jaseg on Nostr: nprofile1q…u0kd5 From the point of view of a passive network adversary, using Tor ...
nprofile1qyt8wumn8ghj7un9d3shjtnyd968gmewwp6kytcqyqf88qjmum9qskt2syexve0nk26ep3t2xjw3uqch49t2qvnyfmu67ju0kd5 (nprofile…0kd5) From the point of view of a passive network adversary, using Tor will do little to hide that you're using signal or when you're using it since that will likely be possible to extract just from the timing of the encrypted Tor traffic.