Building a new Tor that can resist next-generation state surveillance
Georgi Guninski
guninski at guninski.com
Sun Feb 19 05:04:53 PST 2017
On Sun, Feb 19, 2017 at 12:59:24AM -0500, grarpamp wrote:
> Reviewing designs... designing against threats... tracking proof...
> three areas. Do it, get funding, make yourself a star.
Does theory allow anonymity in the presence of sufficiently powerful
network adversary?
What are the disadvantages for better anonymity? (using one time device
isn't cheap and requires to find device)
More information about the cypherpunks
mailing list