FINDING · DEFENSE

Anderson establishes that anonymity and physical redundancy are substitutes: 'Anonymity enables us to reduce diversity.' Tamper-resistant hardware security modules controlling anonymized file servers ensure no identifiable group of people — including sysadmins — can locate or delete a specific file without breaking a quorum of hardware modules distributed across jurisdictions.

From 1996-anderson-eternityThe Eternity Service · §4.5 · 1996 · Theory and Applications of Cryptology

Implications

Tags

censors
generic
techniques
flow-correlation
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.