Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"But what we need to know is, do people want nasally-insertable computers?"


computers / alt.privacy / Re: You're LEAKING Your LOCATION!

SubjectAuthor
* You're LEAKING Your LOCATION!Nomen Nescio
`* Re: You're LEAKING Your LOCATION!D
 +* Re: You're LEAKING Your LOCATION!Yamn Remailer
 |`* Re: You're LEAKING Your LOCATION!D
 | +- Re: You're LEAKING Your LOCATION!D
 | `* Re: You're LEAKING Your LOCATION!Fritz Wuehler
 |  `* Re: You're LEAKING Your LOCATION!D
 |   +- Re: You're LEAKING Your LOCATION!Fritz Wuehler
 |   `- Re: You're LEAKING Your LOCATION!Jack Ryan
 `- Re: You're LEAKING Your LOCATION!William Unruh

1
You're LEAKING Your LOCATION!

<f1b0553c16a379df22324c263a1d07fe@dizum.com>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=386&group=alt.privacy#386

  copy link   Newsgroups: alt.privacy.anon-server alt.privacy alt.privacy.pgp alt.security.pgp
From: nobody@dizum.com (Nomen Nescio)
Subject: You're LEAKING Your LOCATION!
Message-ID: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
Date: Wed, 20 Dec 2023 23:09:33 +0100 (CET)
Newsgroups: alt.privacy.anon-server, alt.privacy, alt.privacy.pgp,
alt.security.pgp
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Wed, 20 Dec 2023 22:09 UTC

https://www.youtube.com/watch?v=A9DPDE0FZeQ

One last thing... get off Hotmail, Gmail or whetever you're using and send your email
encrypted so that your ISP or email provider can't profile you. https://tuta.com/
(the best out there) FREE and premium services! END TO END ENCRYPTION!!!

Do you realize Hotmail and other providers can read your email? That's a no no!!!

Stay safe, stay encrypted!

Re: You're LEAKING Your LOCATION!

<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=387&group=alt.privacy#387

  copy link   Newsgroups: alt.privacy.anon-server alt.privacy alt.privacy.pgp alt.security.pgp
Path: i2pn2.org!.POSTED!not-for-mail
From: nospam@example.net (D)
Newsgroups: alt.privacy.anon-server,alt.privacy,alt.privacy.pgp,alt.security.pgp
Subject: Re: You're LEAKING Your LOCATION!
Date: Thu, 21 Dec 2023 10:28:35 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Injection-Info: i2pn2.org;
logging-data="630364"; mail-complaints-to="usenet@i2pn2.org";
posting-account="w/4CleFT0XZ6XfSuRJzIySLIA6ECskkHxKUAYDZM66M";
In-Reply-To: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
 by: D - Thu, 21 Dec 2023 09:28 UTC

Every email provider can theoretically read your email, including tuta,
unless you encrypt it yourself. That in turn, leaves you vulnerable to
metadata exposure.

If you need to be able to receive email, it makes it tough. Sending email,
you could always hop on some wifi, tunnel it a bit, and create a throw
away account.

I think that email is not the way in case you want absolute and strict
secrecy.

If you want some secrecy and better than nothing security, tuta is a good
provider, or even better, you could selfhost your email.

On Wed, 20 Dec 2023, Nomen Nescio wrote:

> https://www.youtube.com/watch?v=A9DPDE0FZeQ
>
> One last thing... get off Hotmail, Gmail or whetever you're using and send your email
> encrypted so that your ISP or email provider can't profile you. https://tuta.com/
> (the best out there) FREE and premium services! END TO END ENCRYPTION!!!
>
> Do you realize Hotmail and other providers can read your email? That's a no no!!!
>
> Stay safe, stay encrypted!
>
>

Re: You're LEAKING Your LOCATION!

