Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This misses the point, the user in question was fully deanonymized. This blog post is saying that those successful techniques are no longer usable.

It's entirely appropriate to pursue a defense in depth strategy while questioning any particular layer.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: