Comment Re:Who promised? (Score 2, Insightful) 108
So, to be anonymous, I need to get behind 7 proxies, use tor and ssh on a hacked wifi...
RTFA - I think you missed the point:
Our de-anonymization algorithm is based purely on the network topology
So, to be anonymous, I need to get behind 7 proxies, use tor and ssh on a hacked wifi...
RTFA - I think you missed the point:
Our de-anonymization algorithm is based purely on the network topology
Advertising is the rattling of a stick inside a swill bucket. -- George Orwell