[ridiculous psychological patterns] in order to deanonymise an anonymity network using timing patterns, we will need two things: 1. newly hacked machine learning algorithms 2. use of an effective anonymity network to deanonymise I suppose we should start with #2. 2a. add constant chaff to tor, knowing this was helpful two decades ago and having no idea what is helpful now 2b. register an email address from a clean purposed system, dissociated from our legal identity