I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Commit c0cd2402 authored by eyedeekay's avatar eyedeekay
Browse files

Add sub-DBs blog post

parent f5ce0c09
No related branches found
No related tags found
No related merge requests found
...@@ -53,6 +53,7 @@ It also "remembers" how that communication occurred. ...@@ -53,6 +53,7 @@ It also "remembers" how that communication occurred.
{%- endtrans %} {%- endtrans %}
{% trans -%} {% trans -%}
For a moment, we should imagine ourselves as an attacker.
Imagine if you were trying to discover the identity of a master of disguise. Imagine if you were trying to discover the identity of a master of disguise.
You know for sure you have seen his real face, and you know for sure that you regularly communicate with one of his disguises. You know for sure you have seen his real face, and you know for sure that you regularly communicate with one of his disguises.
How would you go about establishing that the disguise identity and the real identity belong to the same person? How would you go about establishing that the disguise identity and the real identity belong to the same person?
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment