Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
kevin_thibedeau
on July 19, 2022
|
parent
|
context
|
favorite
| on:
New documents reveal scale of US Government’s cell...
So long as you have deep control of inbound and outbound peers you can deanonymize traffic by throttling one end and finding streams that are affected. The service providers selling faux security don't have to be involved.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: