mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-08-08 14:32:14 -04:00
parent
f3f092d1a3
commit
65db9d3fee
61 changed files with 108 additions and 210 deletions
|
@ -57,5 +57,3 @@ One of the clearest threat models is one where people *know who you are* and one
|
|||
Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)
|
||||
|
||||
[^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident).
|
||||
|
||||
--8<-- "includes/abbreviations.en.txt"
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue