| ▲ | Seattle3503 11 hours ago | |
No, it's a question about how a government would break cryptographic protocols, or force others to. If the identifiers are pseudonyms, if the government compelled someone to share their user IDs, all the government would see are basically a bunch of UUIDs keyed to that provider. So what specific actions are you talking about. What is your threat model? | ||