-- Leo's gemini proxy
-- Connecting to git.thebackupbox.net:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini
repo: resdb action: commit revision: path_from: revision_from: 82b659e694a5ec62c49df9fe8bc63a6ca6847424: path_to: revision_to:
commit 82b659e694a5ec62c49df9fe8bc63a6ca6847424 Author: Nick <nick@somerandomnick.ano> Date: Wed Jun 1 13:53:22 2011 +0000 updated a2.o/anonymity diff --git a/doc/www.anonet2.org/public_pod/anonymity.pod b/doc/www.anonet2.org/public_pod/anonymity.pod
--- a/doc/www.anonet2.org/public_pod/anonymity.pod +++ b/doc/www.anonet2.org/public_pod/anonymity.pod @@ -81,6 +81,13 @@ of the options physically available to an attacker, even if they're not "legally" available to him. You certainly don't want your anonymity dependent on an adversary "playing by the rules," do you?) +As L<the world's current trend towards totalitarianism continues to +develop|http://www.theregister.co.uk/2011/03/11/us_tpp_proposal_leaked/>, +it will only become easier for others to invade your privacy on IcannNet. +It's really just a matter of time in our accounting-centered world before +your legal right to anonymity converges to zero. This is why it becomes +even more important to learn how to protect your anonymity. + =head2 A Bit More Formality A very powerful science for dealing with these types of problems is
-----END OF PAGE-----
-- Response ended
-- Page fetched on Sun Jun 2 09:51:11 2024