You know, it seemed to me that three hops from a “suspicious” user would encompass way too many people to be a meaningful limit. Someone actually did some math on real data. It turns out that a lot of numbers are connected through common hubs of activity…like, say, T-Mobile’s voicemail number, or Skype. If suspicious user X ever checked voice mail on the same carrier you have, you’re only two hops away.