You meant thread model? Yeah, definitively. Still the question for the thread model is essential, as there are so many ways to screw up, especially when explicitly targeted. Just google TOR / VPN / VPS de-anonymizing. But some of these ways may be good enough for a specific use case. And some of...