

The point of having nukes is to threaten destruction of an enemy even at the cost of one’s own destruction. Analysts understand that actually using nuclear weapons benefits no one. Nukes don’t benefit the party that launches nukes upon event X taking place, the party that causes event X, or most bystanders. Saying that any party responsible for event X will be nuked is intended to ensure that event X doesn’t occur. Threats are not reality: threatening retaliation is not the same as actually retaliating.
Some facts have been simplified in this reply. Reality is more complicated but these basic principles do seem to hold most of the time.








See https://coveryourtracks.eff.org/ with Tor set to the Safest setting. The user share for Tor might be very small. However, because all Tor users have the same configuration, it doesn’t matter whether a fingerprint differs from Chrome. Among the x% of Tor traffic, x% traffic shares the same fingerprint. Chrome might account for y% of the traffic where each user has a unique fingerprint. But as long as x is not negligible, the fact that you’re using Tor provides very few bits of information (as an example, about 8 bits of identifying information) compared to a unique fingerprint (which provides much more information). I agree that Tor is not without its flaws, but saying that Tor deanonymizes you because of its user share is wrong. Also, please note that the EFF link I shared may be biased in the data it collects.