<20231221.090033.17459708@erienetworks.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=388&group=alt.privacy#388

  copy link   Newsgroups: alt.privacy alt.privacy.anon-server alt.privacy.pgp alt.security.pgp
DKIM-Filter: OpenDKIM Filter v2.11.0 sept-huit.erienetworks.net 88B7C4020A
Mime-Version: 1.0
Message-Id: <20231221.090033.17459708@erienetworks.net>
From: remailer@domain.invalid (Yamn Remailer)
Date: Thu, 21 Dec 2023 09:00:33 -0500
Subject: Re: You're LEAKING Your LOCATION!
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii
Newsgroups: alt.privacy, alt.privacy.anon-server, alt.privacy.pgp,
alt.security.pgp
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Yamn Remailer - Thu, 21 Dec 2023 14:00 UTC

D <nospam@example.net> wrote:

> Every email provider can theoretically read your email, including tuta,
> unless you encrypt it yourself. That in turn, leaves you vulnerable to
> metadata exposure.
>
> If you need to be able to receive email, it makes it tough. Sending email,
> you could always hop on some wifi, tunnel it a bit, and create a throw
> away account.
>
> I think that email is not the way in case you want absolute and strict
> secrecy.
>
> If you want some secrecy and better than nothing security, tuta is a good
> provider, or even better, you could selfhost your email.

With a nym account at mixmin.net or paranoici.org you're in absolute
stealth mode. Managed by a local OmniMix proxyserver, which uses the
Tor network, nobody will get knowledge of your mailing activities.

Re: You're LEAKING Your LOCATION!

<d15c72d5-16e8-9285-840e-b2ef408ea403@example.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=394&group=alt.privacy#394

  copy link   Newsgroups: alt.privacy alt.privacy.anon-server alt.privacy.pgp alt.security.pgp
Path: i2pn2.org!.POSTED!not-for-mail
From: nospam@example.net (D)
Newsgroups: alt.privacy,alt.privacy.anon-server,alt.privacy.pgp,alt.security.pgp
Subject: Re: You're LEAKING Your LOCATION!
Date: Fri, 22 Dec 2023 11:29:34 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <d15c72d5-16e8-9285-840e-b2ef408ea403@example.net>
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com> <ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net> <20231221.090033.17459708@erienetworks.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Injection-Info: i2pn2.org;
logging-data="755365"; mail-complaints-to="usenet@i2pn2.org";
posting-account="w/4CleFT0XZ6XfSuRJzIySLIA6ECskkHxKUAYDZM66M";
X-Spam-Checker-Version: SpamAssassin 4.0.0
In-Reply-To: <20231221.090033.17459708@erienetworks.net>
 by: D - Fri, 22 Dec 2023 10:29 UTC

On Thu, 21 Dec 2023, Yamn Remailer wrote:

> With a nym account at mixmin.net or paranoici.org you're in absolute
> stealth mode. Managed by a local OmniMix proxyserver, which uses the
> Tor network, nobody will get knowledge of your mailing activities.

I'm afraid not, but you need to trust the people running mixmin.net or
paranoici.org. I'm sure the protocols are well designed, but just the
fact that you have to go to those domain names and open an account puts
you at risk, since you have no clue who runs it.

Re: You're LEAKING Your LOCATION!

<4401ddccfca01878074d9f7776a6b923@dizum.com>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=396&group=alt.privacy#396

  copy link   Newsgroups: alt.privacy
From: J@M (D)
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
<20231221.090033.17459708@erienetworks.net>
<d15c72d5-16e8-9285-840e-b2ef408ea403@example.net>
Subject: Re: You're LEAKING Your LOCATION!
Content-Transfer-Encoding: 7bit
Message-ID: <4401ddccfca01878074d9f7776a6b923@dizum.com>
Date: Fri, 22 Dec 2023 13:53:56 +0100 (CET)
Newsgroups: alt.privacy
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Fri, 22 Dec 2023 12:53 UTC

On Fri, 22 Dec 2023 11:29:34 +0100, D <nospam@example.net> wrote:
>you have
tutaspam

Re: You're LEAKING Your LOCATION!

