Grammar
This commit is contained in:
parent
29d8e22844
commit
4f1e7b3b4e
|
@ -21,7 +21,7 @@ And thus, many P2P systems state that this constraint makes privacy hard. The re
|
||||||
|
|
||||||
Of course we know that Freenet presented solutions that provided pretty strong guarantees for reader anonymity and publisher anonymity nearly 2 decades ago. We've known that we can do private source discovery in P2P networks for literal decades.
|
Of course we know that Freenet presented solutions that provided pretty strong guarantees for reader anonymity and publisher anonymity nearly 2 decades ago. We've known that we can do private source discovery in P2P networks for literal decades.
|
||||||
|
|
||||||
Further,We now have networks like Tor and i2p which present really neat peer addressing solutions that anonymize IP endpoints and protect publishers and readers almost out of the box. (with [some caveats](https://onionscan.org))
|
Further, we now have networks like Tor and i2p which present really neat peer addressing solutions that anonymize IP endpoints and protect publishers and readers almost out of the box. (with [some caveats](https://onionscan.org))
|
||||||
|
|
||||||
We *know* that metadata analysis is *the* thing that drives mass surveillance systems. Why in 2018 are we building new P2P networks that don't offer any reasonable privacy guarantees against mass surveillance capable adversaries?!
|
We *know* that metadata analysis is *the* thing that drives mass surveillance systems. Why in 2018 are we building new P2P networks that don't offer any reasonable privacy guarantees against mass surveillance capable adversaries?!
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue