Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 46:46:32 |
Calls: | 583 |
Files: | 1,138 |
Messages: | 111,067 |
Are you sure you trust VPN providers, Would it not be better to make your own VPN?
https://www.youtube.com/watch?v=O2mxQSqvsaM
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
Are you sure you trust VPN providers, Would it not be better to make
your own VPN?
https://www.youtube.com/watch?v=O2mxQSqvsaM
I trust my VPN provider because I use the popular NymVPN, which
uses WireGuard in fast mode and in anonymous mode Nym Mixnet...
Is there any reason you prefer NYM over Mullvad?
On Tue, 26 Aug 2025 22:01:43 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
Are you sure you trust VPN providers
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
No need for name calling here. There comes a time when you need to pay for some services. I'm trying to decide between Mullvad VPN and NYM VPN.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
No need for name calling here. There comes a time when you need to pay for >some services.
Yes, we all use TOR but as you are aware of there are some things you just >can't do on TOR!
On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs
$12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with
their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally, and the torproject warns against using tor circuit lengths longer than three:
(using Tor Browser 14.5.6)
https://support.torproject.org/misc/misc-11/
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your
path that are sensitive. That is, in normal cases it's 3, but for example if >> you're accessing an onion service or a ".exit" address it could be more.
We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
Also, using paths longer than 3 could harm anonymity, first because it makes >> denial of security attacks easier, and second because it could act as an[end quote]
identifier if only a small number of users have the same path length as you.
In article <20250827.221421.0080eb00@mixmin.net> D wrote:
On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page deviously alleging a price of $2.59 monthly when usage really costs $12.99 a month is not to be trusted. Lying advertising is the sign of a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already demonstrated in this group their only goal is to make lots of money with their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
Absolutely. Five has to be the new three.
anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
and the torproject warns against using tor circuit lengths longer than three:
(using Tor Browser 14.5.6)
https://support.torproject.org/misc/misc-11/
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your
path that are sensitive. That is, in normal cases it's 3, but for example if
you're accessing an onion service or a ".exit" address it could be more. We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
They just fear the higher load. That's it.
Also, using paths longer than 3 could harm anonymity, first because it makes[end quote]
denial of security attacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.
There's no proof the circuit length can be identified at the exit.
But there's an immense risk to get three nodes run by a single
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
Are you sure you trust VPN providers, Would it not be better to make your own VPN?
Anonymous User wrote:
In article <20250827.221421.0080eb00@mixmin.net> D wrote:
On Wed, 27 Aug 2025 21:18:19 +0200, Fritz Wuehler <fritz@spamexpire-202508.rodent.frell.theremailer.net> wrote:Absolutely. Five has to be the new three.
Nomen Nescio <nobody@dizum.com> wrote:snip
In article <108n337$3nlcv$2@news.tcpreset.net>
Stefan Claas <pollux@yeffqiea4xtcu6woyab6z6bz4oehisfuzgtmk4e277bydq25p7nha7ad.onion> wrote:
https://nym.com/
https://nym.com/mixnet
Any outfit that uses delusive advertising such as its main page
deviously alleging a price of $2.59 monthly when usage really costs >> > > > $12.99 a month is not to be trusted. Lying advertising is the sign of
a business being untrustworthy.
Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >> > > their snakeoil business ripping off clueless customers.
No need to use anything but remailers and Tor with circuits of 5+ nodes. >>
anonymous remailers used in random chains (e.g. *,*,*,*,*) such as explained
in the omnimix tutorial (https://www.danner-net.de/omom/index.htm) naturally,
and the torproject warns against using tor circuit lengths longer than three:
(using Tor Browser 14.5.6)
https://support.torproject.org/misc/misc-11/
Can I change the number of hops Tor uses?
Right now the path length is hard-coded at 3 plus the number of nodes in your
path that are sensitive. That is, in normal cases it's 3, but for example if
you're accessing an onion service or a ".exit" address it could be more. >> > > We don't want to encourage people to use paths longer than this as it increases
load on the network without (as far as we can tell) providing any more security.
