Hacker News new | past | comments | ask | show | jobs | submit login

If they want to find out whether a deanonymization technique works, they would choose a target whose identity and location is already known, so that they can confirm that the attack produced the right answer.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: