What measures can be taken to protect the source IP of the mobile device? (without using TOR). All of this seems a bit disingenuous if the server can associate between the pseudonym and the IP address of the user running the application. Any thoughts on overcoming this challenge? Clearly there will be a NAT on the way, but in many cases, this information can still be resolved as it is done routinely by LE today.
What measures can be taken to protect the source IP of the mobile device? (without using TOR). All of this seems a bit disingenuous if the server can associate between the pseudonym and the IP address of the user running the application. Any thoughts on overcoming this challenge? Clearly there will be a NAT on the way, but in many cases, this information can still be resolved as it is done routinely by LE today.