>>42But
>>36 said Theorem, not Theory or Hypothesis, which is really what he is proposing (a proposition). Still with all the major ISP routers being monitored by the 5👀's, routing traffic and collection is a serious concern.
Taking a look at the following:
http://grothoff.org/christian/nss2011.pdfhttps://gnunet.org/r5n https://gnunet.org/sites/default/files/nss2011.pdfAnd for the I2P thing, can they implement purpose a random delay to mitigate those type of attacks? If stuff like this that has me worried. I knew "cyber warfare" was soon, but not this soon:
http://www.infoworld.com/d/security/in-his-own-words-confessions-of-cyber-warrior-222266