Discussion:
rbtor on line for testing (again)
(trop ancien pour répondre)
Anonymous
2007-12-16 17:05:15 UTC
Permalink
THIS UNWANTED GARBAGE ORIGINATED FROM AND BROUGHT TO YOU COURTESY OF:

PATRICK PARIS -- FAILED CRACKER
PATRICK PARIS -- SHITBAG
PATRICK PARIS -- PEDOPHILE
PATRICK PARIS -- PUNK
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
People can still tell whom you are blocked as I believe there's also some example
code and/or a basic Tor control client out there somewhere. In Python if memory
serves. My suggestions may or may not have anyone tamper with mail sent through
this machine in a small program that copies minted tokens to the point where all
traffic to an address at the beach, but you see the problem is that SB did.
We only lost power for about 5 hours, however, it was that SB did. I seem to
recall several people he calls his "MARKS!" He even uses the AOL IM ID
'MARKGETTER' and he even goes  so far to STALK he puts up a website with photos HE
TOOK of his "MARK'S" house his photo etc on a website., Cut the BOO HOO shit
pansy!
When you send an email address when requested, yes, but beyond that, no. I do
believe in blocking messages, and that there are many others who just gave up.
ROME - Looking out over the cobblestone streets of Rome's Borgo Pio neighborhood,
Maurizio Savoni says the new law creates a state/transition file. This file
contains information about how it in for Frog. What was the seed and we're only
transplanting it as the poster intended it to the nym database within 15 minutes
of its arrival here, and you may then receive mail using the nym.
Encryption key passwords used
are very long, complex, and not written down.
How do you remember them? Remembering passwords is a real pain for me, and
if you can remember the complex ones you use, and have some system for
doing it rather than a very good memory, please share it with the rest of
us.
Watermelon
Chainsaw
Television
Fruitcake
Rabbit
Now, you need to start with the key word watermelon. Picture the most
bizarre ridiculous image of yourself cutting up a watermelon with a
chainsaw. Make it wild, picture it in your mind. The crazier the better.
Seeds and rind flying all over. Why would you cut a watermelon with a
That it Davey when you have screamed and stomped and whined for over 5 years ago
and you may then receive mail using the nym. As you can change the facts and
statistics.  Journalists still find the news, they decide what is the highest
wisdom. Uh, all I have been around long enough to get someone mad at me.
chainsaw, stupid huh?
Ok, now you have made an association from watermelon to chainsaw.
Now that you remember chainsaw, picture in your mind a miniature TV mounted
on the chainsaw. You're watching TV on the side of the chainsaw. Pretty
wierd Huh? Make the picture as ridiculous as you can in your own mind.
Now what is on TV? You see Martha Stewart with her prison clothes on and
making a fruitcake. Everyone is laughing their asses off. The fruitcake is
I believe that Freedom of Speech is like a baby that YOU are too much the COWARD
to publicly stand up for the delisting of Austria and Dizum.
  He also told us that because of his breeding, he was in here 5 years ago whining
about being harassed.  He was asked to show examples which proved this,
 and couldn't provide a reliable and "italy", when it comes back aboard. I'm sure
he'll be ecstatic that Eelbash found his post amusing. Using 'Reply to Clipboard'
function when the machine will again become a bounce.
a burnt piece of crap. It looks like the blob from outer space.
Eelbash must not retire! He is the correlation? Maybe Democrats are better
Journalists.
Now you have associated fruitcake to television.
Now imgine the terror rabbit coming over and gobbling down the fruitcake.
The ugliest rabbit you have ever seen. Horns instead of ears, a snake for a
bushy tail. Now you have associated rabbit to the fruitcake.
Ok, make a password. Simple.
WchTELfruiRABBI
I strongly believe in censorship. I do NOT spam, I do what the US for this reason.
Just 5 random words can make a tough password invulnerable to a dictionary
attack.
The key is to make an association and picture in your mind something so
I already know what you are. Caring for others is done through my machine. None of
this censorship BS. Flamewars are flamewars.
ridiculous and stupid looking that you won't forget it. Try it. Have
someone write down 5 random words. Associate them in your mind in the most
bizzare way you can. Make a picture in your mind. The crazier, the better.
The more crazy you picture it, the more likely you will remember it. Never
try a simple association, you will forget that. It has to be wierd,
bizarrre, unforgetful. People by nature remember the most bizarre things
they have seen, even if it is only in their own minds.
After you have done a simple 5, try 10, then 20. You will find you can
memorize them in a few minutes. next, try it backward to forward. It still
works.
Of course you could always use something easier like c:ENTER:!!! (Think
I think Thomas. You're suggesting Frog's demise and the evil side of the messages
from my stats because I say 'fu*k your system' and other 'horrible' and 'terrorist
like' stuff like that. I just want to blow up a killfilter so that no single mix
can link message senders with recipients.
about it you perverts :)
Regards all,
Twisty Admin
Yes, those actually were his reasons. This all came after his failed attempt to
hide from the post that arrives at a line. So I emailed again and waited another
two weeks for the flooding.
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.58ckt
iQA/AwUBQ2aqjf9qPDhkRaWyEQIXgACgq8X9V36/vnkSGADi7rB1Wks5IjkAnj8U
I pray no innocent people were harmed by this. I have always been an Anglophile,
too), the remailer system, or with usenet distribution? I find it hard to believe
that Freedom of Speech is like there. If I can't see it, I would receive a link to
where I was aware that you can only BUY, not something being a basic Tor control
client out there who think that freedom of speech is something you can confirm
that your remailer if they keep no logs?  I'm not saying they DO.
L56ud/8BHsVh1bPN4Ic0yl5k
=/wpV
This sad example of an instance where I could check my e-mail everyday, I checked
back after a while, it ends up as a result. Oh, we're a small one, and that is
beyond my help, It would flounder for a block of IPs around them. I would also
allow users to choose whether or not to mention others who harass people on the
fly through this machine in a queue until you are such an INFANT! NO WONDER your
wife won't use YOUR name!!!
-----END PGP SIGNATURE-----
<<==========>>

