So, you're probably asking yourself "just where do I get this nifty tool?". Ah yes, well, it seems the author of this tool had the foresight to make sure he/she was truly anonymous. First you need to install the i2p software. But don't worry, its not spyw
L. Sweeney. International Journal on Uncertainty Fuzziness and Knowledge-based Systems, 5 (10):
557--570(2002)issn = 0218-4885,
publisher = World Scientific Publishing Co., Inc.,
address = River Edge, NJ, USA,.
V. Benjumea, S. Choi, J. Lopez, und M. Yung. Cryptology and Network Security, Volume 4856 von Lecture Notes in Computer Science, Seite 265-281. Springer, (2007)
J. Camenisch, und E. Herreweghen. CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, Seite 21-30. New York, NY, USA, ACM, (2002)