[ridiculous psychological patterns]

in order to deanonymise an anonymity network using timing patterns, we will need two things:

1. newly hacked machine learning algorithms
2. use of an effective anonymity network to deanonymise

I suppose we should start with #2.

2a. add constant chaff to tor, knowing this was helpful two decades ago and having no idea what is helpful now
2b. register an email address from a clean purposed system, dissociated from our legal identity