http://lhbd7ojcaiofbfku7ixh47qj537g572zmhdc4oilvugzxdpdghua.b32.i2p/posts/7752
can walk a connection back to its originator, they just need enough time to do so. how can they walk it back? via hacking nodes, hacking ISPs, having authorized backdoor access to ISPs or, lastly