19 Feb
2017
19 Feb
'17
1:04 p.m.
On Sun, Feb 19, 2017 at 12:59:24AM -0500, grarpamp wrote:
Reviewing designs... designing against threats... tracking proof... three areas. Do it, get funding, make yourself a star.
Does theory allow anonymity in the presence of sufficiently powerful network adversary? What are the disadvantages for better anonymity? (using one time device isn't cheap and requires to find device)