They can knock all of my TORs down, I won't say a word

[chan] Crypto-Anarchist Federation
Oct 6 07:52

Yes, but if they broke the outer tor, what stops them from attacking your inner tor next? I think we should run another tor inside the inner tor, oh wait. :) Seriously though, stacking multiple identical instances of the same security solution will provide an insignificant improvement over the original solution. It makes more sense to fix Tor, and if you'll have look at the recent upgrades and fixes, you'll notice there's some serious science going on behind the scenes right now to make our networks safer.

[chan] Crypto-Anarchist Federation
Oct 8 20:21

If NSA, FBI probably will deanonimize normal tor with hidden service then will be chance to no deanonimize normal client tor and tor with hidden service inside normal client tor. We have many normal clients. We have too little relays. If we run many hidden services inside another normal instances then will be to difficutl to deanonimize hidden service. Circuits from hidden service will be show only tor exit nodes.

[chan] Crypto-Anarchist Federation
BM-2cWdaAUTrGZ21RzCpsReCk8n86ghu2oY3v

Subject Last Count
Compress Random Data Feb 19 06:34 5
Your Mama 1$ §çÛM Feb 18 20:58 1
A satellite engineer explains the truth about satellite operations Feb 18 18:16 3
Satellites Are Fake - Just Another NASA Hoax Feb 18 17:27 1
Globewashing Feb 18 07:37 1
how to make bitmessage secure Feb 18 04:59 1
Are you blacklisted? Feb 18 01:49 1
Mitigating exploited software with firejail Feb 18 01:45 1
MeinCoin Crypto Research - Screenshot Feb 17 13:16 1
Constant Conflict - First published From Parameters, Summer 1997, pp. 4-14: US Army War College] Feb 17 08:28 3
FPGA Hardware backdoors news. Feb 17 08:21 1
Consider this problem. Feb 17 07:10 1
How many users have bitmessage in the world? Feb 16 20:25 2
test 44 Feb 16 19:14 5
$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist Feb 16 03:08 1
Bitmessage components security seclusion example Feb 16 01:05 1
NOTICE: Address Revocation Feb 15 02:49 1
Truly, truly, Bitcoin is a failure Feb 13 12:22 1
Proof of Work is the worst way to do a BlockChain Feb 13 12:10 1
privacy software / services list Feb 11 19:18 5
THE WORLD'S MOST SECURE MESSAGING SYSTEM Feb 10 11:07 1
If I use P2P networks like eMule on the Whonix operating system, is it possible for them to leak my real IP address? Feb 10 08:06 2
hacker for hire Feb 10 02:26 1
a Feb 9 21:21 1
z Feb 9 21:21 1
Tor / Proxychains is leaking my hostname Feb 9 21:04 1
test1 Feb 9 20:25 3
ZRe: test5 Feb 9 12:51 1
aRe: test5 Feb 9 12:51 1
my pleasure Feb 8 17:06 1
Anonymous VCS Feb 6 15:13 5
The best descriptions of trolls and idiots Feb 6 12:57 2
crypto question Feb 6 12:39 1
since leaving general chan Feb 6 12:16 3
Help Fight Government Tyranny Feb 6 02:04 1
[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L Feb 5 11:53 1
Crypto-Anarchist Literature Feb 4 11:19 1
Help needed with identying crypto paper Feb 1 12:25 1
OMEGA user survey Feb 1 03:34 2
What is secure? Jan 29 05:15 14
An Inside Job: Remote Power Analysis Attacks on FPGAs Jan 29 00:02 1