Dnia sobota, 12 grudnia 2015 12:52:25 Steve Kinney pisze:
> Privacy supporters who understand network security, understand
> that any activity they want to conceal from all surveillance
> actors must either be conducted off the network, or via
> "anonymizing technology" that degrades network access to a lesser
> or greater extent (100% in instances involving two way
> communication with people who do not know or care about these
> matters), while being observed and recorded by actors hostile to
> privacy.

I still don't see how that makes it "impossible" -- just very, very hard at 
the moment.

-- 
Pozdrawiam,
Michał "rysiek" Woźniak

Zmieniam klucz GPG :: http://rys.io/pl/147
GPG Key Transition :: http://rys.io/en/147

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to