• M2usenet2.0 is out

    From Gabx@my@ema.il to mail2news on Fri Oct 17 16:00:54 2025
    From Newsgroup: sci.crypt

    m2usenet Gateway v2.0 :

    http://itcxzfm2h36hfj6j7qxksyfm4ipp3co4rkl62sgge7hp6u77lbretiyd.onion:8880

    https://m2usenet.virebent.art


    Gabx

    [padding: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]

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Oct 17 19:18:58 2025
    From Newsgroup: sci.crypt

    Gabx wrote:
    m2usenet Gateway v2.0 :

    http://itcxzfm2h36hfj6j7qxksyfm4ipp3co4rkl62sgge7hp6u77lbretiyd.onion:8880

    https://m2usenet.virebent.art


    Gabx

    [padding:6e52c841cd00d6a2c9553795f693096bdcff977d8b20a4db5fa4796f6486892056ee09fc71ea54067a13d4af2ee5fb89e41b80f2bd6f6956e472cdf51b30cb21eb2436abdb93783598244dbc12238e9fdf07562a9009fd4a9601f2af6a236291c1d88660def038c455d9bf722d5158da52319a5c302af7f8e922fd31090b5cbe0ec7c30345d30baa8d6d08690c700cc0614abdeebc8b269c355cec0764408d57da6babf0d89204aebf0bff65857f0dc4ab3ccbe0c8559ec860fc617f9235763d949be76a0a3f4bfdc00d0c9fb7e95815e4dc768b27ef6edaed7842634c6eb07a3f22cd05d3f6105c4596110fbe4ab885e4bccde22d3830bea9a048ae5a516626]

    as you can see
    there are still issues ...
    sorry, working on it ...

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Oct 17 20:13:52 2025
    From Newsgroup: sci.crypt

    Gabx:

    https://m2usenet.virebent.art

    What I don't understand, why the POW cannot be automatically
    done by the server, without user input and why a digital sig
    is used, nobody can verify because a server or third parties
    would never fiddle around with the usual Usenet blah blah...

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Fri Oct 17 22:46:31 2025
    From Newsgroup: sci.crypt

    Nomen Nescio wrote:
    What I don't understand, why the POW cannot be automatically
    done by the server, without user input and why a digital sig
    is used, nobody can verify because a server or third parties
    would never fiddle around with the usual Usenet blah blah...

    PoW (Proof-of-Work) must be client-side by design. If the server
    generated it, anyone could spawn thousands of posts without
    computational cost, defeating the anti-spam purpose. By requiring client
    side hashcash, each message submission makes a real CPU cost (30-120
    seconds), making automated bulk posting economically unfeasible for
    spambots.
    Digital signatures provide message integrity and authorship proof. While there's no central PKI, recipients can verify that messages with the
    same public key come from the same sender. This enables reputation
    tracking and spam filtering without requiring centralized identity verification, preserving privacy while adding accountability.

    The goal: make spam expensive, legitimate posting affordable.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@nessuno@gmail.invalid to mail2news on Fri Oct 17 22:12:58 2025
    From Newsgroup: sci.crypt

    Nomen Nescio wrote:
    Gabx:
    What I don't understand, why the POW cannot be automatically
    done by the server, without user input and why a digital sig
    is used, nobody can verify because a server or third parties
    would never fiddle around with the usual Usenet blah blah...

    16bit option is fast.
    But not recommended, thou !

    Gabx

    --- Digital Signature --- TwGUWL5vQzrHXTZUyw/4YIwaL171VxptsqgagAs4IA2bF8bhXfmjgfcPXpBVlZaft0Z8wrLWiweWCzofaispBw==

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@victor@virbent.tcpreset to mail2news on Sat Oct 18 00:06:52 2025
    From Newsgroup: sci.crypt

    After hours of development, testing, putting online, everything totally live, m2usenet 2.0 can be considered available for testing. there shouldn't be any problems thou.
    I have got good news anyway, check it:

    https://m2usenet.virebent.art/

    http://itcxzfm2h36hfj6j7qxksyfm4ipp3co4rkl62sgge7hp6u77lbretiyd.onion:8880/

    Have fun !!!

    Gabx

    --- Digital Signature --- dLLp4YJmCHu7C2BOJuxi+S2cV9wZ1D5zrPznYH/+9B8MccSEBLNHf9bqqzmxc3z1v1v45KE9q+yG+0ncRyItCQ==

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.privacy,sci.crypt on Sat Oct 18 04:16:26 2025
    From Newsgroup: sci.crypt

    In article <1760746012.119f7b7091c05686d451aa2078d17428@m2usenet.local>
    Gabx <victor@virbent.tcpreset> wrote:

    After hours of development, testing, putting online, everything totally live, m2usenet 2.0 can be considered available for testing. there shouldn't be any problems thou.
    I have got good news anyway, check it:

    https://m2usenet.virebent.art/

    http://itcxzfm2h36hfj6j7qxksyfm4ipp3co4rkl62sgge7hp6u77lbretiyd.onion:8880/

    Have fun !!!

    Gabx


    Now I'm getting this;


    Request Failed

    Validation failed

    ? Back

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy.anon-server,alt.privacy,sci.crypt on Sat Oct 18 06:11:34 2025
    From Newsgroup: sci.crypt

    In article <1760746012.119f7b7091c05686d451aa2078d17428@m2usenet.local>
    Gabx <victor@virbent.tcpreset> wrote:

    After hours of development, testing, putting online, everything totally live, m2usenet 2.0 can be considered available for testing. there shouldn't be any problems thou.
    I have got good news anyway, check it:

    https://m2usenet.virebent.art/

    http://itcxzfm2h36hfj6j7qxksyfm4ipp3co4rkl62sgge7hp6u77lbretiyd.onion:8880/

    Have fun !!!

    Gabx


    I keep getting a please enter a valid email address.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy.anon-server,alt.privacy,sci.crypt on Sat Oct 18 12:42:03 2025
    From Newsgroup: sci.crypt

    Nomen Nescio wrote:
    I keep getting a please enter a valid email address.


    For valid it means username domain and tld.
    *any@email.will*

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Sat Oct 18 14:18:25 2025
    From Newsgroup: sci.crypt

    Nomen Nescio <nobody@dizum.com> wrote:
    In article <1760746012.119f7b7091c05686d451aa2078d17428@m2usenet.local>
    Gabx <victor@virbent.tcpreset> wrote:

    After hours of development, testing, putting online, everything totally live, m2usenet 2.0 can be considered available for testing. there shouldn't be any problems thou.
    I have got good news anyway, check it:

    https://m2usenet.virebent.art/

    http://itcxzfm2h36hfj6j7qxksyfm4ipp3co4rkl62sgge7hp6u77lbretiyd.onion:8880/ >>
    Have fun !!!

    Gabx


    I keep getting a please enter a valid email address.

    Don't mind, even an invalid mail address isn't refused.

    But I still wonder who can be so stupid to allow web contents beyond his control being executed on his computer for sending anonymous messages.

    And why are there different Hashcash bits to choose from? Are they any consequences using the 16-bit one apart from saving ressources?

    And what's the purpose of a signature created with a single-use
    throwaway key?

    | Ed25519 Digital Signature
    |
    | What is this? This step creates a digital signature for your message
    | using the Ed25519 cryptographic algorithm. This signature helps verify
    | that the message was sent by you and hasn't been tampered with.
    |
    | How to use: First, generate a key pair (this creates a public and
    | private key). Then, write your message and click "Sign Message". This
    | will create a digital signature that will be attached to your post.

    ???

    Looks like poisoned snake oil offered by GarbageX!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@victor@tcpreset.virebent to alt.privacy,alt.privacy.anon-server,sci.crypt on Sat Oct 18 14:29:11 2025
    From Newsgroup: sci.crypt

    Yamn2 Remailer wrote:
    Looks like poisoned snake oil offered by GarbageX!

    This is the classic non-technical critique from people who blindly trust closed-source software with ambiguous licenses while lecturing others
    about privacy.

    Let me address the technical illiteracy in your comment:

    m2usenet is fully open source: https://github.com/gabrix73/m2usenet-go

    You can:
    - Audit every line of JavaScript before running it
    - Host your own instance
    - Verify the client-side crypto with browser dev tools
    - Review the Ed25519 and Hashcash implementations

    Compare this to your beloved Omnimix and similar systems with:
    - Closed source binaries you run blindly
    - Ambiguous licensing terms
    - *"Trust us" security model*

    m2usenet is transparent, auditable, and follows
    cryptographic best practices.

    If you have actual technical criticisms of the implementation, I'm
    listening.
    But "why client-side crypto" from someone who trusts closed binaries? Please.

    The code speaks for itself. Unlike some systems.

    Ed25519 signatures provide message integrity even with ephemeral keys -
    basic cryptographic hygiene that apparently escapes you.

    Gabx

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 03:48:44 2025
    From Newsgroup: sci.crypt

    Gabx <victor@tcpreset.virebent> wrote:
    Yamn2 Remailer wrote:
    Looks like poisoned snake oil offered by GarbageX!

    This is the classic non-technical critique from people who blindly trust >closed-source software with ambiguous licenses while lecturing others
    about privacy.

    Let me address the technical illiteracy in your comment:

    m2usenet is fully open source: https://github.com/gabrix73/m2usenet-go

    You can:
    - Audit every line of JavaScript before running it
    - Host your own instance
    - Verify the client-side crypto with browser dev tools
    - Review the Ed25519 and Hashcash implementations

    Compare this to your beloved Omnimix and similar systems with:
    - Closed source binaries you run blindly
    - Ambiguous licensing terms
    - *"Trust us" security model*

    m2usenet is transparent, auditable, and follows
    cryptographic best practices.

    If you have actual technical criticisms of the implementation, I'm >listening.
    But "why client-side crypto" from someone who trusts closed binaries? Please.

    The code speaks for itself. Unlike some systems.

    Ed25519 signatures provide message integrity even with ephemeral keys - >basic cryptographic hygiene that apparently escapes you.

    Gabx

    As you also post to sci.crypt we have here experts in this field.

    First of all, OmniMix isn't closed source software even if you repeat
    that lie again and again. Why do you do that as you know better? Fact
    is that with OmniMix you even get the complete IDE, which with a few
    mouse clicks builds the executable program on your computer ready to be
    run in a debugger step by step and compared with the file from the
    installation package byte by byte. You're in control of everything!

    <https://www.danner-net.de/om/OmniMix_IDE_2.8.3_Uno_Setup.exe> <https://www.danner-net.de/om/OmniMix_2.8.3_Uno_Setup.exe>

    Now to your web interface. There we have the exact oposite. You
    present us source code, but whether that's what processes our data is
    beyond our control. Even if we once or twice download the published
    code the next time for whatever reason it may be different and
    compromize our identity. A system for gamblers.

    Furthermore, the anonymity of our plain text messages is secured by an extremely weak real-time Tor connection of usually no more than 3 nodes
    while with OmniMix you're allowed to route your data through much longer
    Tor circuits and those data aren't plain text but multilayer-encrypted
    remailer packets.

    And then there still is the unanswered question of a signature based on
    a single-use throwaway key, where the user only gets knowledge of the
    public key but not the secret key or the passphrase, both only known to
    you as the service provider. That's weird. It doesn't verify anything.
    It just proves that the user is stupid enough to deal with your insecure
    web interface.

    Equally weird is your statement about Hashcash bits in MID <1760739178.dcc2021df3109aecc5b428f2d8ff300f@m2usenet.local>:

    | 16bit option is fast.
    | But not recommended, thou !

    So you recommend spammers for fairness reasons to select more bits? No kidding?

    Man! You're really a droll fellow.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 05:11:15 2025
    From Newsgroup: sci.crypt

    Yamn2 Remailer wrote:
    So you recommend spammers for fairness reasons to select more bits? No kidding?

    Man! You're really a droll fellow.


    You think it's week we can talk about,
    but this is not the way to say it.
    Yes omnimix is the best.

    Lunga vita

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 14:16:47 2025
    From Newsgroup: sci.crypt

    So this response isn't for the trolls or the blind fanboys.
    It's for anyone who genuinely wants to understand the technical details.

    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    First of all, OmniMix isn't closed source software even if you repeat
    that lie again and again. Why do you do that as you know better? Fact
    is that with OmniMix you even get the complete IDE, which with a few
    mouse clicks builds the executable program on your computer ready to be
    run in a debugger step by step and compared with the file from the installation package byte by byte. You're in control of everything!

    "Providing an IDE to compile is not equivalent to 'open source' in the
    OSI definition.
    Open source requires:

    - Public source code repository
    - OSI-approved license (GPL, MIT, BSD, etc.)
    - Right to modify and redistribute

    If OmniMix meets these criteria, I stand corrected.
    A link to the public repository would clarify this."

    Now to your web interface. There we have the exact oposite. You
    present us source code, but whether that's what processes our data is
    beyond our control. Even if we once or twice download the published
    code the next time for whatever reason it may be different and
    compromize our identity. A system for gamblers.

    For maximum security: Self-host your own instance. That's why it's
    open source.

    Furthermore, the anonymity of our plain text messages is secured by an extremely weak real-time Tor connection of usually no more than 3 nodes
    while with OmniMix you're allowed to route your data through much longer
    Tor circuits and those data aren't plain text but multilayer-encrypted remailer packets.

    Calling Tor "extremely weak" with "no more than 3 nodes" shows a
    fundamental misunderstanding of the architecture, for both tor and m2usenet.

    m2usenet routes through THREE Tor hidden services:
    1. Pluto2 SMTP relay (.onion)
    2. mail2news gateway (.onion)
    3. NNTP server (.onion)

    Each hidden service connection uses 3 hops. Total: 9+ hops minimum.

    Calling this "weak" is not a technical argument, it's dismissive rhetoric.

    And then there still is the unanswered question of a signature based on
    a single-use throwaway key, where the user only gets knowledge of the
    public key but not the secret key or the passphrase, both only known to
    you as the service provider. That's weird. It doesn't verify anything.
    It just proves that the user is stupid enough to deal with your insecure
    web interface.

    - keyPair generated client-side
    - keyPair.secretKey stays IN BROWSER MEMORY (never transmitted)
    - Only publicKey + signature sent to server
    - Server CANNOT access secretKey

    Equally weird is your statement about Hashcash bits in MID <1760739178.dcc2021df3109aecc5b428f2d8ff300f@m2usenet.local>:

    | 16bit option is fast.
    | But not recommended, thou !

    So you recommend spammers for fairness reasons to select more bits? No kidding?

    The difficulty levels serve different purposes:

    - 16 bits: Prevents message flooding
    - 20 bits (default): Balanced protection (~5-10 seconds per post)
    - 24 bits: Strong protection (~30-60 seconds per post)
    - 28 bits: Very strong (~several minutes per post)

    Real spammers use botnets with GPU/ASIC mining, not browser interfaces.
    A web UI with mandatory proof-of-work is specifically designed to
    PREVENT automated spam tools.

    Man! You're really a droll fellow.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 08:31:06 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> avoided answering:

    Yamn2 Remailer wrote:
    So you recommend spammers for fairness reasons to select more bits? No
    kidding?

    Man! You're really a droll fellow.


    You think it's week we can talk about,
    but this is not the way to say it.

    On a serious note, is it our duty to make you feel good
    or to prevent inexperienced potential users from making a
    fatal decision?

    Yes omnimix is the best.

    Lunga vita

    Gabx

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 15:20:04 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:

    So this response isn't for the trolls or the blind fanboys.
    It's for anyone who genuinely wants to understand the technical details.


    Let me reintroduce what you liar and forger deliberately removed:

    Gabx <victor@tcpreset.virebent> wrote:
    Yamn2 Remailer wrote:
    Looks like poisoned snake oil offered by GarbageX!

    This is the classic non-technical critique from people who blindly trust >>>closed-source software with ambiguous licenses while lecturing others >>>about privacy.

    I repeat: "closed-source software"

    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    Which you're a judge of? OMG!


    First of all, OmniMix isn't closed source software even if you repeat
    that lie again and again. Why do you do that as you know better? Fact
    is that with OmniMix you even get the complete IDE, which with a few
    mouse clicks builds the executable program on your computer ready to be
    run in a debugger step by step and compared with the file from the
    installation package byte by byte. You're in control of everything!

    "Providing an IDE to compile is not equivalent to 'open source' in the
    OSI definition.
    Open source requires:

    - Public source code repository
    - OSI-approved license (GPL, MIT, BSD, etc.)
    - Right to modify and redistribute

    If OmniMix meets these criteria, I stand corrected.
    A link to the public repository would clarify this."

    Reread <20250920095312.C1E173E76F@mail.tcpreset.net> ff., liar!


    Now to your web interface. There we have the exact oposite. You
    present us source code, but whether that's what processes our data is
    beyond our control. Even if we once or twice download the published
    code the next time for whatever reason it may be different and
    compromize our identity. A system for gamblers.

    For maximum security: Self-host your own instance. That's why it's
    open source.

    So we have to run our own webserver to get some kind of security? OMG!


    Furthermore, the anonymity of our plain text messages is secured by an
    extremely weak real-time Tor connection of usually no more than 3 nodes
    while with OmniMix you're allowed to route your data through much longer
    Tor circuits and those data aren't plain text but multilayer-encrypted
    remailer packets.

    Calling Tor "extremely weak" with "no more than 3 nodes" shows a
    fundamental misunderstanding of the architecture, for both tor and m2usenet.

    m2usenet routes through THREE Tor hidden services:
    1. Pluto2 SMTP relay (.onion)
    2. mail2news gateway (.onion)
    3. NNTP server (.onion)

    Each hidden service connection uses 3 hops. Total: 9+ hops minimum.

    And at every stage the clear text message is available! OMG!


    Calling this "weak" is not a technical argument, it's dismissive rhetoric.

    Ciruits of 3 Tor nodes providing strong anonymity? OMG!


    And then there still is the unanswered question of a signature based on
    a single-use throwaway key, where the user only gets knowledge of the
    public key but not the secret key or the passphrase, both only known to
    you as the service provider. That's weird. It doesn't verify anything.
    It just proves that the user is stupid enough to deal with your insecure
    web interface.

    - keyPair generated client-side
    - keyPair.secretKey stays IN BROWSER MEMORY (never transmitted)
    - Only publicKey + signature sent to server
    - Server CANNOT access secretKey

    So what is it all about when even the user can't access the secret key
    to reuse it? OMG!


    Equally weird is your statement about Hashcash bits in MID
    <1760739178.dcc2021df3109aecc5b428f2d8ff300f@m2usenet.local>:

    | 16bit option is fast.
    | But not recommended, thou !

    So you recommend spammers for fairness reasons to select more bits? No
    kidding?

    The difficulty levels serve different purposes:

    - 16 bits: Prevents message flooding

    It reads:

    | 16 bits (very fast, ~instant - recommended fot Tor Browser)

    So with "instant" you prevent message flooding? OMG!

    - 20 bits (default): Balanced protection (~5-10 seconds per post)
    - 24 bits: Strong protection (~30-60 seconds per post)
    - 28 bits: Very strong (~several minutes per post)

    Now tell us the reason why a user should select more that the 16 bit
    option? To warm up his home? OMG!


    Real spammers use botnets with GPU/ASIC mining, not browser interfaces.
    A web UI with mandatory proof-of-work is specifically designed to
    PREVENT automated spam tools.

    Man! You're really a droll fellow.

    Gabx

    You're not droll. You're a troll, a liar, a forger, simply an idiot!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 17:57:33 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:

    So this response isn't for the trolls or the blind fanboys.
    It's for anyone who genuinely wants to understand the technical details.

    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    I'm not part of them but I wonder why the experts continued to enhance Mixmaster and Yamn remailing after the Tor network started in 2006?
    Stupidity? Or ample spare time? I doubt it.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 19:06:29 2025
    From Newsgroup: sci.crypt

    Anonymous wrote:
    You're not droll. You're a troll, a liar, a forger, simply an idiot!

    Lol

    If you use omnimix and you're happy to do so, use it, I have nothing
    against it, then you're so technical that you surely know what you're
    doing, keep using omnimix.

    Once again, there is nothing technical to answer, other than a stupid
    and childish, "omnimix is rCirCibetter, you suck".

    Just troll considerations and that's it.

    I've already given you too much confidence.

    Get a life baby !!!
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@oc2mx.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 19:21:31 2025
    From Newsgroup: sci.crypt

    Yamn Remailer wrote:
    Gabx <info@tcpreset.invalid> wrote:

    So this response isn't for the trolls or the blind fanboys.
    It's for anyone who genuinely wants to understand the technical details.

    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    I'm not part of them but I wonder why the experts continued to enhance Mixmaster and Yamn remailing after the Tor network started in 2006? Stupidity? Or ample spare time? I doubt it.


    Please explain. What was introcuded IIRC was that Elvis added 4k key
    support to Mixmaster and Zax added modern Crypto and anti-tagging to
    YAMN. So what more anonymity you gain with them when already using Tor?

    With YAMN's security flaws you can be easily de-anonymized.
    --
    https://tilde.club/~pollux/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 20:04:34 2025
    From Newsgroup: sci.crypt

    Anonymous wrote:
    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    Which you're a judge of? OMG!

    You acted so tough and now you're crying?
    "Providing an IDE to compile is not equivalent to 'open source' in the
    OSI definition.
    Open source requires:

    - Public source code repository
    - OSI-approved license (GPL, MIT, BSD, etc.)
    - Right to modify and redistribute

    It's not opensource !

    For maximum security: Self-host your own instance. That's why it's
    open source.

    So we have to run our own webserver to get some kind of security? OMG!

    Omnimix does run its own internal servers.
    Ok maybe you ignore it, this is taken from the official site, but
    omnimix has servers, check this out: https://www.danner-net.de/omom/tutorinstall.htm
    :O that's amazing isn't it?

    rCo*Tor* Used for an additional anonymization of the connections from your computer to the Internet. It hides which servers you contact and which
    of their services (mail delivery and retrieval, Usenet access to
    download nym messages etc.) you use. You're allowed to integrate a
    preexisting Tor installation as well, but keep in mind, that all
    connections that use the same Tor routing might be assigned to each
    other by an adversary! On the other hand there's no restriction in
    running several Tor systems simultaneously. The Tor client integrated in OmniMix offers the advantage of having the whole anonymizer software
    removable in one place without leaving any traces elsewhere.

    rCo*Hamster* News server used to download the alt.anonymous.messages newsgroup and cache it locally in order to extract nym reply messages.

    You're against servers and no one warned you before installing?

    You see? I'm right!

    Furthermore, the anonymity of our plain text messages is secured by an
    extremely weak real-time Tor connection of usually no more than 3 nodes
    while with OmniMix you're allowed to route your data through much longer >>> Tor circuits and those data aren't plain text but multilayer-encrypted
    remailer packets.

    3 hopes is considered standard enough !

    **Behavioral Fingerprinting**
    "Using non-standard circuit lengths makes you part of a tiny, easily identifiable subset. If only 0.1% of Tor users run modified clients, you become statistically unique.

    **Failure Cascade**
    Each additional hop increases circuit failure rates. A 7-hop circuit can experience up to 8% failures, making connections unreliable, compared to
    ~1% for a standard circuit.

    **Timing Analysis Vulnerability**
    Extended circuits create distinctive timing patterns during their
    construction that can be fingerprinted, potentially revealing your
    modified client to network monitors.

    **Compromised Node Paradox**
    More hops mean a higher probability of hitting a compromised or
    malicious node within the circuit, increasing your overall risk exposure.


    Important Security Consideration: Better performance for specific
    protocols like email doesn't magically fix the fundamental
    fingerprinting vulnerabilities. You are still marking yourself as a
    unique user.

    This is not just me saying this but this link also talks about it.

    https://www.sciencedirect.com/topics/computer-science/compromised-node

    Calling Tor "extremely weak" with "no more than 3 nodes" shows a
    fundamental misunderstanding of the architecture, for both tor and m2usenet. >>
    m2usenet routes through THREE Tor hidden services:
    1. Pluto2 SMTP relay (.onion)
    2. mail2news gateway (.onion)
    3. NNTP server (.onion)

    Each hidden service connection uses 3 hops. Total: 9+ hops minimum.

    And at every stage the clear text message is available! OMG!

    ???????

    I don't understand what you're talking about.
    so I cut the rest.
    It's not based on any real facts, anyway.
    it's just nonsense.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Nomen Nescio@nobody@dizum.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 20:50:22 2025
    From Newsgroup: sci.crypt

    In article <10d1ksn$g5u0$1@news.tcpreset.net> GarbageX wrote:
    Yamn2 Remailer wrote:
    So you recommend spammers for fairness reasons to select more bits? No
    kidding?

    Man! You're really a droll fellow.


    You think it's week we can talk about,

    It's neither week nor month nor year. It's just BS!


    but this is not the way to say it.

    Maybe you understand it the way I now described it above.


    Yes omnimix is the best.

    Lunga vita

    +1



    Gabx

    My deepest condolences.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 22:24:57 2025
    From Newsgroup: sci.crypt

    Gabx wrote:
    Anonymous wrote:
    You're not droll. You're a troll, a liar, a forger, simply an idiot!

    Lol

    If you use omnimix and you're happy to do so, use it, I have nothing
    against it, then you're so technical that you surely know what you're
    doing, keep using omnimix.

    Once again, there is nothing technical to answer, other than a stupid
    and childish, "omnimix is ??better, you suck".


    There've been many technical questions you just refused to answer as
    that wouldn't have been in your favour.



    Just troll considerations and that's it.


    Considerations of a troll. Yes, they are.



    I've already given you too much confidence.

    Get a life baby !!!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 16:46:32 2025
    From Newsgroup: sci.crypt

    Stefan Claas <bounce.me@oc2mx.net> wrote:
    Yamn Remailer wrote:
    Gabx <info@tcpreset.invalid> wrote:

    So this response isn't for the trolls or the blind fanboys.
    It's for anyone who genuinely wants to understand the technical details. >> >
    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    I'm not part of them but I wonder why the experts continued to enhance
    Mixmaster and Yamn remailing after the Tor network started in 2006?
    Stupidity? Or ample spare time? I doubt it.


    Please explain. What was introcuded IIRC was that Elvis added 4k key
    support to Mixmaster and Zax added modern Crypto and anti-tagging to
    YAMN.

    Which wouldn't have be done if not worth it considering Tor. And with
    such minimal further improvements required it looks like it's an already perfect concept. It may only lack alternative inter-remailer
    communication through Tor though that isn't a core remailer task but a
    simple MTA configuration issue.

    So what more anonymity you gain with them when already using Tor?

    We already told you that multiple times.


    With YAMN's security flaws you can be easily de-anonymized.

    Which security flaws? You don't think of Internet I/O which anyhow has
    to be handled by specialized communication software like OmniMix?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@oc2mx.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 23:08:58 2025
    From Newsgroup: sci.crypt

    Anonymous User wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:

    With YAMN's security flaws you can be easily de-anonymized.

    Which security flaws? You don't think of Internet I/O which anyhow has
    to be handled by specialized communication software like OmniMix?

    First of all, Zax should IMHO seperate the client form the remailer
    code, so that users can focus on one program.

    I do not use OmniMix, so I can't speak for it.

    YAMN has the following security flaws:

    a) It does not want onion addresses to been used in the MX code
    and Zax should really tell us why!

    b) Users new to remailing with YAMN, see only at his repository
    minimal configuration files, which are of not much help, IMHO.

    But the problem is, if you do not look close at his source code
    IIRC in config.go, the YAMN client, when set-up not properly,
    with socat, can and does bypass your Tor settings in socat and
    sends via clearnet to mixmin, filling up his log files and then
    crashing his server. Remops know that when analyzing MTA logs
    that they include the IP address from the originating client, if
    Tor is bypassed, and to whom the email goes. *That is definetily
    an absolute no-go* and Zax should explain to us why he coded it
    that way for client usage, if users are unaware of this! I am
    talking of the internal MXRelay = true setting, which should
    be by default set to false in his source code. Mixmaster IIRC
    does not do this.

    c) Zax should better use Go's proxy package for a seperate
    YAMN client, so that stats and pub keys can be fetched via
    Tor and also remailing is done via Tor.

    He should really tell us all, what has driven him to not
    like onions, which can be seen IIRC in mail.go.

    YAMN in it's current form tells me unfortunately that you
    must rely on the old a.p.a-s saying "trust nobody" :-(

    Hence the reasone I released yamn-proxy. :-)

    https://github.com/Ch1ffr3punk/yamn-proxy

    Regards
    Stefan
    --
    https://tilde.club/~pollux/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Sun Oct 19 17:16:34 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:
    Anonymous wrote:
    Yamn2 Remailer wrote:
    As you also post to sci.crypt we have here experts in this field.

    And you are not part of them.

    Which you're a judge of? OMG!

    You acted so tough and now you're crying?
    "Providing an IDE to compile is not equivalent to 'open source' in the
    OSI definition.
    Open source requires:

    - Public source code repository
    - OSI-approved license (GPL, MIT, BSD, etc.)
    - Right to modify and redistribute

    It's not opensource !

    For maximum security: Self-host your own instance. That's why it's
    open source.

    So we have to run our own webserver to get some kind of security? OMG!

    Omnimix does run its own internal servers.
    Ok maybe you ignore it, this is taken from the official site, but
    omnimix has servers, check this out: >https://www.danner-net.de/omom/tutorinstall.htm
    :O that's amazing isn't it?

    rCo*Tor* Used for an additional anonymization of the connections from your >computer to the Internet. It hides which servers you contact and which
    of their services (mail delivery and retrieval, Usenet access to
    download nym messages etc.) you use. You're allowed to integrate a >preexisting Tor installation as well, but keep in mind, that all
    connections that use the same Tor routing might be assigned to each
    other by an adversary! On the other hand there's no restriction in
    running several Tor systems simultaneously. The Tor client integrated in >OmniMix offers the advantage of having the whole anonymizer software >removable in one place without leaving any traces elsewhere.

    rCo*Hamster* News server used to download the alt.anonymous.messages >newsgroup and cache it locally in order to extract nym reply messages.

    You're against servers and no one warned you before installing?

    Nobody is against a mail server to transfer mail. But why introduce a webserver for that task? OMG!



    You see? I'm right!

    You see?



    Furthermore, the anonymity of our plain text messages is secured by an >>>> extremely weak real-time Tor connection of usually no more than 3 nodes >>>> while with OmniMix you're allowed to route your data through much longer >>>> Tor circuits and those data aren't plain text but multilayer-encrypted >>>> remailer packets.

    3 hopes is considered standard enough !

    In this group there once was a risk calculation which didn't look very promising with only 3 hops. I wouldn't bet on it.



    **Behavioral Fingerprinting**
    "Using non-standard circuit lengths makes you part of a tiny, easily >identifiable subset. If only 0.1% of Tor users run modified clients, you >become statistically unique.

    No proof.



    **Failure Cascade**
    Each additional hop increases circuit failure rates. A 7-hop circuit can >experience up to 8% failures, making connections unreliable, compared to
    ~1% for a standard circuit.

    I experience no problems at all. And with SMTP the server acknowledges reception, which means a failed transmission is redone.


    **Timing Analysis Vulnerability**
    Extended circuits create distinctive timing patterns during their >construction that can be fingerprinted, potentially revealing your
    modified client to network monitors.

    No proof.



    **Compromised Node Paradox**
    More hops mean a higher probability of hitting a compromised or
    malicious node within the circuit, increasing your overall risk exposure.

    You may not know but a single compromised node within a circuit means
    nothing. But longer circuits immensely reduce the risk of a compromised complete circuit.




    Important Security Consideration: Better performance for specific
    protocols like email doesn't magically fix the fundamental
    fingerprinting vulnerabilities. You are still marking yourself as a
    unique user.

    You've no idea.



    This is not just me saying this but this link also talks about it.

    https://www.sciencedirect.com/topics/computer-science/compromised-node

    I'm not your nanny. What exactly does it say in this context?



    Calling Tor "extremely weak" with "no more than 3 nodes" shows a
    fundamental misunderstanding of the architecture, for both tor and m2usenet.

    m2usenet routes through THREE Tor hidden services:
    1. Pluto2 SMTP relay (.onion)
    2. mail2news gateway (.onion)
    3. NNTP server (.onion)

    Each hidden service connection uses 3 hops. Total: 9+ hops minimum.

    And at every stage the clear text message is available! OMG!

    ???????

    OMG, you're really an idiot.

    If the SMTP relay, the m2n gateway and the news server get hold of the
    same cleartext message. So why in the world is an anonymizing Tor chain
    needed for the transmission paths between them?

    And now it's up to you to recalculate how many relevant Tor hops remain.



    I don't understand what you're talking about.

    That's obvious.


    so I cut the rest.
    It's not based on any real facts, anyway.
    it's just nonsense.

    You mean your funny Hashcash stupidity? I'm still mightily amused.



    Gabx

    Btw, do you keep a record of how often you repeated asking the same
    stupid questions? It gets tiring.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 00:49:16 2025
    From Newsgroup: sci.crypt

    Stefan Claas <bounce.me@oc2mx.net> wrote:
    Anonymous User wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:

    With YAMN's security flaws you can be easily de-anonymized.

    Which security flaws? You don't think of Internet I/O which anyhow has
    to be handled by specialized communication software like OmniMix?

    First of all, Zax should IMHO seperate the client form the remailer
    code, so that users can focus on one program.

    Doesn't look like a problem for OmniMix.


    I do not use OmniMix, so I can't speak for it.

    So you stir up hatred against it though you're not competent
    talking about it. That paints a queer character.


    YAMN has the following security flaws:

    a) It does not want onion addresses to been used in the MX code
    and Zax should really tell us why!

    With its advanced delivery strategy OmniMix does a much better
    job in forwarding remailer packets than any remailer packet
    encoder could ever do.


    b) Users new to remailing with YAMN, see only at his repository
    minimal configuration files, which are of not much help, IMHO.

    Users new to remailing should use a GUI like OmniMix or QS/L.
    There's so much that can go wrong. And all that copying &
    pasting is boring and prone to errors. Fortunately there's no
    reason to reinvent the wheel and learn command line commands.


    But the problem is, if you do not look close at his source code
    IIRC in config.go, the YAMN client, when set-up not properly,
    with socat, can and does bypass your Tor settings in socat and
    sends via clearnet to mixmin, filling up his log files and then
    crashing his server. Remops know that when analyzing MTA logs
    that they include the IP address from the originating client, if
    Tor is bypassed, and to whom the email goes. *That is definetily
    an absolute no-go* and Zax should explain to us why he coded it
    that way for client usage, if users are unaware of this! I am
    talking of the internal MXRelay = true setting, which should
    be by default set to false in his source code. Mixmaster IIRC
    does not do this.

    c) Zax should better use Go's proxy package for a seperate
    YAMN client, so that stats and pub keys can be fetched via
    Tor and also remailing is done via Tor.

    OmniMix does all this on its own.

    But with YAMN Steve did a great job in packet creation fixing
    known Mixmaster flaws and moving to more stylish crypto
    algorithms. The rest is of minor importance.

    You as a Linux guy should be accustomed to task separation with
    a GUI integrating all of those components? OmniMix is just
    that.


    He should really tell us all, what has driven him to not
    like onions, which can be seen IIRC in mail.go.

    YAMN in it's current form tells me unfortunately that you
    must rely on the old a.p.a-s saying "trust nobody" :-(

    Hence the reasone I released yamn-proxy. :-)

    But a properly configured MTA would do it as well.


    https://github.com/Ch1ffr3punk/yamn-proxy

    Regards
    Stefan

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 03:36:13 2025
    From Newsgroup: sci.crypt

    Anonymous User wrote:
    Furthermore, the anonymity of our plain text messages is secured by an >>>>> extremely weak real-time Tor connection of usually no more than 3 nodes >>>>> while with OmniMix you're allowed to route your data through much longer >>>>> Tor circuits and those data aren't plain text but multilayer-encrypted >>>>> remailer packets.

    3 hopes is considered standard enough !

    In this group there once was a risk calculation which didn't look very promising with only 3 hops. I wouldn't bet on it.

    Show me that calculation.
    it's probably measuring single-node compromise instead of (entry+exit
    timing correlation).

    If an adversary controls both your entry and exit nodes (the real
    threat), they can do timing correlation.

    Adding middle hops doesn't defend against that, they still see timing
    patterns at entry and exit.

    **Behavioral Fingerprinting**
    "Using non-standard circuit lengths makes you part of a tiny, easily
    identifiable subset. If only 0.1% of Tor users run modified clients, you
    become statistically unique.

    No proof.


    You're demanding "proof" while ignoring established research.
    Show me YOUR proof that 7-hop circuits are safe. I'll wait.

    The Tor Browser Bundle locks down everything (window size, fonts,
    JavaScript behavior) specifically to prevent fingerprinting.

    Yet you think running 7-hop circuits makes you invisible?
    You're making yourself *more* identifiable, not less.

    **Failure Cascade**
    Each additional hop increases circuit failure rates. A 7-hop circuit can
    experience up to 8% failures, making connections unreliable, compared to
    ~1% for a standard circuit.

    I experience no problems at all. And with SMTP the server acknowledges reception, which means a failed transmission is redone.

