Most of what we do is traceable because we chose to walk in traceable roads.
But we can follow digital roads that do not trace us, and that way become untraceable.
Digital traces are highly related to the routing protocols. For example although IP protocol is initially created to be untracable, when we use BGP routing, this turns IP to traceable one, because all IP packets from source to destination pass from a single routing path. Onion routing is trying to resolve anonymity issue, but as long as onion routing is usually established through BGP routers, it is still a problem when someone is capable to analyze all traffic from those BGP routers.
[quote=“jytou, post:8, topic:897, full:true”]
Anonymity is always relative to some other group. At least you know you are yourself and what you did (at least to some extent!
). And maybe a group of people know that what you did “anonymously” was
actually done by you, but for the rest of the world, these actions may
still have been done by someone whose identity is hidden to them.[/quote]
There is a complete anonymous scheme that can prove also your individuality, and this is the cryptoparty assembly, where you put your public key in a physical ballot box. In a cryptoparty assembly you can appear masked, so nobody knows you.

To get back to the point: from what I understood so far, members are not
anonymous to the other members who certified them (well otherwise
there’s no point in certifying anyone at all). To the rest of the
network and to the rest of the world, they may still be anonymous.
This is not the case in a masked cryptoparty assembly where we put printed public keys in a ballot box. In that case members are anonymous to the other members, but everybody certifies that the final list of public keys is valid and can be used as a proof of individuality, whithout the fear of sybil attacks.