Transaction

b9dc3880111dce9ae1b84ede58e1cc907379344f71a97961baa29527e5ce054c
Timestamp (utc)
2021-01-28 19:20:13
Fee Paid
0.00002743 BSV
(
0.00002743 BSV
-
0.00000000 BSV
)
Fee Rate
500.7 sat/KB
Version
1
Confirmations
267,173
Size Stats
5,478 B

1 Output

Total Output:
0.00000000 BSV
  • j"19HxigV4QyBv3tHpQVcUEQyq1pzZVdoAutM\<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <HTML> <HEAD> <TITLE> Tor Stinks re Traffic Analysis and Sybil (as do other networks) </TITLE> <LINK REL="Index" HREF="index.html" > <LINK REL="made" HREF="mailto:cypherpunks%40lists.cpunks.org?Subject=Re%3A%20Tor%20Stinks%20re%20Traffic%20Analysis%20and%20Sybil%20%28as%20do%20other%20networks%29&In-Reply-To=%3C2f5bd2f2-a277-7b03-05d1-844550d4cf8c%40tsto.co.uk%3E"> <META NAME="robots" CONTENT="index,nofollow"> <style type="text/css"> pre { white-space: pre-wrap; /* css-2.1, curent FF, Opera, Safari */ } </style> <META http-equiv="Content-Type" content="text/html; charset=utf-8"> <LINK REL="Previous" HREF="077891.html"> <LINK REL="Next" HREF="077929.html"> </HEAD> <BODY BGCOLOR="#ffffff"><i>This page was mutated from <a href="/3c0b63fb092c0dc096d27f9bfcb61b2755a81b0e70252063ae49c737436e7d14">its original content</a> to link to blockchain transactions by hash.</i><br/><i>This was an html rendering of the <a href="/94a17ba84b4929c2aa383b2234b2aea1fb04e676f3edb09ac92d72bb932c8af3">plaintext</a> from an <a href="/551fe52e46f464608baa1276cd3e4a8527f3d07267ef1781cfecd073408a705c">original raw email</a> numbered 077927.</i> <H1>Tor Stinks re Traffic Analysis and Sybil (as do other networks)</H1> <B>Peter Fairbrother</B> <A HREF="mailto:cypherpunks%40lists.cpunks.org?Subject=Re%3A%20Tor%20Stinks%20re%20Traffic%20Analysis%20and%20Sybil%20%28as%20do%20other%20networks%29&In-Reply-To=%3C2f5bd2f2-a277-7b03-05d1-844550d4cf8c%40tsto.co.uk%3E" TITLE="Tor Stinks re Traffic Analysis and Sybil (as do other networks)">peter at tsto.co.uk </A><BR> <I>Mon Nov 25 16:58:09 PST 2019</I> <P><UL> <LI>Previous message: Tor Stinks re Traffic Analysis and Sybil (as do other networks) </li> <LI>Next message: Tor Stinks re Traffic Analysis and Sybil (as do other networks) </li> <LI> <B>Messages sorted by:</B> [ date ] [ thread ] [ subject ] [ author ] </LI> </UL> <HR> <!--beginarticle--> <PRE>On 23/11/2019 23:23, Punk-Stasi 2.0 wrote: &gt;<i> My guess is that the main reason for them to get as many users as they can is to justify funding. </I> Initially the main reason was to increase traffic, in order to make traffic analysis harder. Really. I was around when the idea was first being discussed - Roger, Lucky, Paul (in a smaller role than often stated), Len, Nick, a few others - Matt dropped in occasionally, Ian and Caspar gave their 2c worth. For some reason George and Andrei (mixmaster/mixminion math gurus) weren't much involved. Justifying funding is just a nice side-effect. On 25/11/2019 11:03, grarpamp wrote: &gt;&gt; any low-latency web onion router - could not defeat The Man &gt; &gt; This seems yet to be lacking proof and perhaps &gt; cannot actually be said without it. I thought I wrote that quite carefully, but perhaps I should rephrase it: &quot;Any practical likely-to-be-successful low-latency web onion router cannot defeat The Man.&quot; While a proof of that is not available, I do not know how to do it - do you? Please tell. That was certainly the general conclusion of the crypto privacy/anonymity community at the time TOR was developed. My conclusion also, and I haven't seen anything since to make me change my mind. Low latency means that only a few seconds of traffic need be considered. Web means that users have lots of traffic repeats in time-defined patterns. These make traffic analysis resistance hard. Adding dummy cover traffic does not help until you use impractical levels of cover traffic, it is better to spend limited spare traffic resources on padding to make files the same size, even though this will not defeat The Man it does make his job harder. Dithering timing doesn't really help much against The Man's computing resources, at least until you get to something that is not low latency. ps by The Man I mean someone like NSA with widespread access to raw traffic and considerable computing resources. It should be noted that NSA do not say they can break TOR in practice, and afaik there is no evidence that they have. In all the &quot;Dark Web&quot; busts I have read about there has been no evidence presented as part of a general break in TOR. Maybe they can't (or just don't) break it. Of course, if they have broken TOR that is optimal for NSA - don't tell anyone it is broken, so people keep using it. Remember Coventry/Enigma (which never happened, but it is a good story). Never Say Anything. Peter Fairbrother </PRE> <!--endarticle--> <HR> <P><UL> <!--threads--> <LI>Previous message: Tor Stinks re Traffic Analysis and Sybil (as do other networks) </li> <LI>Next message: Tor Stinks re Traffic Analysis and Sybil (as do other networks) </li> <LI> <B>Messages sorted by:</B> [ date ] [ thread ] [ subject ] [ author ] </LI> </UL> <hr> More information about the cypherpunks mailing list<br> </body></html> text/htmlbinary(903452bc4d23028dcc243133735365109dfa24c9
    https://whatsonchain.com/tx/b9dc3880111dce9ae1b84ede58e1cc907379344f71a97961baa29527e5ce054c