FYI, it’s entirely justifiable
FYI, it’s entirely justifiable
The logic in the flowchart appears to take in data and mainuplate it based on normalization and ratios to fill the day. So it outputs a report with time that doesn’t precisely match the tracked data, but looks nicer for the boss.
Ok, technically still vulnerable in the sense that if you transfer a huge file in excess of other parts of the bundle, it might be identifiable by a bad actor, but that’s really misleading, since i2p has a lot of built in logic that makes that scenario pretty unlikely.
You linked an article that doesn’t say anything to back up your claim. Why do you say i2p is vulnerable to timing attacks?
Ubuntu used to do ads pretty well, even before microsoft got better at them, haven’t used that distro in a while, so can’t confirm if that’s the case still, but you might want to check it out.
are those real? I don’t believe anyone ever said “it’s like linux but it works.”
Since it is inconceivable all scientific theories are correct, the most logical conclusion is they are all wrong.
Use i2p