    "I don't notice problems" isn't the same as "problems don't exist".
    SMTP retries don't eliminate failures, they mask them.
    Your 7-hop circuits are failing and rebuilding more often you don't
    notice it because SMTP hides it as "occasional slowness".

    **Timing Analysis Vulnerability**
    Extended circuits create distinctive timing patterns during their
    construction that can be fingerprinted, potentially revealing your
    modified client to network monitors.

    No proof.


    Dude, circuits take time to build.
    Yours takes longer because it's 7 hops instead of 3.
    Anyone watching network timing can notice it, voil|a ...
    unusual behavior = fingerprint


    **Compromised Node Paradox**
    More hops mean a higher probability of hitting a compromised or
    malicious node within the circuit, increasing your overall risk exposure.

    You may not know but a single compromised node within a circuit means nothing. But longer circuits immensely reduce the risk of a compromised complete circuit.

    You're right that one compromised node means nothing.
    But wrong about longer circuits helping.
    If an adversary controls your entry AND exit, they correlate timing.
    Middle nodes don't help.
    You're just adding latency and making yourself stand out.


    Important Security Consideration: Better performance for specific
    protocols like email doesn't magically fix the fundamental
    fingerprinting vulnerabilities. You are still marking yourself as a
    unique user.

    You've no idea.



    This is not just me saying this but this link also talks about it.

    https://www.sciencedirect.com/topics/computer-science/compromised-node

    I'm not your nanny. What exactly does it say in this context?


    I'm not your nanny.
    What exactly does it say in this context?
    Have a reading, conar !!!

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    Show me ONE paper that says custom circuit lengths are *safe*.
    Otherwise you're just running on vibes and assumptions.

    The guy who doesn't like a webserver on localhost.

    Bravo !!!!
    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 03:41:31 2025
    From Newsgroup: sci.crypt

    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@oc2mx.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 07:16:00 2025
    From Newsgroup: sci.crypt

    Yamn2 Remailer wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:
    Anonymous User wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:

    With YAMN's security flaws you can be easily de-anonymized.

    Which security flaws? You don't think of Internet I/O which anyhow has to be handled by specialized communication software like OmniMix?

    First of all, Zax should IMHO seperate the client form the remailer
    code, so that users can focus on one program.

    Doesn't look like a problem for OmniMix.

    But who uss OmniMix? Only a handful of a.p.a-s users which
    is not the global majority of remailer users.


    I do not use OmniMix, so I can't speak for it.

    So you stir up hatred against it though you're not competent
    talking about it. That paints a queer character.

    With using I mean regularly, soory. I have tested a couple of times
    of course too.

    YAMN has the following security flaws:

    a) It does not want onion addresses to been used in the MX code
    and Zax should really tell us why!

    With its advanced delivery strategy OmniMix does a much better
    job in forwarding remailer packets than any remailer packet
    encoder could ever do.

    See above.

    b) Users new to remailing with YAMN, see only at his repository
    minimal configuration files, which are of not much help, IMHO.

    Users new to remailing should use a GUI like OmniMix or QS/L.
    There's so much that can go wrong. And all that copying &
    pasting is boring and prone to errors. Fortunately there's no
    reason to reinvent the wheel and learn command line commands.

    No, they use what they see at GitHub and elsewhere.

    But the problem is, if you do not look close at his source code
    IIRC in config.go, the YAMN client, when set-up not properly,
    with socat, can and does bypass your Tor settings in socat and
    sends via clearnet to mixmin, filling up his log files and then
    crashing his server. Remops know that when analyzing MTA logs
    that they include the IP address from the originating client, if
    Tor is bypassed, and to whom the email goes. *That is definetily
    an absolute no-go* and Zax should explain to us why he coded it
    that way for client usage, if users are unaware of this! I am
    talking of the internal MXRelay = true setting, which should
    be by default set to false in his source code. Mixmaster IIRC
    does not do this.

    c) Zax should better use Go's proxy package for a seperate
    YAMN client, so that stats and pub keys can be fetched via
    Tor and also remailing is done via Tor.

    OmniMix does all this on its own.

    See above.

    But with YAMN Steve did a great job in packet creation fixing
    known Mixmaster flaws and moving to more stylish crypto
    algorithms. The rest is of minor importance.

    You mean this theorethic Ritter's tagging attack?

    You as a Linux guy should be accustomed to task separation with
    a GUI integrating all of those components? OmniMix is just
    that.

    Please don't repeat the OmniMix usage.

    He should really tell us all, what has driven him to not
    like onions, which can be seen IIRC in mail.go.

    YAMN in it's current form tells me unfortunately that you
    must rely on the old a.p.a-s saying "trust nobody" :-(

    Hence the reasone I released yamn-proxy. :-)

    But a properly configured MTA would do it as well.

    An MTA has nothing to do with what I have described and Zax
    owes us an explanation.
    --
    https://tilde.club/~pollux/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 13:21:46 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, it isn't in the sense of free software, which is good, as you aren't allowed to play around with it and publish forged versions to torpedo development and irritate users.

    But you damned liar repeatedly wrote it is closed-source, which it
    isn't. The source code is available, which you asshole know very well.

    Meanwhile every participant in this group knows what malicious figures
    you and your buddy are. I don't think any further explanations are
    required.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 11:25:14 2025
    From Newsgroup: sci.crypt

    Stefan Claas wrote:
    Yamn2 Remailer wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:
    Anonymous User wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:

    With YAMN's security flaws you can be easily de-anonymized.

    Which security flaws? You don't think of Internet I/O which anyhow has >> > > to be handled by specialized communication software like OmniMix?

    First of all, Zax should IMHO seperate the client form the remailer
    code, so that users can focus on one program.

    Doesn't look like a problem for OmniMix.

    But who uss OmniMix? Only a handful of a.p.a-s users which
    is not the global majority of remailer users.

    You have user statistics? Interesting.



    I do not use OmniMix, so I can't speak for it.

    So you stir up hatred against it though you're not competent
    talking about it. That paints a queer character.

    With using I mean regularly, soory. I have tested a couple of times
    of course too.

    Liar! Those who "test" it must see that OM doesn't use MM or YAMN for
    any internet task.


    YAMN has the following security flaws:

    a) It does not want onion addresses to been used in the MX code
    and Zax should really tell us why!

    With its advanced delivery strategy OmniMix does a much better
    job in forwarding remailer packets than any remailer packet
    encoder could ever do.

    See above.

    Means you have no idea.


    b) Users new to remailing with YAMN, see only at his repository
    minimal configuration files, which are of not much help, IMHO.

    Users new to remailing should use a GUI like OmniMix or QS/L.
    There's so much that can go wrong. And all that copying &
    pasting is boring and prone to errors. Fortunately there's no
    reason to reinvent the wheel and learn command line commands.

    No, they use what they see at GitHub and elsewhere.

    Sure, newbies look at GitHub/-Lab, then install the respective IDE on
    their own to finally compile the program from the source code.


    But the problem is, if you do not look close at his source code
    IIRC in config.go, the YAMN client, when set-up not properly,
    with socat, can and does bypass your Tor settings in socat and
    sends via clearnet to mixmin, filling up his log files and then
    crashing his server. Remops know that when analyzing MTA logs
    that they include the IP address from the originating client, if
    Tor is bypassed, and to whom the email goes. *That is definetily
    an absolute no-go* and Zax should explain to us why he coded it
    that way for client usage, if users are unaware of this! I am
    talking of the internal MXRelay = true setting, which should
    be by default set to false in his source code. Mixmaster IIRC
    does not do this.

    c) Zax should better use Go's proxy package for a seperate
    YAMN client, so that stats and pub keys can be fetched via
    Tor and also remailing is done via Tor.

    OmniMix does all this on its own.

    See above.

    Means you have no idea.


    But with YAMN Steve did a great job in packet creation fixing
    known Mixmaster flaws and moving to more stylish crypto
    algorithms. The rest is of minor importance.

    You mean this theorethic Ritter's tagging attack?

    Right. More hadn't to be done.


    You as a Linux guy should be accustomed to task separation with
    a GUI integrating all of those components? OmniMix is just
    that.

    Please don't repeat the OmniMix usage.

    Its perfection hurts, I know.


    He should really tell us all, what has driven him to not
    like onions, which can be seen IIRC in mail.go.

    YAMN in it's current form tells me unfortunately that you
    must rely on the old a.p.a-s saying "trust nobody" :-(

    Hence the reasone I released yamn-proxy. :-)

    But a properly configured MTA would do it as well.

    An MTA has nothing to do with what I have described and Zax
    owes us an explanation.

    You don't need any mumbo jumbo to forward remailer packets sitting in a
    data folder. That's what MTAs are for.

    But a profile-hungry amateur who repeatedly tries to reinvent something
    and in the end makes it worse than ever before surely knows better.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 14:03:56 2025
    From Newsgroup: sci.crypt

    Fritz Wuehler wrote:
    But you damned liar repeatedly wrote it is closed-source, which it
    isn't. The source code is available, which you asshole know very well.

    Meanwhile every participant in this group knows what malicious figures
    you and your buddy are. I don't think any further explanations are
    required.

    Miserable liar.

    If I had said closed source I would still have given dignity to a
    license which is actually AMBIGUOUS, the right term.
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 14:10:09 2025
    From Newsgroup: sci.crypt

    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, it isn't in the sense of free software, which is good, as you aren't allowed to play around with it and publish forged versions to torpedo development and irritate users.

