• Host Your Own VPN (WireGuard)

    From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Tue Aug 26 22:01:43 2025
    From Newsgroup: news.software.nntp

    Are you sure you trust VPN providers, Would it not be better to make your own VPN?

    https://www.youtube.com/watch?v=O2mxQSqvsaM


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Tue Aug 26 23:37:28 2025
    From Newsgroup: news.software.nntp

    Fritz Wuehler wrote:

    Are you sure you trust VPN providers, Would it not be better to make your own VPN?

    https://www.youtube.com/watch?v=O2mxQSqvsaM


    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...

    Regards
    Stefan
    --
    -----BEGIN ECCP256 SIGNATURE----- 54a2d5a47e8ae9a788ab22a288939c006af1c716cc61de48e32a09df874f1b30 9f5c637aea91898e522e381deb03591532028b1283a937f6727ecdc7e52edf21 0f7e9ca95aeea235019762363e0be3c9ef0e959f5a4117b7d2044eb7863c1f2b 8221c4b1a8fa78bb7cefbdd11ca123453fc0621445f6914ee3c24b822a5a30fc
    -----END ECCP256 SIGNATURE-----
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Wed Aug 27 01:26:49 2025
    From Newsgroup: news.software.nntp

    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...


    Is there any reason you prefer NYM over Mullvad?

    https://www.youtube.com/watch?v=dVtw-4Eox2E&t=64s

    https://www.youtube.com/watch?v=hPrMtIXUh1s&t=311s

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Wed Aug 27 13:25:18 2025
    From Newsgroup: news.software.nntp

    On 26 Aug 2025, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> posted some news:f867f694e22609682cc3633b99c13e8b@msgid.frell.theremailer.net:

    Are you sure you trust VPN providers, Would it not be better to make
    your own VPN?

    https://www.youtube.com/watch?v=O2mxQSqvsaM

    I do. I have two in fact. SoftEther VPN and MS VPN.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Wed Aug 27 15:52:52 2025
    From Newsgroup: news.software.nntp

    Fritz Wuehler wrote:
    I trust my VPN provider because I use the popular NymVPN, which
    uses WireGuard in fast mode and in anonymous mode Nym Mixnet...


    Is there any reason you prefer NYM over Mullvad?

    Yes, I know the Nym team from the beginnin and they have
    a great community, where people build projects for the
    Nym Mixnet, which is pretty awesome, due to newest Mix
    technolgy used.

    Regards
    Stefan

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From El Kabong@Quickdraw@HannaBarbera.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Wed Aug 27 07:45:12 2025
    From Newsgroup: news.software.nntp

    On Tue, 26 Aug 2025 22:01:43 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:

    Are you sure you trust VPN providers

    https://news.bitcoin.com/vp-net-the-vpn-that-doesnt-ask-for-your-trust-it-makes-tracking-you-technically-impossible/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 00:25:50 2025
    From Newsgroup: news.software.nntp

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for
    some services. I'm trying to decide between Mullvad VPN and NYM VPN.

    Yes, we all use TOR but as you are aware of there are some things you just can't do on TOR!

    NYM the worldrCOs most private VPN: https://nym.com/

    Mullvad VPN: Free the internet: https://mullvad.net/en

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 01:58:14 2025
    From Newsgroup: news.software.nntp

    Nomen Nescio wrote:
    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for some services. I'm trying to decide between Mullvad VPN and NYM VPN.

    This NymVPN information was just released today, which is pretty interesting.

    https://nym.com/blog/NymVPN-Roadmap-for-censorship-resistance-2025

    Regards
    Stefan
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 09:57:00 2025
    From Newsgroup: news.software.nntp

    Class wrote:

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for >some services.

    Nope.


    Yes, we all use TOR but as you are aware of there are some things you just >can't do on TOR!

    Allow others to spy on you?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 06:02:42 2025
    From Newsgroup: news.software.nntp

    In article <20250827.221421.0080eb00@mixmin.net> D wrote:

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs
    $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with
    their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes.

    Absolutely. Five has to be the new three.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally, and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your
    path that are sensitive. That is, in normal cases it's 3, but for example if >> you're accessing an onion service or a ".exit" address it could be more.
    We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.

