diff --git a/blog/posts/privacy-pass.md b/blog/posts/privacy-pass.md index 724c4cf7..dba01ef0 100644 --- a/blog/posts/privacy-pass.md +++ b/blog/posts/privacy-pass.md @@ -46,6 +46,16 @@ We're still falling short in a major area though. Current smartphones are non-upgradeable by their owners and can't be built from scratch like a desktop computer can. They also contain lots of black-box proprietary code. Even a Google Pixel, the gold standard of Android smartphone freedom that allows you to install your own operating system securely, still suffers from the same pitfalls. +### Cryptography + +How do we ensure the psuedonyms can't be linked together? We already use cryptography to protect our communications; here Chaum presents ways to protect unlinkability in a similar way using cryptography. + +>Simple mathematical proofs show that, with appropriate use of the systems, even conspiracy of all organizations and tapping of all communication lines cannot yield enough information to link the pseudonyms-regardless of how clever the approach is or how much computation is expended. + +## Types of Transactions + +### + ## Problems Services that don't require an account or payment to use are great; you can use them with Tor, clear your browser history, whatever you need to do to keep your activity private.