From 82b659e694a5ec62c49df9fe8bc63a6ca6847424 Mon Sep 17 00:00:00 2001 From: Nick Date: Wed, 1 Jun 2011 13:53:22 +0000 Subject: updated a2.o/anonymity --- doc/www.anonet2.org/public_pod/anonymity.pod | 7 +++++++ 1 file changed, 7 insertions(+) (limited to 'doc/www.anonet2.org') diff --git a/doc/www.anonet2.org/public_pod/anonymity.pod b/doc/www.anonet2.org/public_pod/anonymity.pod index e556c5e..c6da374 100644 --- a/doc/www.anonet2.org/public_pod/anonymity.pod +++ b/doc/www.anonet2.org/public_pod/anonymity.pod @@ -81,6 +81,13 @@ of the options physically available to an attacker, even if they're not "legally" available to him. You certainly don't want your anonymity dependent on an adversary "playing by the rules," do you?) +As L, +it will only become easier for others to invade your privacy on IcannNet. +It's really just a matter of time in our accounting-centered world before +your legal right to anonymity converges to zero. This is why it becomes +even more important to learn how to protect your anonymity. + =head2 A Bit More Formality A very powerful science for dealing with these types of problems is -- cgit v1.2.3