Hacker News new | past | comments | ask | show | jobs | submit login

From a game theory perspective, if an adversary has an effective tool, defeating that tool and creating enough doubt that the adversary no longer uses the tool are equivalent.

The major vulnerabilities sound like details of implementation alone. Then there is a difference between the more easily lost privacy and the less easily lost anonymity.

Finally, people who are actual experts seem to think it remains a tool for anonymity, and explain why in a credible way.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: