>>38Many graph theory proofs don't even have symbols, let alone equations. But you'd know that if you weren't an ignorant little cockpustule.
>>39I2P's design seems somewhat vulnerable to timing attacks (though certainly not more than Tor), and the implementation is execrable.