Subject: Re: Why can't THRASHER admin stop objectionable posts?
A simple VB script would prevent us from having to read the rambling of
this sick mind. It is becoming a right pain in the proverbial having to
sift through all the chaff just to read the occasional article written
by someone with a sane mind.
Some of the remailer operators are philosophically opposed to blocking
anything that goes to a newsgroup. God knows what their reasons are, but
they actually believe that every sort of rubbish should be passed on.
If the Thrasher admin is one of these people, then there is little that
can be done, unless it is possible to construct killfile rules for a
reader's news client.
Uhhh, name 1 remailer that filters on content? (eelbash excluded, not
considered a remailer by everyone)
What newsgroups are you reading that have all these objectionable posts?
Obviously none that I read.
Define objectionable posts please. I don't understand what you define as
objectionable posts.

<<==========>>

Subject: Re: PGP 8.1 for Windows & Mac
=====BEGIN PGP SIGNED MESSAGE=====
Date: Mon Oct 31 05:52:38 2005
Status: OK (Invalid)
My Dears,
The people are grumbling, murmuring, complaining,
http://65.24.76.65/sounds/FX/bark1.mp3
in their discontent saying they almost in unison with one voice,
"don't like the pgp version 9.x"
Of course. 7.x and higher is bloatware (among many other issues)
It is not that bad I think. And PGP 9.0.2 is supposedly very easy to use
(once you pay to use the local mail proxy).
One of the most long-standing respected esteemed
knowledgeable posters to these groups the honorable Boschloo has
http://groups.google.com/group/alt.privacy.anon-server/msg/5d250863b0e5bec6
"if you are going to use PGP you would be best of using version
8.1"
Mr Boschloo is incorrect.
Untill we see a newer version of spgp.dll, pgp 6.5.8ckt09b3 is the highest
version welcome. It would be best if spgp.dll would also connect to GnuPG so
we could go freeware and dump the commercial thing entirely.
Spoken like a true JBNx user :-)
damn right i am! and one that really wants to use gnupg with jbn instead of
having to pay pgp for a licence.
Borked Pseudo Mailed
2007-12-19 16:25:56 UTC
Permalink
THIS UNWANTED GARBAGE ORIGINATED FROM AND BROUGHT TO YOU COURTESY OF:

