching between
    them requires editing the 'torrc' configuration file manually."

    But why to worry, there is the awesome Nym Mixnet available,
    which an outdated GUI wrapper like OmniMix can't use at all
    with it's third-party components...

    One app, one unproven service.

    What are you talking about?! The Nym ecosystem consists of multiple
    trustworthy apps, where the official Nym apps had several audits.

    Dozens of common apps can use the functionality of Omnimix
    and Tor with little effort.

    We no longer need OmniMix or QSL for Windows only, as we now have
    modern Virebent and Anne Frank services available, browser based
    and therefore cross-platform for desktop and mobile! EfyerYnN+AEfUC

    --- Synchronet 3.22a-Linux NewsLink 1.2