    The usual Microsoft policy, one foot in every customer segment, to
    embrace as many market segments as possible, where the only consistency
    is to make more money than the day before.

    i had enough of u
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 08:27:12 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Furthermore, the anonymity of our plain text messages is secured by an >>>>>> extremely weak real-time Tor connection of usually no more than 3 nodes >>>>>> while with OmniMix you're allowed to route your data through much longer >>>>>> Tor circuits and those data aren't plain text but multilayer-encrypted >>>>>> remailer packets.

    3 hopes is considered standard enough !

    In this group there once was a risk calculation which didn't look very
    promising with only 3 hops. I wouldn't bet on it.

    Show me that calculation.
    it's probably measuring single-node compromise instead of (entry+exit
    timing correlation).

    It isn't about timing correlation but the risk of all nodes in one hand,
    which with just 3 nodes is very concerning.


    If an adversary controls both your entry and exit nodes (the real
    threat), they can do timing correlation.

    You got it. That's why Tor independent of circuit length isn't a very
    secure anonymization instrument and Type II remailing as the best
    strategy in this field has to be used.


    Adding middle hops doesn't defend against that, they still see timing >patterns at entry and exit.

    Correct. But controlling the complete 3-hop chain is much easier to
    achieve and thereby the bigger risk.


    **Behavioral Fingerprinting**
    "Using non-standard circuit lengths makes you part of a tiny, easily
    identifiable subset. If only 0.1% of Tor users run modified clients, you >>> become statistically unique.

    No proof.


    You're demanding "proof" while ignoring established research.
    Show me YOUR proof that 7-hop circuits are safe. I'll wait.

    Read the Tor specs and you'll find out that no node gets any information
    about circuit length.


    The Tor Browser Bundle locks down everything (window size, fonts,
    JavaScript behavior) specifically to prevent fingerprinting.

    Yet you think running 7-hop circuits makes you invisible?
    You're making yourself *more* identifiable, not less.

    Wrong.


    **Failure Cascade**
    Each additional hop increases circuit failure rates. A 7-hop circuit can >>> experience up to 8% failures, making connections unreliable, compared to >>> ~1% for a standard circuit.

    I experience no problems at all. And with SMTP the server acknowledges
    reception, which means a failed transmission is redone.

    "I don't notice problems" isn't the same as "problems don't exist".
    SMTP retries don't eliminate failures, they mask them.
    Your 7-hop circuits are failing and rebuilding more often you don't
    notice it because SMTP hides it as "occasional slowness".

    Utter GarbageX. If a circuit fails during a transaction the connection
    is aborted and the client has to reconnect, which is visible.


    **Timing Analysis Vulnerability**
    Extended circuits create distinctive timing patterns during their
    construction that can be fingerprinted, potentially revealing your
    modified client to network monitors.

    No proof.


    Dude, circuits take time to build.
    Yours takes longer because it's 7 hops instead of 3.
    Anyone watching network timing can notice it, voila ...
    unusual behavior = fingerprint

    The Tor network consists of faster and slower nodes dependent on
    hardware, bandwidth, throughput a.s.o. Then some nodes do work and some
    don't, which causes recurring connection attempts till the circuit is
    built. And the last nodes of the circuit don't even notice anything of
    that until they are finally contacted. How in the world will they know
    about circuit length? Just have a look at OM's Tor log and you'll see.



    **Compromised Node Paradox**
    More hops mean a higher probability of hitting a compromised or
    malicious node within the circuit, increasing your overall risk exposure. >>
    You may not know but a single compromised node within a circuit means
    nothing. But longer circuits immensely reduce the risk of a compromised
    complete circuit.

    You're right that one compromised node means nothing.
    But wrong about longer circuits helping.
    If an adversary controls your entry AND exit, they correlate timing.
    Middle nodes don't help.

    We already had that and in this respect you're absolutely right. Tor is immanently a very unsecure anonymization tool unfit for vital tasks.

    You're just adding latency and making yourself stand out.

    Wrong as already explained. Or is there any publication, which
    demonstrates the exit node's capability of knowing circuit lengths?
    Wouldn't researchers be eagerly waiting for such an important issue?



    Important Security Consideration: Better performance for specific
    protocols like email doesn't magically fix the fundamental
    fingerprinting vulnerabilities. You are still marking yourself as a
    unique user.

    You've no idea.



    This is not just me saying this but this link also talks about it.

    https://www.sciencedirect.com/topics/computer-science/compromised-node

    I'm not your nanny. What exactly does it say in this context?


    I'm not your nanny.
    What exactly does it say in this context?
    Have a reading, conar !!!

    It's a general paper about compromized network nodes, much of which
    doesn't apply to the Tor network. So what?


    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.


    Show me ONE paper that says custom circuit lengths are *safe*.

    RTFM! If you find anything that proves you right post it here.

    Otherwise you're just running on vibes and assumptions.

    The guy who doesn't like a webserver on localhost.

    I like webservers on localhost, just not those which make no sense.

    And you only brought that local server up to hide the active contents insecurity of your dangerous m2usenet gateway.


    Bravo !!!!
    Gabx

    You're a disgrace, nothing more than a pimple on the ass of history.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Stefan Claas@bounce.me@oc2mx.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 15:15:45 2025
    From Newsgroup: sci.crypt

    Anonymous wrote:
    Stefan Claas wrote:
    Yamn2 Remailer wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:
    Anonymous User wrote:
    Stefan Claas <bounce.me@oc2mx.net> wrote:

    With YAMN's security flaws you can be easily de-anonymized.

    Which security flaws? You don't think of Internet I/O which anyhow has
    to be handled by specialized communication software like OmniMix?

    First of all, Zax should IMHO seperate the client form the remailer code, so that users can focus on one program.

    Doesn't look like a problem for OmniMix.

    But who uss OmniMix? Only a handful of a.p.a-s users which
    is not the global majority of remailer users.

    You have user statistics? Interesting.

    You don't need user statistics, because Omnimix is not on GitHub
    nor im privacy tutorials (EFF etc.) nor do people speak about
    OmniMix in privacy forums. It is really only a handful Windows
    users, which are using OmniMix and only for mostly shit they post.
    --
    https://tilde.club/~pollux/
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 09:32:15 2025
    From Newsgroup: sci.crypt

    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, it isn't in the sense of free software, which is good, as you aren't >allowed to play around with it and publish forged versions to torpedo >development and irritate users.

    +1

    Two decades of solid work. What more has to be said?

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@yamn.paranoici.org to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 14:30:16 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:

    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, it isn't in the sense of free software, which is good, as you aren't
    allowed to play around with it and publish forged versions to torpedo
    development and irritate users.

    The usual Microsoft policy, one foot in every customer segment, to
    embrace as many market segments as possible, where the only consistency
    is to make more money than the day before.

    i had enough of u


    Too bad that your financial dreams don't materialize. My condolences!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn2 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 15:39:39 2025
    From Newsgroup: sci.crypt

    GarbageX wrote:

    i had enough of u

    I'm sure that idiot will try again. The clock is ticking... :(

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 16:13:18 2025
    From Newsgroup: sci.crypt

    In article <10d58r5$rrqm$1@news.tcpreset.net> Gabx <info@tcpreset.invalid> wrote:

    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, it isn't in the sense of free software, which is good, as you aren't
    allowed to play around with it and publish forged versions to torpedo
    development and irritate users.

    The usual Microsoft policy, one foot in every customer segment, to
    embrace as many market segments as possible, where the only consistency
    is to make more money than the day before.

    i had enough of u


    I'm sure software billionaire Christian Danner living on his luxory yacht now laughs at you.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 17:59:13 2025
    From Newsgroup: sci.crypt

    Anonymous User wrote:
    Read the Tor specs and you'll find out that no node gets any information about circuit length.

    You're correct that individual nodes cannot determine circuit length
    from their position in the chain.

    However, you're confusing node-level visibility with network-level observability.

    https://support.torproject.org/misc/misc-11/

    The Tor Browser Bundle locks down everything (window size, fonts,
    JavaScript behavior) specifically to prevent fingerprinting.

    Yet you think running 7-hop circuits makes you invisible?
    You're making yourself *more* identifiable, not less.

    Wrong.

    You keep ignoring actual research:

    - USENIX Security 2015: "Circuit Fingerprinting Attacks" 98%+ accuracy
    in identifying non-standard circuits.

    - Traffic analysis can distinguish modified circuits even when
    application traffic is identical.


    I provided evidence, you contributed nothing.

    Blagger

    Non-standard circuits are fingerprint-able with 98%+ accuracy.

    https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwon

    You demanded proof. There it is.
    Official Tor Project says you're wrong. Academic research confirms it.

    Show me ONE official Tor document recommending 7-hop circuits.

    You fundamentally misunderstand hidden service architecture.

    Yes, I control three hidden services: SMTP gateway, mail2news, and NNTP server.

    But I control just the application endpoints, not the the Tor circuits.

    Conar !!!


    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@nobody@remailer.paranoici.org to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 16:53:27 2025
    From Newsgroup: sci.crypt

    On Mon, 10/20/2025 09:32:15 -0400, Anonymous User wrote:
    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, it isn't in the sense of free software, which is good, as you aren't >>allowed to play around with it and publish forged versions to torpedo >>development and irritate users.

    +1

    Two decades of solid work. What more has to be said?

    Be cautious. The Garbage Gang will call you a liar for the
    missing 6 months!

    And yes, +1!
    --
    Sent through OmniMix - https://danner-net.de/om.htm

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Gabx@info@tcpreset.invalid to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 19:45:10 2025
    From Newsgroup: sci.crypt

    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, I'm not a liar.
    My beloved conar.

