This post is unavailable.
Replying to @pwaring
There are likely cryptographic ways to protect identity, combined with ways to prevent aggregated data analysis.

Dec 15, 2016 ยท 5:45 PM UTC

1
similar challenges in e-voting: anonymity of voter, secrecy of vote, but verification required โ€” hard crypto problem
2
In this context, you want to be able to verify that the service authorised the user; but not for what or why. Voting harder.
2