forked from I2P_Developers/i2p.www
Add sub-DBs blog post
This commit is contained in:
@@ -53,6 +53,7 @@ It also "remembers" how that communication occurred.
|
|||||||
{%- endtrans %}
|
{%- endtrans %}
|
||||||
|
|
||||||
{% trans -%}
|
{% trans -%}
|
||||||
|
For a moment, we should imagine ourselves as an attacker.
|
||||||
Imagine if you were trying to discover the identity of a master of disguise.
|
Imagine if you were trying to discover the identity of a master of disguise.
|
||||||
You know for sure you have seen his real face, and you know for sure that you regularly communicate with one of his disguises.
|
You know for sure you have seen his real face, and you know for sure that you regularly communicate with one of his disguises.
|
||||||
How would you go about establishing that the disguise identity and the real identity belong to the same person?
|
How would you go about establishing that the disguise identity and the real identity belong to the same person?
|
||||||
|
Reference in New Issue
Block a user