equal
deleted
inserted
replaced
7 |
7 |
8 \begin{enumerate} |
8 \begin{enumerate} |
9 \item What are good uses of anonymity services like Tor? |
9 \item What are good uses of anonymity services like Tor? |
10 |
10 |
11 \item What is meant by the notion \emph{forward privacy}? |
11 \item What is meant by the notion \emph{forward privacy}? |
|
12 |
|
13 \item What is a \emph{re-identification attack}? |
12 |
14 |
13 \item Imagine you have an completely `innocent' email message, |
15 \item Imagine you have an completely `innocent' email message, |
14 like birthday wishes to your grandmother? Why should you |
16 like birthday wishes to your grandmother? Why should you |
15 still encrypt this message and your grandmother take the |
17 still encrypt this message and your grandmother take the |
16 effort to decrypt it? |
18 effort to decrypt it? |