[ridiculous psychological patterns]

in order to deanonymise an anonymity network using timing patterns, we will
need two things:

1. newly hacked machine learning algorithms
2. use of an effective anonymity network to deanonymise

I suppose we should start with #2.

2a. add constant chaff to tor, knowing this was helpful two decades ago and
having no idea what is helpful now
2b. register an email address from a clean purposed system, dissociated
from our legal identity
  • [spam][joke] implementing a... Undiscussed Horrific Abuse, One Victim of Many
    • Re: [spam][joke] imple... Undiscussed Horrific Abuse, One Victim of Many
      • Re: [spam][joke] i... Undiscussed Horrific Abuse, One Victim of Many
        • Re: [spam][jok... Undiscussed Horrific Abuse, One Victim of Many
          • Re: [spam]... Undiscussed Horrific Abuse, One Victim of Many
            • Re: [... Undiscussed Horrific Abuse, One Victim of Many
              • R... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many
                • ... Undiscussed Horrific Abuse, One Victim of Many

Reply via email to