On 18 December 2013 17:38, spaceman <space...@antispaceman.com> wrote:
> From what I got they simply used timings:
> 1. They knew when the email arrived give or take (from headers).
> 2. They knew who connected to Tor at that particular time (from
> network logs).
> Even on college campus there might be a couple of Tor users. I would
> have used SSH to get to a 'unmonitored network', Tor and then mixmaster.


Which is exactly how we got a couple mixmaster nodes raided last year
by the FBI. (University of Philadelphia bomb threats)  =(

-tom
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to