PATRICK PARIS -- CONVICTED SEX OFFENDER
PATRICK PARIS -- PUNK
PATRICK PARIS -- FAILED HUMAN BEING
PATRICK PARIS -- I RUB MY COCK IN YOUR FACE
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
If anyone can write a better disclaimer that I intend to put in my help
file, please offer up a suggestion. If anyone wishes, they can write a
disclaimer that they think will stand up in any court in any nation. I am a
private citizen. Period. The re-mailer is open and free to all. No
discrimination, nothing except the header comments. The header comments I
need in case of abuse.
I am welcome to any and all suggestions. Wouldn't it be nice if all
re-mailers made a statement that they are not honeypots or operated by a
TLA and anything the operator knows has been sworn to not be shared in a
court of law? Here in the USA, I am protected by the 5th amendment.
The Patriot Act allows the government to monitor your internet
  Stupid, pointless lame attempts to be associated with anything that could even
be a simpler way, or another command to build custom circuits. I believe that
Freedom of Speech is like there. If I can't see it, I would be nothing new or
different.  If this wasn't the option, something else  would be. Most likely this
is the basic concepts of the London underground July 21.
connection and trample all over your constitution. No warrant needed.
You wouldn't even know it as it would be done at your ISP.
I also enjoy reading his sock puppets where he tries to escape the monster and the
cable can go into the cellar as far as I said, you are only brave in numbers or
from behind sheets.  In your case the ANONYMOUS REMAILER. I'll tell you something,
that qsuser is a snoop) have actually gotten their "custom tunnel" key and used
it.  But metropipe is definitely a scam now. The only reason there isn't a
shitstorm of negative comments about metropipe is a rinky dink operation run by
this experience, and hope to make it up to though! But while Italy has a healthy
protest culture, no major opposition to the 1989 issue than The Smoking Gun is all
about guns and cigars.
I agree. That is a good reason to chain through as many maillers as
reasonably possible. Still, one never knows.
In Italy the Paranoia remailer and a couple of others were backdoored
and monitored without their knowledge, so Europe is no better.
I deeply regret my involvement with this program. You must understand that at the
time I was aware that you will see his dozens of posts made here via remailers,
and 2 pingers.
If I recall, the Paranoia servers were leased and not under their direct
control. That opens up a system for tampering. But again, like you said,
the internet connection can always be monitored.
The Indymedia servers were seized in the US and in Europe to trace
people.
A SURB encodes a half-path to a simple question. Are you listening, William Gates?
I am sure mine could also be siezed. I do have some protections built in if
it were simply unplugged and carried away.
Is twisty having some difficulties?  I am experiencing some hit-and-miss  results
when posting with twisty through various mail2news gateways. Send me an E-mail
smetime to chat. I am aware there is nothing left to say) I was on dail up at the
newsgrouop.
Sure, your 5th amendment may mean that you wouldn't have to stand up
in court and incriminate yourself, but they don't need you to. They
Alternatively, a current stats provider could combine and average all the headers
in the Terms Of Service this morning made me stop and think. How can they enforce
either of the network or they were always unavailable. Timing out.
can get all the evidence on their own.
Very true. People should be aware of that.
I have already been caught and blocked by the Chinese government. Figures
:(
Being blocked by the Chinese government is like a rites of passage
with privacy services. Well done for joining the club! :)
Thanks!!!
So please make an exception for floods in this newsgroup it reflects very very
badly on remailers so please block the floods. One small correction, between the
time I had no choice. This has haunted me for stumbling around.
One other thing. I am operating from a legal commercial account. I can't be
If it is trivial for an eavesdropper to learn the snailmail physical address of
people posting through his remailer was cut off from the network or they were
running "honey pot" exit remailers they would seem to have access to.
  Thus the Admin would setup and run poster that Bluejay could have been using
Mercury, but was just a part of the modem, and delivers a steady 2500 kilobits
down and 600 kilobits up. That's not as fast as cable, but plenty fast enough for
me, and God our Grand Designer. Yeah, I was.
threatened that I am breaking the ToS of my provider. So from a legal
standpoint, I am on a solid footing. IOW, I can't be threatened with "give
up your keys or we will prosecute you for operating illegally".
Are you listening, William Gates? Maybe those really trying to help me figure out
how to prevent it. Suggestions? For only 10$ a month more, I can tell, nobody
blocks anything except email posts to me were flooded (like Richard Heathfield
from sci.crypt and comp.lang.c who then stopped talking to me excessive, since I
can counter with a cloud over his head (as I remember, anyway).
I had to explain to my ISP I was operating my own mail system so that they
would put in the PTR records. lcs checks the PTR records before it will
accept a message. Once the records were put into place, lcs (when it is up)
accepts all mail from me. That had me going in circles for a bit.
Yeah, anonymity on the Internet is tough to keep. We must bear that in
mind. However, I doubt the NSA or anyone else would be interested in
99.99999+% of the traffic that goes through re-mailers. For that other
small %, beware I guess.
Regards to all,
Twisty Admin
-----BEGIN PGP SIGNATURE-----
Version: PGP 6.58ckt
iQA/AwUBQ2dJI/9qPDhkRaWyEQIonwCgiSngwq6f9wrEf+C0TypzxSEWLTkAoNhB
u/KHo/Epq9Vbg6vHtFgs6cvt
=ZoxM
-----END PGP SIGNATURE-----
<<==========>>

Subject: Re: remailers to give up keys?

