Hacker News new | past | comments | ask | show | jobs | submit login

> No servers; nowhere for metadata to accumulate (other than the clients, of course).

If the network itself is controlled by adversary, you leak more metadata passing data directly. If data goes through honest server, attacker needs to do time correlation analysis.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: