On 10/02/2014 01:27 AM, Kevin Wayne Williams wrote:
Focusing on what signature we can obtain from (or plant on) the device and how to make that signature available to and manageable by admins is the key.
... wait. Did you just suggest that we mitigate the inability to use an anonymizing system by a minuscule minority by imposing a massive privacy violation on every user?
-- Marc