Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's disingenuous, at best, to style a system as "anonymous" when it's providing only a very limited sort of anonymity. Consider the dispute between the FBI etc and Apple over backdooring iPhone encryption. By the logic that you propose here, Apple could claim secure device encryption even with backdoors.

Indeed, claims about anonymity are a red flag for bullshit. Because it's so nontrivial. And because failure tends to be calamitous.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: