• A is 1 - B is 2 - C is 3

    From Agent...@"Agent..."@Matrix.org to alt.privacy.anon-server, misc.phone.mobile.iphone, comp.mobile.android on Thu Oct 2 23:09:03 2025
    From Newsgroup: comp.mobile.android

    This is cracking encryption...

    https://www.youtube.com/watch?v=i9CBKGLVCME

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From nob...@"nob..."@none.invalid to mail2news on Fri Oct 3 15:34:06 2025
    From Newsgroup: comp.mobile.android

    Nessuno <Use-Author-Supplied-Address-Header@[127.1]> wrote:

    1 is A
    3 is C
    1 is A
    2 is B

    Or how about...

    A is 112
    B is 118
    c is 124

    --- Digital Signature --- YECfSUmz6Sbm5b7hbYb5i6UKZyZBV0QdU8aijSjX4+3TPAGuCl/Vi2RxYgBn2qbEOO/zWEvpSbWTSyL/MZv9Aw==


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Arno Welzel@usenet@arnowelzel.de to alt.privacy.anon-server,misc.phone.mobile.iphone,comp.mobile.android on Sat Oct 4 14:48:50 2025
    From Newsgroup: comp.mobile.android

    Mr Anderson, 2025-10-03 01:09:

    This is cracking encryption...

    https://www.youtube.com/watch?v=i9CBKGLVCME

    Well - at least they used ROT13 ;-)
    --
    Arno Welzel
    https://arnowelzel.de
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to mail2news on Sat Oct 4 19:24:37 2025
    From Newsgroup: comp.mobile.android

    Or how about...

    A is 112
    B is 118
    c is 124

    Going up 6 at a time? That's just too easy, the cracker would start with
    the lowest number and assume that is A and work from there. Needs to be
    more random than that.

    Maybe...

    A is 659
    B is 173
    C is 518

    The receiver would need to hold the 'key' of course.


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to mail2news on Sat Oct 4 21:38:12 2025
    From Newsgroup: comp.mobile.android

    1 zssszz Zzz
    3 zssszz Zzs
    1 zssszz Zzz
    2 zssszz Zzc

    Imagine a scenario where no encryption was available, it was all banned
    by governments. What would people do? In my IMHO the dark web would
    become more popular and everything would just go underground giving the authorities an even bigger headache.

    Personally, I don't think it is possible to ban it anyway as there is
    too much encryption software out there.

    Anyway, just in case...

    A is YdIBl088iv8d
    B is z+3mCMq5zWrf
    C is 0FfxTZjE7pL5

    Can' stop people from sending coded messages.

    https://www.youtube.com/shorts/Rosw2UjQk68


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy.anon-server, comp.mobile.android, misc.phone.mobile.iphone on Sun Oct 5 00:29:57 2025
    From Newsgroup: comp.mobile.android

    Anonymous User <noreply@dirge.harmsk.com> wrote:

    1 zssszz Zzz
    3 zssszz Zzs
    1 zssszz Zzz
    2 zssszz Zzc

    Imagine a scenario where no encryption was available, it was all banned
    by governments. What would people do? In my IMHO the dark web would
    become more popular and everything would just go underground giving the >authorities an even bigger headache.

    Personally, I don't think it is possible to ban it anyway as there is
    too much encryption software out there.

    Anyway, just in case...

    A is YdIBl088iv8d
    B is z+3mCMq5zWrf
    C is 0FfxTZjE7pL5

    Can' stop people from sending coded messages.

    https://www.youtube.com/shorts/Rosw2UjQk68


    Thickie, the Tor network bases on encryption
    no matter what goes on in your IMHO.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to mail2news on Sun Oct 5 00:39:01 2025
    From Newsgroup: comp.mobile.android

    Thickie, the Tor network bases on encryption
    no matter what goes on in your IMHO.

    TOR is not 100% secure, some say 60% of nodes are run by the feds.
    And what if the 'net' goes down in a cyberattack? Then we will
    have to send coded messages like mentioned here by snail mail.

    Anyway, we're just throwing ideas around to see if some bright
    spark (not you) comes up with some good ideas.

    Hundreds of Tor Relays are Being Used to De-anonymize Users. Can
    you run a TOR relay to make things run safer and faster???

    https://www.youtube.com/watch?v=pvBAaUPzvBQ

    Stop Using Tor With VPNs...

    https://www.youtube.com/watch?v=y8bIt4K_Kfo


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy.anon-server, comp.mobile.android, misc.phone.mobile.iphone on Sun Oct 5 13:15:19 2025
    From Newsgroup: comp.mobile.android

    Anonymous User <noreply@dirge.harmsk.com> wrote:

    Thickie, the Tor network bases on encryption
    no matter what goes on in your IMHO.

    TOR is not 100% secure, some say 60% of nodes are run by the feds.
    And what if the 'net' goes down in a cyberattack? Then we will
    have to send coded messages like mentioned here by snail mail.

    Anyway, we're just throwing ideas around to see if some bright
    spark (not you) comes up with some good ideas.

    Hundreds of Tor Relays are Being Used to De-anonymize Users. Can
    you run a TOR relay to make things run safer and faster???

    https://www.youtube.com/watch?v=pvBAaUPzvBQ

    Stop Using Tor With VPNs...

    https://www.youtube.com/watch?v=y8bIt4K_Kfo


    We all know that Tor isn't secure. I myself
    run it with an increased circuit length.
    With my posting I just intended to point out
    that banning encryption includes Tor.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy.anon-server, comp.mobile.android, misc.phone.mobile.iphone on Sun Oct 5 15:07:30 2025
    From Newsgroup: comp.mobile.android

    On Sun, 10/05/2025 00:39:01 +0000, Anonymous User wrote:

    Thickie, the Tor network bases on encryption
    no matter what goes on in your IMHO.

    TOR is not 100% secure, some say 60% of nodes are run by the feds.
    And what if the 'net' goes down in a cyberattack? Then we will
    have to send coded messages like mentioned here by snail mail.

    Anyway, we're just throwing ideas around to see if some bright
    spark (not you) comes up with some good ideas.

    Hundreds of Tor Relays are Being Used to De-anonymize Users. Can
    you run a TOR relay to make things run safer and faster???

    https://www.youtube.com/watch?v=pvBAaUPzvBQ

    No, the solution isn't a few more relays but longer circuits, which we
    once got with AdvOR/AdvancedOnionRouter and now with Danner's Tor patch.

    --- Synchronet 3.21a-Linux NewsLink 1.2