Comment Re:Who promised? (Score 2, Insightful) 108
So, to be anonymous, I need to get behind 7 proxies, use tor and ssh on a hacked wifi...
RTFA - I think you missed the point:
Our de-anonymization algorithm is based purely on the network topology
So, to be anonymous, I need to get behind 7 proxies, use tor and ssh on a hacked wifi...
RTFA - I think you missed the point:
Our de-anonymization algorithm is based purely on the network topology
The world is moving so fast these days that the man who says it can't be done is generally interrupted by someone doing it. -- E. Hubbard