    From the Official Mixmaster Remailer FAQ (https://mixmaster.sourceforge.net/faq.shtml):

    "Running a remailer on Windows is not recommended due to the massive
    security holes and general lack of stability.

    UNIX, Linux, or a BSD are recommended, as these systems are generally
    free, stable, and relatively secure."

    But this is just a small example, should we give it any importance?
    It must be left hand propaganda isn't it?

    You're running anonymous remailer software on an operating system that:
    1. Records your keystrokes (telemetry)
    2. Sends usage data to Microsoft
    3. Cannot be fully audited (closed source)
    4. Is explicitly not recommended by Mixmaster documentation

    So we have:
    - Closed-source OS (Windows)
    - Closed-source remailer (OmniMix)
    - Zero independent security audits possible
    - Complete opacity

    According to Microsoft's own documentation https://learn.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization

    https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive

    Omnimix is not opensource.

    PRISM Break is a project that lists privacy-focused, open-source
    alternatives.
    OmniMix was explicitly rejected because it doesn't meet the open-source criteria.

    A direct quote from Zegnat maintainer of PRISM Break https://github.com/prism-break/prism-break/issues/1469

    - "I can right now say it will not be included on PRISM Break. It is not open-source in any way. You are not allowed to create derivative works
    at all."

    - Includes "License.txt (License agreement)" with "legal limitations"
    - Copyright: Christian Danner, 2025
    - There is no OSI-approved or FSF-approved license
    - No official GitHub repository for OmniMix.
    - No SourceForge repository
    - Contrast with Mixmaster: https://github.com/eurovibes/mixmaster (open source)

    "Free for private use" means **proprietary freeware**.
    You can't:
    - Modify the code
    - Create derivative works
    - Redistribute modified versions
    - Independently audit for backdoors or vulnerabilities ( security you know?)

    From the official website:
    - Source code available for peer review
    - Not available for modification or derivative works
    - Restrictions in License.txt (not publicly available)

    Key difference:
    - Open Source = code available + freedom to modify/redistribute
    - OmniMix = code available + NO freedom to modify

    The "Source Available" Fallacy.

    Yes, you can view some source code "for peer review."
    But as the PRISM Break maintainer correctly notes: having viewable
    source code doesn't make it open source.

    You're being asked to trust your anonymity to:
    1. A closed-source OS (Windows)
    2. A proprietary application (OmniMix)
    3. With no independent security audits possible
    4. No ability to verify what the code actually does
    5. No community review or hardening

    This is the opposite of security best practices.

    With open source software like Mixmaster, the community can audit the
    code, find vulnerabilities, and verify there are no backdoors.

    With proprietary software like OmniMix?

    You're trusting one developer.

    The difference between "source available" and "open source" isn't
    semantics.

    Gabx
    --
    0745 074D FEAA 9CB7 62E9 D89D 3E54 F490 F2CC 5A82
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous@anonymous@anonymous.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 18:34:24 2025
    From Newsgroup: sci.crypt

    From the Official Mixmaster Remailer FAQ >(https://mixmaster.sourceforge.net/faq.shtml):

    "Running a remailer on Windows is not recommended due to the massive
    ^^^^^^^
    security holes and general lack of stability.
    ^^^^^^^^ ^^^^^ ^^^^^^^^^^^^^^^^^

    UNIX, Linux, or a BSD are recommended, as these systems are generally
    free, stable, and relatively secure."


    And this is why sheeple exist, they think windows is the only operating
    system there is!

    https://youtu.be/W9Ruxr4vpww?si=m9QWFwwaN0EzgrUx

    https://www.youtube.com/watch?v=nOznDh4BkWo

    Microsoft is sucking you dry. Why are people so nieve about
    Microsoft and windows? You all should move to Linux now!

    https://www.youtube.com/watch?v=x8GA1GnEl3o

    History warns us against digital ID

    Control under the guise of safety...

    https://www.youtube.com/watch?v=KvJV07XrREQ

    Nigel Farage: I'd rather go to prison than carry a digital ID

    https://www.youtube.com/shorts/HzzorAW0si4

    Windows is spyware, don't say you were not warned! Get Linux...

    Linux Mint, easier than windows, download: https://linuxmint.com/

    https://www.youtube.com/watch?v=_qZI6i21jB4&t=771s

    Linux Zorin, easier than windows, download: https://zorin.com/os/download/

    https://www.youtube.com/watch?v=nplI2lvKu94

    Don't be sheeple!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Baa Baa@sheeple@sheeple.com to mail2news on Mon Oct 20 19:12:09 2025
    From Newsgroup: sci.crypt

    From the Official Mixmaster Remailer FAQ >(https://mixmaster.sourceforge.net/faq.shtml):

    "Running a remailer on Windows is not recommended due to the massive
    ^^^^^^^
    security holes and general lack of stability.
    ^^^^^^^^ ^^^^^ ^^^^^^^^^^^^^^^^^

    UNIX, Linux, or a BSD are recommended, as these systems are generally
    free, stable, and relatively secure."


    And this is why sheeple exist, they think windows is the only operating
    system there is!

    https://youtu.be/W9Ruxr4vpww?si=m9QWFwwaN0EzgrUx

    https://www.youtube.com/watch?v=nOznDh4BkWo

    Microsoft is sucking you dry. Why are people so nieve about
    Microsoft and windows? You all should move to Linux now!

    https://www.youtube.com/watch?v=x8GA1GnEl3o

    History warns us against digital ID

    Control under the guise of safety...

    https://www.youtube.com/watch?v=KvJV07XrREQ

    Nigel Farage: I'd rather go to prison than carry a digital ID

    https://www.youtube.com/shorts/HzzorAW0si4

    Windows is spyware, don't say you were not warned! Get Linux...

    Linux Mint, easier than windows, download: https://linuxmint.com/

    https://www.youtube.com/watch?v=_qZI6i21jB4&t=771s

    Linux Zorin, easier than windows, download: https://zorin.com/os/download/

    https://www.youtube.com/watch?v=nplI2lvKu94

    Don't be sheeple!

    --- Digital Signature --- 2UTBUycElkrXwVaSjlpGGsZw8Um9WuDkbtBdJnn84tBHgEWmq6rWCD8u/4A9/5cCzGTGE5+h5wfa205p0vcxAg==

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Baa Baa@sheeple@sheeple.com to alt.privacy.anon-server,alt.privacy,sci.crypt on Mon Oct 20 20:48:46 2025
    From Newsgroup: sci.crypt

    "D" is posting here because there are a lot of posts in this thread and
    he is hoping someone will respond to him. He needs help. I've told him
    to go and see a doctor. He's fascinated with spam!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 23:42:38 2025
    From Newsgroup: sci.crypt

    Anonymous User <noreply@dirge.harmsk.com> wrote:
    Gabx <info@tcpreset.invalid> wrote:

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.

    I understand Gabx's confusion. OmniMix uses Tor only to deliver
    packets to the remailer network, a task of minor importance
    concerning anonymity, and you have the choice of creating longer
    circuits or not. OTOH for Gabx the reliability of Tor is
    essential as there's nothing else to anonymize his messages.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Fritz Wuehler@fritz@spamexpire-202510.rodent.frell.theremailer.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Tue Oct 21 00:08:45 2025
    From Newsgroup: sci.crypt

    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Read the Tor specs and you'll find out that no node gets any information
    about circuit length.

    You're correct that individual nodes cannot determine circuit length
    from their position in the chain.

    Q.e.d.


    However, you're confusing node-level visibility with network-level >observability.

    https://support.torproject.org/misc/misc-11/

    That's old news. They try to protect their network from heavier load,
    nothing else.


    The Tor Browser Bundle locks down everything (window size, fonts,
    JavaScript behavior) specifically to prevent fingerprinting.

    Yet you think running 7-hop circuits makes you invisible?
    You're making yourself *more* identifiable, not less.

    Wrong.

    You keep ignoring actual research:

    - USENIX Security 2015: "Circuit Fingerprinting Attacks" 98%+ accuracy
    in identifying non-standard circuits.

    - Traffic analysis can distinguish modified circuits even when
    application traffic is identical.

    Link?



    I provided evidence, you contributed nothing.

    Blagger

    Non-standard circuits are fingerprint-able with 98%+ accuracy.

    https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/kwon

    Old news as well.


    You demanded proof. There it is.
    Official Tor Project says you're wrong. Academic research confirms it.

    Show me ONE official Tor document recommending 7-hop circuits.

    You fundamentally misunderstand hidden service architecture.

    Yes, I control three hidden services: SMTP gateway, mail2news, and NNTP >server.

    But I control just the application endpoints, not the the Tor circuits.

    Conar !!!


    Gabx

    To begin with, you already had that discussion and failed miserably.

    Now, your video presentation describes a classic timing correlation
    attack based on the timing fingerprint of a limited number of popular
    services' entry pages, IMO nothing overwhelming. We know that Tor is
    extremely vulnerable to such an attack.

    Therefore: Tor isn't safe! Don't use it for important tasks!

    But there's nothing of value concerning circuit length. Longer
    negotiations with more rounds of cell exchanges can mean dealing with
    defunct nodes, hidden services or whatever else. And most important,
    that's information only the entry node gets hold of, not any node on the
    other end of the circuit. That means it's irrelevant for assigning an
    exit to an entry node.

