On 10/02/2014 01:27 AM, Kevin Wayne Williams wrote:
Focusing on what signature we can obtain from (or
plant on) the device
and how to make that signature available to and manageable by admins is
the key.
... wait. Did you just suggest that we mitigate the inability to use an
anonymizing system by a minuscule minority by imposing a massive privacy
violation on every user?
-- Marc