Hacker News new | past | comments | ask | show | jobs | submit login

Wouldn't those people have used encrypted communications over Usenet[1] or burner cell phones? Or sometimes even anonymous remailers?

And all those are just as tricky. De-anonymizing alt.anonymous.messages (http://ritter.vg/blog-deanonymizing_amm.html)




Certainly, many would. Would as many though?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: