Please provide code examples, flow chart, or a white paper. On Wed, Dec 14, 2022 at 5:06 PM <operation.privacyenforcem...@mailbox.org> wrote:
> On 1/9/84 19:84, Andy Smith wrote: > > Hello, > > Can't comment on something you haven't elaborated upon. > > First step, explain why your idea is better than, say, Tor. > > It is about solving a problem that counts as technically unsolveable. > The idea is about making any type of traffic correlation including > timing attacks very hard up to impossible. It also would make > statistical analyses of routed traffic, by user behaviour caused network > traffic routing much more catchier. If the product is available it will > be very hard even for government agencies and people with huge amounts > of money and access to large parts of the internet infrastructure to > reallocate traffic back to sender or destination. > Imagine agencies could not distinguish a difference between all of your > users. Does it not sound interesting? > > This solutions needs to be developed to reclaim our fundamental rights > technically and enforce our right to privacy. It is right before 1984 > and we need a privacy revolution, an enforcement of privacy. > >