They just fear the higher load. That's it.
Also, using paths longer than 3 could harm anonymity, first because it makes[end quote]
denial of security attacks easier, and second because it could act as an >> > > identifier if only a small number of users have the same path length as you.
There's no proof the circuit length can be identified at the exit.
More hops add longer latency which can be meassured.
But there's an immense risk to get three nodes run by a singleTell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
And then there comes NymVPN into play for 3-hop Tor users, so that
they don't have to use a Windows GUI app with multiple .exe files,
only a handful of people use.
Anonymous User wrote:How will you measure latency without getting hold of both ends?
There's no proof the circuit length can be identified at the exit.
More hops add longer latency which can be meassured.
Too stupid to do your math? Hint: It's an exponential function.But there's an immense risk to get three nodes run by a singleTell us the math equation for that, compared to more hops, which a >sophisticated nation state can add.
operator, who then has you by the balls. That's why there's the
inept concept of entry guards.
Read <https://support.torproject.org/about/entry-guards/>, add the
middle node to the equation and you're at to the core of the problem.
It's not only about correlation attacks. It's about the worst case
of an attacker getting hold of the whole three-hop circuit! - BANG!
That's a simple calculation even the FUD spreaders here can't deny.
No need to use anything but remailers and Tor with circuits of 5+ nodes.
No need for name calling here. There comes a time when you need to pay for >>some services.
Nope.
Yes, we all use TOR but as you are aware of there are some things you just >>can't do on TOR!
Allow others to spy on you?
Stefan Claas wrote:
D wrote:
do what thou wilt, but i'd advise against using any more than three hops, >>> not only because omnimix and torproject seem to agree on that issue, but >>> also because anti-anonymous remailer/tor-mailer "chief evangelists" have >>> always advocated unsafe practices e.g. use more than 3 tor circuit nodes >>> (but these wall street shills are only doing their duty, it's their job)
What kind of liar are you? Danner, himself, introduced in his GUI app with >>a modified tor.exe more than 3 hops. I mentioned that as discussion here in >>a.p.a-s that Danner had not discussed this issue with the Tor devs publicity.
The result would have been a simple NO by the Tor team no matter for
what reason. But haven't you yourself contacted them on this topic?
What exactly was their reasoning? Was it sound? Was there solid
evidence for the insecurity of longer circuits they postulate?
And you have always promoted OmniMix with a modified tor.exe, until I raised >>the issue!
Professional users, which do not use a GUI app like OmniMix with various .exe >>files, are using tools like Mini Mailer, either with the modern Nym Mixnet or >>Tor Network with three hops, or yamn-proxy on mobile devices with three-hops.
Really?
Yes, we all use TOR but as you are aware of there are some things you just >>>can't do on TOR!
Allow others to spy on you?
So, you only need TOR and remailers? All I can take from that is that you're >a usenet newsgroup spammer.
Do you only use TOR for browsing and only use
remailers to contact family and friends etc???
If we say that something is free then you say we are the product
and if we say
something has to be paid for then you call us salesmen. Wake up man, this isn't
1994!
I suggest you eat this: https://www.youtube.com/watch?v=Z7AqBuc8Nrk
+1Claas is known as an ignorant Nym Corp salesman. As we already
demonstrated in this group their only goal is to make lots of money with >>their snakeoil business ripping off clueless customers.
+1No need to use anything but remailers and Tor with circuits of 5+ nodes.
There comes a time when you need to pay for some services.The wet dream of all commercial VPN providers ... but NO!
On 28/08/2025 00:25:50 +0200 (CEST) Nomen Nescio wrote:
+1Claas is known as an ignorant Nym Corp salesman. As we already >>>demonstrated in this group their only goal is to make lots of money with >>>their snakeoil business ripping off clueless customers.
+1No need to use anything but remailers and Tor with circuits of 5+ nodes.