I didn't write the paper for this list specifically. It requires
performing DDoS attacks. Your the one trolling someone in reality. I am
not going to go out of my way to spend time when realistically its quite
simple to perform. If you don't want to use NTP, and other factors to
performing effi
> I'm not presenting a scientific paper. Its an actual method that works.
You must learn how to articulate the idea without muddling it with all kinds
of other irrelevant stuff. Nobody mentioned scientific papers. Are you saying
that you don't read papers describing attacks on Tor? They are real
I'm not presenting a scientific paper. Its an actual method that works.
You can DDoS various networks to compare against active connections on TOR,
and otherwise...
On Mon, Apr 10, 2017 at 12:22 PM, dawuud wrote:
>
>
> Dear Mike Guidry,
>
> My reply here is snarky but I just cannot help it. Pl
Dear Mike Guidry,
My reply here is snarky but I just cannot help it. Please consider me
a friend that is snarky rather than an enemy or an asshole.
I am finding it very hard to read. It is *extremely* annoying that you
present your definition of "hacking" at the beginning and then go on to
defi
I am not trolling you. I attached a PDF which explains how to trace TOR
connections over the internet. It is not a joke. I have some other
vulnerabilities at that URL I am releasing.
I'll include here:
Michael Guidry March 15, 2017
Tracing connections online from the virtual landscape to the