repeatedly adding to a counter's statistics, a combination of the visitor's ip address and the particular counter's username are converted to an encrypted hash (which we cannot reverse), and then the hash itself is placed into a filter (for up to hour after which it is erased). this method allows our counters...