• http://www.cs.sunysb.edu/~nilesh Nilesh Vijaywargiay

    Hey! I have a naive question here ..
    I think they can always hash the IP and store the user search information corresponding to the hash key generated. After six months, they would just hash the incoming IP and compare with the hash key database they already have. Am I missing something here?