Now showing items 1-1 of 1

    • Cryptogenography: Anonymity without trust 

      JAKOBSEN, SK (2016-01-18)
      The usual methods of getting anonymity, such as using a VPN or the Tor network, requires some amount of trust: You have to either trust a particular server or trust that not too many servers in a network have been corrupted. ...