Re: [tor-dev] Contents of tor-dev digest...

2017-04-10 Thread Mike Guidry
I didn't write the paper for this list specifically. It requires performing DDoS attacks. Your the one trolling someone in reality. I am not going to go out of my way to spend time when realistically its quite simple to perform. If you don't want to use NTP, and other factors to performing effi

Re: [tor-dev] Contents of tor-dev digest...

2017-04-10 Thread dawuud
> I'm not presenting a scientific paper. Its an actual method that works. You must learn how to articulate the idea without muddling it with all kinds of other irrelevant stuff. Nobody mentioned scientific papers. Are you saying that you don't read papers describing attacks on Tor? They are real

Re: [tor-dev] Contents of tor-dev digest...

2017-04-10 Thread Mike Guidry
I'm not presenting a scientific paper. Its an actual method that works. You can DDoS various networks to compare against active connections on TOR, and otherwise... On Mon, Apr 10, 2017 at 12:22 PM, dawuud wrote: > > > Dear Mike Guidry, > > My reply here is snarky but I just cannot help it. Pl

Re: [tor-dev] Contents of tor-dev digest...

2017-04-10 Thread dawuud
Dear Mike Guidry, My reply here is snarky but I just cannot help it. Please consider me a friend that is snarky rather than an enemy or an asshole. I am finding it very hard to read. It is *extremely* annoying that you present your definition of "hacking" at the beginning and then go on to defi

Re: [tor-dev] Contents of tor-dev digest...

2017-04-10 Thread Mike Guidry
I am not trolling you. I attached a PDF which explains how to trace TOR connections over the internet. It is not a joke. I have some other vulnerabilities at that URL I am releasing. I'll include here: Michael Guidry March 15, 2017 Tracing connections online from the virtual landscape to the