mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-26 21:31:15 +00:00
@@ -57,5 +57,3 @@ One of the clearest threat models is one where people *know who you are* and one
|
||||
Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)
|
||||
|
||||
[^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident).
|
||||
|
||||
--8<-- "includes/abbreviations.en.txt"
|
||||
|
Reference in New Issue
Block a user