[ridiculous psychological patterns]
in order to deanonymise an anonymity network using timing patterns, we will need two things:
1. newly hacked machine learning algorithms
2. use of an effective anonymity network to deanonymise
I suppose we should start with #2.
2a. add constant chaff to tor, knowing this was helpful two decades ago and having no idea what is helpful now
2b. register an email address from a clean purposed system, dissociated from our legal identity