If I were an authoritarian surveillance state what better way to sort through the riff Raff and find "domestic terrorists"? Think if it like identifying honeypot Tor nodes, if you at the end of the stream and certain fish don't come you've identified which service they are using
If I were an authoritarian surveillance state what better way to sort through the riff Raff and find "domestic terrorists"? Think if it like identifying honeypot Tor nodes, if you at the end of the stream and certain fish don't come you've identified which service they are using