Comment Re:Who promised? (Score 2, Insightful) 108
So, to be anonymous, I need to get behind 7 proxies, use tor and ssh on a hacked wifi...
RTFA - I think you missed the point:
Our de-anonymization algorithm is based purely on the network topology
So, to be anonymous, I need to get behind 7 proxies, use tor and ssh on a hacked wifi...
RTFA - I think you missed the point:
Our de-anonymization algorithm is based purely on the network topology
"All my life I wanted to be someone; I guess I should have been more specific." -- Jane Wagner