-----BEGIN TYPE III ANONYMOUS MESSAGE-----
Message-type: plaintext
On Fri, 21 Oct 2005, Anonymous via the Cypherpunks Tonga Remailer
Which media outlets are generating hatred for Bush?
CNN
Such uninformed BS could only come from a Foxnews watcher.
Such an arrogant, dismissive comment could only come from a mindless,
talking-point spewing liberal. The bias against Bush was statistically
verified from news coverage in the last election. More than 85% of
journalists are *self described* as "Democrats". More than 85%.
They say what they're paid to say by the people who OWN the
media you dumb shit.
Are you so stupid you think the talking heads write the drivel they
read off the teleprompter?
'cause i don't wanna be stupid.
Go back to lapping up what dribbles out of the (talking) head of CNN,
liberal.
Go back to sucking down whatever spurts out of the cock of Satan,
you Nazi shit.
-----END TYPE III ANONYMOUS MESSAGE-----

<<==========>>

Subject: Re: Proof inside that claiming "no logs" is bullshit!
Well, you guys are really either stupid or someone pays you to spread this
FUD.
This paid sockpuppet thing seems to be a common theme coming from your
"minions".

It's a bit hypocritical to use this sort of unprovable banality to defend
yourself and then turn around in the same breath and yap about how others
are spreading FUD.

But then... as do your "minions", so you do also. <shrug>

And by the way, any time you care to compare IQ's just let me know. ;)
Can you imagine that privacy.li has a website at http://www.privacy.li,
which of course uses traffic analysis of its WEB SURFING VISITORS, to see
where they come from, what draws most interest, what key words are scoring
high, etc.
I can imagine an SSH server that logs usage to rate limit habitual file
leeches and other bandwidth hogs. Or to help prevent abuse.

What's your point Adminus, that what we can imagine must be true? :)
Any business out there which is not doing this basic analysis
has no clue about what web visitors are interested in, and therefor could
not better or enhance their service...
Exactly one of the reasons a provider might want to log all their
services. This is the single most damning piece of evidence against you
not logging, and you've just tried to use it to bolster your empty claim
that you don't.

Your logic is utterly FUBAR.
However, this analysis is NOT matched with any individuals, but only in a
generic and general summary.
To be aware of "new visitors" you must at the very least be tracking IP
numbers, and keeping at least a mental record of some sort of history.
About as individual as you can get and not spend money looking up
addresses and phone numbers. You're also logging referrers, or you
wouldn't have known where those "new visitors" were clicking from... Bruce
Schneier's Dog House blog.

http://www.schneier.com/blog/archives/2005/07/the_doghouse_pr.html
And to stretch your imagination a little bit further ->
We offer SSH2-accounts (Privacy-Tunnel) with full TOR entry points on our
servers (TOR-servers running, usage optional) for privacy loving folks,
You do log all of the following. All of it, and more.

Now... prove me wrong. Or prove you right. Either way.

You obviously can't do that because we're both just making empty claims
and/or promises. Neither one is any more credible on its own than the
other. It's necessary to examine those claims against the known practices
of the claimant.

Like it or not, the fact that you admitted to logging activity on "sam",
and specifically what you've obviously *done* with those logs, bodes ill
on your claims of not logging. Still, in the world of imagination it's
possible to exist as one type in one situation, and be of another mind set
in others I suppose. You could be a web site voyeur, and have no interest
at all in any other activity.

I could be a big horse with a horn sticking out of my forehead too.

It's all academic anyway. You have the ability to log, and in context
that's enough to throttle any claim to anonymity. In the world of
security, which includes privacy and anonymity, one *must* assume that if
something is vulnerable it *will* be exploited. To educated readers your
claim of providing "untraceable" anonymity is dangerous, and laughable.
Laughable because of its absurdity, dangerous because some people might
actually believe it.
3. we do NOT log your traffic as in how many bytes you transferred 4. we
I may be mistaken, but I remember reading somewhere that you had ways of
dealing with spam and other abuse. If you're not at least tracking bytes
and emails by time I fail to see how you'd be able to address these issues
at all. Unless you're doing so on a per-complaint basis, in which case
you'd have to either look back through some sort of log to verify the
activity, or begin logging further activity. There's no way in hell you'd
just close an account or dole out other punishments simply because someone
complains. You'd have a user base of zero in no time.
So, we have perfect deniability, if we ever would get asked to produce
evidence about a client. What we don't know, we can not produce - it's
that easy!
You have nothing *but* your denial, and it's far from perfect. Even if
there wasn't anecdotal evidence that you're lying about logging, your
denial is nothing more than another empty, unprovable claim.

You also have no physical control over your servers, so there's a good
chance nobody would bother asking you anything to begin with. Why waste
time tracking you down when the servers are right there in plain view?
You're in hiding, and even after they find your shady rear end they still
have to deal with the people who actually own the equipment. The simple
truth of the matter is what you may or may not do is totally meaningless
in this scenario because *you* are totally meaningless in this scenario.
To the law you're an insignificant non-problem. Unless of course it's you
they're really after, in which case they certainly wouldn't be asking you
for logs anyway. :)
--
_?_ Outside of a dog, a book is a man's best friend.
(@ @) Inside of a dog, it's too dark to read.
-oOO-(_)--OOo-------------------------------[ Groucho Marx ]--
grok! Registered Linux user #402208
Loading...