-- Leo's gemini proxy

-- Connecting to git.thebackupbox.net:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini

repo: resdb
action: commit
revision:
path_from:
revision_from: 82b659e694a5ec62c49df9fe8bc63a6ca6847424:
path_to:
revision_to:

git.thebackupbox.net

resdb

git://git.thebackupbox.net/resdb

commit 82b659e694a5ec62c49df9fe8bc63a6ca6847424
Author: Nick <nick@somerandomnick.ano>
Date:   Wed Jun 1 13:53:22 2011 +0000

    updated a2.o/anonymity

diff --git a/doc/www.anonet2.org/public_pod/anonymity.pod b/doc/www.anonet2.org/public_pod/anonymity.pod

index e556c5eaf70a447da9ca7f8b89fd835898ade162..

index ..c6da374098cea00d5ec4985cc45eb9915a35d81e 100644

--- a/doc/www.anonet2.org/public_pod/anonymity.pod
+++ b/doc/www.anonet2.org/public_pod/anonymity.pod
@@ -81,6 +81,13 @@ of the options physically available to an attacker, even if they're not
 "legally" available to him.  You certainly don't want your anonymity
 dependent on an adversary "playing by the rules," do you?)

+As L<the world's current trend towards totalitarianism continues to
+develop|http://www.theregister.co.uk/2011/03/11/us_tpp_proposal_leaked/>,
+it will only become easier for others to invade your privacy on IcannNet.
+It's really just a matter of time in our accounting-centered world before
+your legal right to anonymity converges to zero.  This is why it becomes
+even more important to learn how to protect your anonymity.
+
 =head2 A Bit More Formality

 A very powerful science for dealing with these types of problems is

-----END OF PAGE-----

-- Response ended

-- Page fetched on Sun Jun 2 09:51:11 2024