    They just fear the higher load. That's it.

    Also, using paths longer than 3 could harm anonymity, first because it makes >> denial of security attacks easier, and second because it could act as an
    identifier if only a small number of users have the same path length as you.
    [end quote]

    There's no proof the circuit length can be identified at the exit.
    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 15:16:38 2025
    From Newsgroup: news.software.nntp

    Anonymous User wrote:
    In article <20250827.221421.0080eb00@mixmin.net> D wrote:

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page deviously alleging a price of $2.59 monthly when usage really costs $12.99 a month is not to be trusted. Lying advertising is the sign of a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes.

    Absolutely. Five has to be the new three.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
    in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
    and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your
    path that are sensitive. That is, in normal cases it's 3, but for example if
    you're accessing an onion service or a ".exit" address it could be more. We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.

    They just fear the higher load. That's it.

    Also, using paths longer than 3 could harm anonymity, first because it makes
    denial of security attacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.
    [end quote]

    There's no proof the circuit length can be identified at the exit.

    More hops add longer latency which can be meassured.

    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    Tell us the math equation for that, compared to more hops, which a sophisticated nation state can add.

    And then there comes NymVPN into play for 3-hop Tor users, so that
    they don't have to use a Windows GUI app with multiple .exe files,
    only a handful of people use.
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Mr. Man-wai Chang@toylet.toylet@gmail.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 23:55:56 2025
    From Newsgroup: news.software.nntp

    On 27/8/2025 4:01 am, Fritz Wuehler wrote:
    Are you sure you trust VPN providers, Would it not be better to make your own VPN?


    What did you mean by "make your own VPN"? You are still using someone's
    VPN software.
    --
    @~@ Simplicity is Beauty! Remain silent! Drink, Blink, Stretch!
    / v \ May the Force and farces be with you! Live long and prosper!!
    /( _ )\ https://sites.google.com/site/changmw/
    ^ ^ https://github.com/changmw/changmw
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn3 Remailer@noreply@mixmin.net to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 17:23:03 2025
    From Newsgroup: news.software.nntp

    Stefan Claas wrote:
    Anonymous User wrote:
    In article <20250827.221421.0080eb00@mixmin.net> D wrote:

    On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
    Nomen Nescio <nobody@dizum.com> wrote:
    In article <108n337$3nlcv$2@news.tcpreset.net>
    Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
    snip
    https://nym.com/
    https://nym.com/mixnet

    Any outfit that uses delusive advertising such as its main page
    deviously alleging a price of $2.59 monthly when usage really costs >> > > > $12.99 a month is not to be trusted. Lying advertising is the sign of
    a business being untrustworthy.

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >> > > their snakeoil business ripping off clueless customers.
    No need to use anything but remailers and Tor with circuits of 5+ nodes. >>
    Absolutely. Five has to be the new three.

    anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
    in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
    and the torproject warns against using tor circuit lengths longer than three:

    (using Tor Browser 14.5.6)
    https://support.torproject.org/misc/misc-11/
    Can I change the number of hops Tor uses?
    Right now the path length is hard-coded at 3 plus the number of nodes in your
    path that are sensitive. That is, in normal cases it's 3, but for example if
    you're accessing an onion service or a ".exit" address it could be more. >> > > We don't want to encourage people to use paths longer than this as it increases
    load on the network without (as far as we can tell) providing any more security.

    They just fear the higher load. That's it.

    Also, using paths longer than 3 could harm anonymity, first because it makes
    denial of security attacks easier, and second because it could act as an >> > > identifier if only a small number of users have the same path length as you.
    [end quote]

    There's no proof the circuit length can be identified at the exit.

    More hops add longer latency which can be meassured.

    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    Tell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.

    You know about <https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-relay-activities-part-ii-85c80875c5df>?
    A quarter of exit nodes infiltrated and compromized by one entity!

    With a quarter of all nodes compromized every 64th circuit is a win for
    the attacker. And now think of the number of connections you make every
    day. With 6 hops you raise the stakes from 64 to 4096, and with only 10
    percent of the nodes, just about 700 of them, compromized from 1000 to a million. That makes a big difference. You must be stupid to ignore that.


    And then there comes NymVPN into play for 3-hop Tor users, so that
    they don't have to use a Windows GUI app with multiple .exe files,
    only a handful of people use.

    VPNs with everything in one hand right from the start? Are you nuts?

    I run my OmniMix and TorBrowser with no less than 6-node circuits. And I
    doubt any expert in this field with more than a handful of brain cells
    between his ears takes the risk to rely on standard 3-hop Tor circuits.

    Just don't!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202508.rodent.frell.theremailer.net to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 19:14:38 2025
    From Newsgroup: news.software.nntp

    Claas wrote:
    Anonymous User wrote:

    There's no proof the circuit length can be identified at the exit.

    More hops add longer latency which can be meassured.
    How will you measure latency without getting hold of both ends?
    And you've no idea how latency varies tremendously dependent on
    factors like routing and computer processing power.


    But there's an immense risk to get three nodes run by a single
    operator, who then has you by the balls. That's why there's the
    inept concept of entry guards.

    Read <https://support.torproject.org/about/entry-guards/>, add the
    middle node to the equation and you're at to the core of the problem.
    It's not only about correlation attacks. It's about the worst case
    of an attacker getting hold of the whole three-hop circuit! - BANG!

    That's a simple calculation even the FUD spreaders here can't deny.

    Tell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.
    Too stupid to do your math? Hint: It's an exponential function.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.comp.freeware,news.software.nntp on Thu Aug 28 19:28:22 2025
    From Newsgroup: news.software.nntp

    No need to use anything but remailers and Tor with circuits of 5+ nodes.


    No need for name calling here. There comes a time when you need to pay for >>some services.

    Nope.


    Yes, we all use TOR but as you are aware of there are some things you just >>can't do on TOR!

    Allow others to spy on you?

    So, you only need TOR and remailers? All I can take from that is that you're
    a usenet newsgroup spammer. Do you only use TOR for browsing and only use remailers to contact family and friends etc???

    If we say that something is free then you say we are the product and if we say something has to be paid for then you call us salesmen. Wake up man, this isn't 1994!

    I suggest you eat this: https://www.youtube.com/watch?v=Z7AqBuc8Nrk


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@remailer.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Thu Aug 28 23:29:27 2025
    From Newsgroup: news.software.nntp

    On Thu, 28 Aug 2025 14:28:49 +0200, Fritz Wuehler wrote:
    Stefan Claas wrote:
    D wrote:

    do what thou wilt, but i'd advise against using any more than three hops, >>> not only because omnimix and torproject seem to agree on that issue, but >>> also because anti-anonymous remailer/tor-mailer "chief evangelists" have >>> always advocated unsafe practices e.g. use more than 3 tor circuit nodes >>> (but these wall street shills are only doing their duty, it's their job)

    What kind of liar are you? Danner, himself, introduced in his GUI app with >>a modified tor.exe more than 3 hops. I mentioned that as discussion here in >>a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.

    The result would have been a simple NO by the Tor team no matter for
    what reason. But haven't you yourself contacted them on this topic?
    What exactly was their reasoning? Was it sound? Was there solid
    evidence for the insecurity of longer circuits they postulate?

    There is no evidence. It's all about not stressing the network.
    IOW, don't put strain on the Tor network, as due to the inherence
    of further unfixable weaknesses it isn't worth it to remedy that
    single all-in-one-hand risk.



    And you have always promoted OmniMix with a modified tor.exe, until I raised >>the issue!

    Professional users, which do not use a GUI app like OmniMix with various .exe >>files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >>Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.

    Really?

    Nope. He's joking.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Fri Aug 29 00:12:05 2025
    From Newsgroup: news.software.nntp

    Class wrote:

    Yes, we all use TOR but as you are aware of there are some things you just >>>can't do on TOR!

    Allow others to spy on you?

    So, you only need TOR and remailers? All I can take from that is that you're >a usenet newsgroup spammer.

    Everyone who doesn't praise your BS hacks is a spammer, we know. Well, actually it's you who continuously spams us with commercial Tuta and Nym nonsense.

    Do you only use TOR for browsing and only use
    remailers to contact family and friends etc???

    I use free software with source code access as well as free networks and services wherever possible. And no, I'm not using Tor for banking transactions, Internet shopping or other individual stuff.


    If we say that something is free then you say we are the product

    No way, that's not my opinion. Where are we the product with these
    tools I frequently use:

    GnuPG / Kleopatra, Tor / Browser, Firefox, OmniMix, Thunderbird, Gajim,
    Libre Office, VLC, DarkTable, Gimp, IrfanView, Linux (Debian, Mint,
    Ubuntu), LineageOS, F-Droid Apps like Conversations, OSMand

    just to name a few.

    And where am I the product while using the Tor network to access XMPP
    servers, the Mixmaster or YAMN remailer network, a nymserver, or join
    the Mastodon network anonymously?

    You're so clueless!

    Get a job. Your shameful appearances here won't make you rich.

    and if we say
    something has to be paid for then you call us salesmen. Wake up man, this isn't
    1994!

    1994? Golly gosh! You're a left-behind of your own Me-Too movement.


    I suggest you eat this: https://www.youtube.com/watch?v=Z7AqBuc8Nrk

    90 minutes of blathering with trivial information that can be told in
    less than 3 minutes. They're obviously paid per minute.

    <https://youtu.be/Z7AqBuc8Nrk?t=2599>

    | Tor is really, is such an interesting tool, because there are different
    | trade-offs, right, ahm. If I am using the Internet, I, first of all the
    | exit node is not encrypted, right, it's always unencrypted. And so I
    | don't have the same guarantees as perhaps like a VPN that is encrypting
    | that tunnel all the way through.

    What??? She's all at sea here, a blank slate that has absolutely no
    idea! That's tabloid journalism, yello press, just enough to impress inexperienced viewers like you, but a waste of time for the rest of us.

    Finally, Claas, the next time we expect a Refereeces header. Got it?
    BTW, with OmniMix assisting your newsreader that wouldn't have happened.
    We can help you install and use it. It's so easy. Just give it a try!

    I suggest you start here: <https://www.danner-net.de/om.htm>

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@remailer.paranoici.org to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Fri Aug 29 01:09:27 2025
    From Newsgroup: news.software.nntp

    On 28/08/2025 00:25:50 +0200 (CEST) Nomen Nescio wrote:

    Claas is known as an ignorant Nym Corp salesman. As we already
    demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.
    +1

    No need to use anything but remailers and Tor with circuits of 5+ nodes.
    +1

    There comes a time when you need to pay for some services.
    The wet dream of all commercial VPN providers ... but NO!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From shaw@shaw@placer.com to alt.comp.freeware,alt.privacy.anon-server,news.software.nntp on Fri Aug 29 15:49:36 2025
    From Newsgroup: news.software.nntp

    On Fri, 29 Aug 2025 01:09:27 +0000 (UTC), Anonymous <nobody@remailer.paranoici.org> wrote:

    On 28/08/2025 00:25:50 +0200 (CEST) Nomen Nescio wrote:

    Claas is known as an ignorant Nym Corp salesman. As we already >>>demonstrated in this group their only goal is to make lots of money with >>>their snakeoil business ripping off clueless customers.
    +1

    No need to use anything but remailers and Tor with circuits of 5+ nodes.
    +1


    The Authors or Tor disagree with the notion of using more than 3 nodes.
    -----
    https://support.torproject.org/misc/misc-11/

    Can I change the number of hops Tor uses?

    Right now the path length is hard-coded at 3 plus the number of nodes in
    your path that are sensitive. That is, in normal cases it's 3, but for
    example if you're accessing an onion service or a ".exit" address it
    could be more.

    We don't want to encourage people to use paths longer than this as it
    increases load on the network without (as far as we can tell) providing
    any more security. Also, using paths longer than 3 could harm anonymity,
    first because it makes denial of security attacks easier, and second
    because it could act as an identifier if only a small number of users
    have the same path length as you.
    --- Synchronet 3.21a-Linux NewsLink 1.2