    And now imagine a group of users selecting 5 node circuits, another one deciding for 6 nodes and some others for only 4 nodes. Those research
    guys would go nuts with their timing analyzes! No more clean room
    timings that allow any conclusions. Game over!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn3 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt on Mon Oct 20 23:53:33 2025
    From Newsgroup: sci.crypt

    Gabx keeps ranting:
    Fritz Wuehler wrote:
    Gabx <info@tcpreset.invalid> wrote:
    Anonymous User wrote:
    Gabx <info@tcpreset.invalid> wrote:

    And Omnimix is NOT Opensource !

    No, I'm not a liar.
    My beloved conar.

    From the Official Mixmaster Remailer FAQ
    (https://mixmaster.sourceforge.net/faq.shtml):

    "Running a remailer on Windows is not recommended due to the massive >security holes and general lack of stability.

    UNIX, Linux, or a BSD are recommended, as these systems are generally
    free, stable, and relatively secure."

    But this is just a small example, should we give it any importance?
    It must be left hand propaganda isn't it?

    It's about running a remailer, a server, not about client software,
    idiot!


    You're running anonymous remailer software on an operating system that:
    1. Records your keystrokes (telemetry)
    2. Sends usage data to Microsoft
    3. Cannot be fully audited (closed source)
    4. Is explicitly not recommended by Mixmaster documentation

    So we have:
    - Closed-source OS (Windows)
    - Closed-source remailer (OmniMix)

    5 hours 35 minutes after <10d58r5$rrqm$1@news.tcpreset.net> the same lie
    once again. It's a witch hunt. They simply can't compromize Type II
    remailing and OmniMix, therefore that defamation campaign. TLA liars!

    - Zero independent security audits possible
    - Complete opacity

    According to Microsoft's own documentation >https://learn.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization

    https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive

    Am I getting it right that you propose to exclude 95 percent of desktop computer users from anonymous remailing? Is that your mission?


    Omnimix is not opensource.

    PRISM Break is a project that lists privacy-focused, open-source >alternatives.
    OmniMix was explicitly rejected because it doesn't meet the open-source >criteria.

    A direct quote from Zegnat maintainer of PRISM Break >https://github.com/prism-break/prism-break/issues/1469

    - "I can right now say it will not be included on PRISM Break. It is not >open-source in any way. You are not allowed to create derivative works
    at all."

    - Includes "License.txt (License agreement)" with "legal limitations"
    - Copyright: Christian Danner, 2025
    - There is no OSI-approved or FSF-approved license
    - No official GitHub repository for OmniMix.
    - No SourceForge repository
    - Contrast with Mixmaster: https://github.com/eurovibes/mixmaster (open >source)

    "Free for private use" means **proprietary freeware**.
    You can't:
    - Modify the code
    - Create derivative works
    - Redistribute modified versions
    - Independently audit for backdoors or vulnerabilities ( security you know?)

    From the official website:
    - Source code available for peer review
    - Not available for modification or derivative works
    - Restrictions in License.txt (not publicly available)

    Key difference:
    - Open Source = code available + freedom to modify/redistribute
    - OmniMix = code available + NO freedom to modify

    You got it! No amateurs like you tinkering with the code.


    The "Source Available" Fallacy.

    Yes, you can view some source code "for peer review."
    But as the PRISM Break maintainer correctly notes: having viewable
    source code doesn't make it open source.

    You're being asked to trust your anonymity to:
    1. A closed-source OS (Windows)
    2. A proprietary application (OmniMix)
    3. With no independent security audits possible
    4. No ability to verify what the code actually does
    5. No community review or hardening

    This is the opposite of security best practices.

    With open source software like Mixmaster, the community can audit the
    code, find vulnerabilities, and verify there are no backdoors.

    With proprietary software like OmniMix?

    Just the same. You can audit the code, run the debugger step by step,
    find vulnerabilities if there are any and verify that there are no
    backdoors and, equally important, compare the binary you create with
    that distributed with the setup program.


    You're trusting one developer.

    Well, I do trust the developer, who did a great job for many years, but
    I don't have to, as the build process of OmniMix is absolutely
    transparent.

    And your panic ranting without any relevant focus also proves the high
    quality of that software. Thanks!


    The difference between "source available" and "open source" isn't
    semantics.

    No, it's about who holds the rights. Nothing more. And that isn't you!


    Gabx

    The one who, as we read here multiple times, doesn't even get his own
    garbage hacks straight.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Radio Eriwan@noreply@radio-eriwan.ru to alt.privacy,alt.privacy.anon-server,sci.crypt on Tue Oct 21 06:42:01 2025
    From Newsgroup: sci.crypt

    An untrustworthy OmniMix user wrote:
    Anonymous User <noreply@dirge.harmsk.com> wrote:
    Gabx <info@tcpreset.invalid> wrote:

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.

    I understand Gabx's confusion. OmniMix uses Tor only to deliver
    packets to the remailer network, a task of minor importance
    concerning anonymity, and you have the choice of creating longer
    circuits or not.

    A task of minor importance? You would shit your pants if you didn't
    use Tor with OmniMix because you don't trust the remailer operators,
    as they can be pressured and the remailer traffic of these public
    mini networks can be completely monitored.
    --
    -y-+ -a-+-U-U-+-+ -U -+-A-#-+-#-i-A.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Tue Oct 21 06:28:12 2025
    From Newsgroup: sci.crypt

    Radio Eriwan <noreply@radio-eriwan.ru> wrote:
    An untrustworthy OmniMix user wrote:
    Anonymous User <noreply@dirge.harmsk.com> wrote:
    Gabx <info@tcpreset.invalid> wrote:

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.

    I understand Gabx's confusion. OmniMix uses Tor only to deliver
    packets to the remailer network, a task of minor importance
    concerning anonymity, and you have the choice of creating longer
    circuits or not.

    A task of minor importance? You would shit your pants if you didn't
    use Tor with OmniMix because you don't trust the remailer operators,
    as they can be pressured and the remailer traffic of these public
    mini networks can be completely monitored.

    Learn about Type II Remailer networks. For an external adversary
    there's nothing to win.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Radio Eriwan@noreply@radio-eriwan.ru to alt.privacy,alt.privacy.anon-server,sci.crypt on Tue Oct 21 10:38:13 2025
    From Newsgroup: sci.crypt

    Another untrustworthy OmniMix User wrote:
    Radio Eriwan <noreply@radio-eriwan.ru> wrote:
    An untrustworthy OmniMix user wrote:
    Anonymous User <noreply@dirge.harmsk.com> wrote:
    Gabx <info@tcpreset.invalid> wrote:

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.

    I understand Gabx's confusion. OmniMix uses Tor only to deliver
    packets to the remailer network, a task of minor importance
    concerning anonymity, and you have the choice of creating longer
    circuits or not.

    A task of minor importance? You would shit your pants if you didn't
    use Tor with OmniMix because you don't trust the remailer operators,
    as they can be pressured and the remailer traffic of these public
    mini networks can be completely monitored.

    Learn about Type II Remailer networks. For an external adversary
    there's nothing to win.


    Utterly nonsense! And you know that very well!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Anonymous User@noreply@dirge.harmsk.com to alt.privacy,alt.privacy.anon-server,sci.crypt on Tue Oct 21 13:18:29 2025
    From Newsgroup: sci.crypt

    Radio Eriwan <noreply@radio-eriwan.ru> wrote:
    Another untrustworthy OmniMix User wrote:
    Radio Eriwan <noreply@radio-eriwan.ru> wrote:
    An untrustworthy OmniMix user wrote:
    Anonymous User <noreply@dirge.harmsk.com> wrote:
    Gabx <info@tcpreset.invalid> wrote:

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.

    I understand Gabx's confusion. OmniMix uses Tor only to deliver
    packets to the remailer network, a task of minor importance
    concerning anonymity, and you have the choice of creating longer
    circuits or not.

    A task of minor importance? You would shit your pants if you didn't
    use Tor with OmniMix because you don't trust the remailer operators,
    as they can be pressured and the remailer traffic of these public
    mini networks can be completely monitored.

    Learn about Type II Remailer networks. For an external adversary
    there's nothing to win.


    Utterly nonsense! And you know that very well!

    That's something only Claas knows as he doesn't share his wisdoms.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Yamn3 Remailer@noreply@mixmin.net to alt.privacy,alt.privacy.anon-server,sci.crypt,alt.censorship on Tue Oct 21 20:39:09 2025
    From Newsgroup: sci.crypt

    On 20 Oct 2025, Radio Eriwan <noreply@radio-eriwan.ru> posted some news:20251021064201.6kO4x9ZnoeC7@sewer.dizum.com:

    An untrustworthy OmniMix user wrote:
    Anonymous User <noreply@dirge.harmsk.com> wrote:
    Gabx <info@tcpreset.invalid> wrote:

    You're claiming longer circuits are safer.
    I'm asking for proof.
    You've provided none.
    Just "no proof" responses while ignoring established research.

    I provided evidence, you contributed nothing.

    I understand Gabx's confusion. OmniMix uses Tor only to deliver
    packets to the remailer network, a task of minor importance
    concerning anonymity, and you have the choice of creating longer
    circuits or not.

    A task of minor importance? You would shit your pants if you didn't
    use Tor with OmniMix because you don't trust the remailer operators,
    as they can be pressured and the remailer traffic of these public
    mini networks can be completely monitored.

    Not to mention censored and vandalized.

    --
    Right neodome?
    --- Synchronet 3.21a-Linux NewsLink 1.2