Hacker News new | past | comments | ask | show | jobs | submit login

This misses the point, the user in question was fully deanonymized. This blog post is saying that those successful techniques are no longer usable.

It's entirely appropriate to pursue a defense in depth strategy while questioning any particular layer.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: