> If someone wants you compromised, you will get compromised, it only matters how many resources they are willing to throw at you.
Wants who compromised? What are they going to do against people who use no pseudonym and never originate from the same machine or the same physical location?
Wants who compromised? What are they going to do against people who use no pseudonym and never originate from the same machine or the same physical location?