Dnia sobota, 12 grudnia 2015 12:52:25 Steve Kinney pisze: > Privacy supporters who understand network security, understand > that any activity they want to conceal from all surveillance > actors must either be conducted off the network, or via > "anonymizing technology" that degrades network access to a lesser > or greater extent (100% in instances involving two way > communication with people who do not know or care about these > matters), while being observed and recorded by actors hostile to > privacy.
I still don't see how that makes it "impossible" -- just very, very hard at the moment. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147
signature.asc
Description: This is a digitally signed message part.
