Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This makes a lot of assumptions about the threat model of Tor users.


No, it does not.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: