On 12/6/14, EGOTISTICALSHALLOT <egotisticalshal...@openmail.cc> wrote:

"This fictional example is constructed to convey some similarities to
parts of reporting in the public knowledge base."

...

"Fictional Input Document"

...

With a link to an actual example,
   
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption

where the source document, "'Peeling back the layers with Egotistical
Giraffe" is referenced.


hope that clears things up.  best regards,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to