Mitigating Dangers of Compromised Anonymity