This post is unavailable.
There are likely cryptographic ways to protect identity, combined with ways to prevent aggregated data analysis.
1
In this context, you want to be able to verify that the service authorised the user; but not for what or why. Voting harder.
Dec 15, 2016 ยท 5:52 PM UTC
2