<20231222.211213.01884358@remailer.frell.eu.org>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=398&group=alt.privacy#398

  copy link   Newsgroups: alt.privacy alt.privacy.anon-server alt.privacy.pgp alt.security.pgp
Subject: Re: You're LEAKING Your LOCATION!
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0
Content-Transfer-Encoding: 7bit
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
<20231221.090033.17459708@erienetworks.net>
<d15c72d5-16e8-9285-840e-b2ef408ea403@example.net>
Message-Id: <20231222.211213.01884358@remailer.frell.eu.org>
From: fritz@spamexpire-202312.rodent.frell.theremailer.net (Fritz Wuehler)
Date: Fri, 22 Dec 2023 21:12:13 +0100
Newsgroups: alt.privacy, alt.privacy.anon-server, alt.privacy.pgp,
alt.security.pgp
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Fritz Wuehler - Fri, 22 Dec 2023 20:12 UTC

D <nospam@example.net> wrote:
>On Thu, 21 Dec 2023, Yamn Remailer wrote:
>
>> With a nym account at mixmin.net or paranoici.org you're in absolute
>> stealth mode. Managed by a local OmniMix proxyserver, which uses the
>> Tor network, nobody will get knowledge of your mailing activities.
>
>I'm afraid not, but you need to trust the people running mixmin.net or
>paranoici.org. I'm sure the protocols are well designed, but just the
>fact that you have to go to those domain names and open an account puts
>you at risk, since you have no clue who runs it.

No reason to be afraid. Nymserver admins get nothing of relevance from
a WME-encrypted nym-to-nym dialog. Both participants are anonymous, all
data they transfer are encrypted, and it's reliable, as with every mail
delivery its sender gets an acknowlegement that proves success.

Re: You're LEAKING Your LOCATION!

<b0dae716-b28b-e7e3-96e7-878afd64da0c@example.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=399&group=alt.privacy#399

  copy link   Newsgroups: alt.privacy alt.privacy.anon-server alt.privacy.pgp alt.security.pgp
Path: i2pn2.org!.POSTED!not-for-mail
From: nospam@example.net (D)
Newsgroups: alt.privacy,alt.privacy.anon-server,alt.privacy.pgp,alt.security.pgp
Subject: Re: You're LEAKING Your LOCATION!
Date: Sat, 23 Dec 2023 14:19:22 +0100
Organization: i2pn2 (i2pn.org)
Message-ID: <b0dae716-b28b-e7e3-96e7-878afd64da0c@example.net>
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com> <ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net> <20231221.090033.17459708@erienetworks.net> <d15c72d5-16e8-9285-840e-b2ef408ea403@example.net> <20231222.211213.01884358@remailer.frell.eu.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII; format=flowed
Injection-Info: i2pn2.org;
logging-data="895402"; mail-complaints-to="usenet@i2pn2.org";
posting-account="w/4CleFT0XZ6XfSuRJzIySLIA6ECskkHxKUAYDZM66M";
X-Spam-Checker-Version: SpamAssassin 4.0.0
In-Reply-To: <20231222.211213.01884358@remailer.frell.eu.org>
 by: D - Sat, 23 Dec 2023 13:19 UTC

On Fri, 22 Dec 2023, Fritz Wuehler wrote:

> D <nospam@example.net> wrote:
>> On Thu, 21 Dec 2023, Yamn Remailer wrote:
>>
>>> With a nym account at mixmin.net or paranoici.org you're in absolute
>>> stealth mode. Managed by a local OmniMix proxyserver, which uses the
>>> Tor network, nobody will get knowledge of your mailing activities.
>>
>> I'm afraid not, but you need to trust the people running mixmin.net or
>> paranoici.org. I'm sure the protocols are well designed, but just the
>> fact that you have to go to those domain names and open an account puts
>> you at risk, since you have no clue who runs it.
>
> No reason to be afraid. Nymserver admins get nothing of relevance from
> a WME-encrypted nym-to-nym dialog. Both participants are anonymous, all
> data they transfer are encrypted, and it's reliable, as with every mail
> delivery its sender gets an acknowlegement that proves success.
>

But they do. The fact that communication does take place. Content is
encrypted, but not the fact that messages are being sent, assuming the
potential attacker is monitoring a suspect.

Re: You're LEAKING Your LOCATION!

<1336fb480bc7e8730e2219053657f351@msgid.frell.theremailer.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=400&group=alt.privacy#400

  copy link   Newsgroups: alt.privacy alt.privacy.anon-server alt.privacy.pgp alt.security.pgp
From: fritz@spamexpire-202312.rodent.frell.theremailer.net (Fritz Wuehler)
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
<20231221.090033.17459708@erienetworks.net>
<d15c72d5-16e8-9285-840e-b2ef408ea403@example.net>
<20231222.211213.01884358@remailer.frell.eu.org>
<b0dae716-b28b-e7e3-96e7-878afd64da0c@example.net>
Subject: Re: You're LEAKING Your LOCATION!
Message-ID: <1336fb480bc7e8730e2219053657f351@msgid.frell.theremailer.net>
Date: Sun, 24 Dec 2023 04:59:25 +0100
Newsgroups: alt.privacy, alt.privacy.anon-server, alt.privacy.pgp,
alt.security.pgp
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Fritz Wuehler - Sun, 24 Dec 2023 03:59 UTC

D <nospam@example.net> wrote:
>On Fri, 22 Dec 2023, Fritz Wuehler wrote:
>> D <nospam@example.net> wrote:
>>> On Thu, 21 Dec 2023, Yamn Remailer wrote:
>>>
>>>> With a nym account at mixmin.net or paranoici.org you're in absolute
>>>> stealth mode. Managed by a local OmniMix proxyserver, which uses the
>>>> Tor network, nobody will get knowledge of your mailing activities.
>>>
>>> I'm afraid not, but you need to trust the people running mixmin.net or
>>> paranoici.org. I'm sure the protocols are well designed, but just the
>>> fact that you have to go to those domain names and open an account puts
>>> you at risk, since you have no clue who runs it.
>>
>> No reason to be afraid. Nymserver admins get nothing of relevance from
>> a WME-encrypted nym-to-nym dialog. Both participants are anonymous, all
>> data they transfer are encrypted, and it's reliable, as with every mail
>> delivery its sender gets an acknowlegement that proves success.
>>
>
>But they do. The fact that communication does take place. Content is
>encrypted, but not the fact that messages are being sent, assuming the
>potential attacker is monitoring a suspect.

An attacker monitoring my Internet connection while I'm running OmniMix
and the Tor Browser will see that I'm constantly exchanging data with
the Tor network, but he won't find out for what reason.

Re: You're LEAKING Your LOCATION!

<20231224115452.DEA821006EC@tidalhost.archiade.net>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=401&group=alt.privacy#401

  copy link   Newsgroups: alt.privacy alt.privacy.anon-server alt.privacy.pgp alt.security.pgp
DKIM-Filter: OpenDKIM Filter v2.11.0 tidalhost.archiade.net DEA821006EC
From: jackryan@example.org (Jack Ryan)
Subject: Re: You're LEAKING Your LOCATION!
References: <1336fb480bc7e8730e2219053657f351@msgid.frell.theremailer.net>
<f1b0553c16a379df22324c263a1d07fe@dizum.com>
<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
<20231221.090033.17459708@erienetworks.net>
<d15c72d5-16e8-9285-840e-b2ef408ea403@example.net>
<20231222.211213.01884358@remailer.frell.eu.org>
<b0dae716-b28b-e7e3-96e7-878afd64da0c@example.net>
Message-Id: <20231224115452.DEA821006EC@tidalhost.archiade.net>
Date: Sun, 24 Dec 2023 06:54:51 -0500 (EST)
Newsgroups: alt.privacy, alt.privacy.anon-server, alt.privacy.pgp,
alt.security.pgp
Path: i2pn2.org!rocksolid2!news.neodome.net!news.mixmin.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Jack Ryan - Sun, 24 Dec 2023 11:54 UTC

Fritz Wuehler wrote:

