Gavin Andresen - 2011-03-14 20:33:25

@s{quotedtext} @s{quotedtext}
Preventing that type of statistical network analysis attack is what Tor and i2p are for.  If you require that level of anonymity, run bitcoin via a proxy to communicate over those networks.