Building a new Tor that can resist next-generation state surveillance

Georgi Guninski guninski at guninski.com
Sun Feb 19 05:04:53 PST 2017


On Sun, Feb 19, 2017 at 12:59:24AM -0500, grarpamp wrote:
> Reviewing designs... designing against threats... tracking proof...
> three areas. Do it, get funding, make yourself a star.

Does theory allow anonymity in the presence of sufficiently powerful
network adversary?

What are the disadvantages for better anonymity? (using one time device
isn't cheap and requires to find device)



More information about the cypherpunks mailing list