> D <nospam@example.net> wrote:
> >On Fri, 22 Dec 2023, Fritz Wuehler wrote:
> >> D <nospam@example.net> wrote:
> >>> On Thu, 21 Dec 2023, Yamn Remailer wrote:
> >>>
> >>>> With a nym account at mixmin.net or paranoici.org you're in
> >>>> absolute stealth mode. Managed by a local OmniMix proxyserver,
> >>>> which uses the Tor network, nobody will get knowledge of your
> >>>> mailing activities.
> >>>
> >>> I'm afraid not, but you need to trust the people running
> >>> mixmin.net or paranoici.org. I'm sure the protocols are well
> >>> designed, but just the fact that you have to go to those domain
> >>> names and open an account puts you at risk, since you have no
> >>> clue who runs it.
> >>
> >> No reason to be afraid. Nymserver admins get nothing of relevance
> >> from a WME-encrypted nym-to-nym dialog. Both participants are
> >> anonymous, all data they transfer are encrypted, and it's
> >> reliable, as with every mail delivery its sender gets an
> >> acknowlegement that proves success.
> >>
> >
> >But they do. The fact that communication does take place. Content is
> >encrypted, but not the fact that messages are being sent, assuming
> >the potential attacker is monitoring a suspect.
>
> An attacker monitoring my Internet connection while I'm running
> OmniMix and the Tor Browser will see that I'm constantly exchanging
> data with the Tor network, but he won't find out for what reason.
>
An attacker who can monitor your Internet connection can possibly put
a Government Trojan on your PC, which you can't detect.

Guess why Mixmaster and YAMN supports outfiles, to be created on an
offline PC.

Merry Christmas and a Happy New Year.

Re: You're LEAKING Your LOCATION!

<umkf9j$fen8$3@dont-email.me>

  copy mid

https://rocksolidbbs.com/computers/article-flat.php?id=402&group=alt.privacy#402

  copy link   Newsgroups: alt.privacy.anon-server alt.privacy alt.privacy.pgp alt.security.pgp
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: unruh@invalid.ca (William Unruh)
Newsgroups: alt.privacy.anon-server,alt.privacy,alt.privacy.pgp,alt.security.pgp
Subject: Re: You're LEAKING Your LOCATION!
Date: Thu, 28 Dec 2023 18:37:39 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <umkf9j$fen8$3@dont-email.me>
References: <f1b0553c16a379df22324c263a1d07fe@dizum.com>
<ac122407-eb31-2cea-9ed1-00a18c96b41c@example.net>
Injection-Date: Thu, 28 Dec 2023 18:37:39 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6719d520e86f70026fac0f85e98bcf49";
logging-data="506600"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+hk95ifovdEqP4Oc+9Fqfr"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:ioTN032UOZmoRuU+Z9TZJGFXNwQ=
 by: William Unruh - Thu, 28 Dec 2023 18:37 UTC

On 2023-12-21, D <nospam@example.net> wrote:
> Every email provider can theoretically read your email, including tuta,
> unless you encrypt it yourself. That in turn, leaves you vulnerable to
> metadata exposure.
>
> If you need to be able to receive email, it makes it tough. Sending email,
> you could always hop on some wifi, tunnel it a bit, and create a throw
> away account.
>
> I think that email is not the way in case you want absolute and strict
> secrecy.
>
> If you want some secrecy and better than nothing security, tuta is a good
> provider, or even better, you could selfhost your email.

The only way to get secrecy is to not connect to the net. A vastly less
secret way is to use a VPN, but as said, they you need to encrypt
everything. That will still tell the snooper that someone connected to a
certain address, but not who. But that is pretty useless in general
because most recipients woul not know what to do with it. Also nothing
would help if you need to receive stuff. `
>
>
>
> On Wed, 20 Dec 2023, Nomen Nescio wrote:
>
>> https://www.youtube.com/watch?v=A9DPDE0FZeQ
>>
>> One last thing... get off Hotmail, Gmail or whetever you're using and send your email
>> encrypted so that your ISP or email provider can't profile you. https://tuta.com/
>> (the best out there) FREE and premium services! END TO END ENCRYPTION!!!
>>
>> Do you realize Hotmail and other providers can read your email? That's a no no!!!
>>
>> Stay safe, stay encrypted!

As mentioned that is useless in general since almost no-one will know
what the hell to do with an encrypted email.
There are lots of encryption products out there. In linux, gpg comes for
free. And yes, any provider can read your emails. Mind you with many
petabytes doing through their systems every day, it would be pretty hard
to keep up unless they had a real interest in you personally, in which
case a vpn would make it hard for them to know the email came from you.

>>
>>


computers / alt.privacy / Re: You're LEAKING Your LOCATION!

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor