[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

On 18 December 2013 17:38, spaceman <spaceman@xxxxxxxxxxxxxxxx> wrote:
> From what I got they simply used timings:
> 1. They knew when the email arrived give or take (from headers).
> 2. They knew who connected to Tor at that particular time (from
> network logs).
> Even on college campus there might be a couple of Tor users. I would
> have used SSH to get to a 'unmonitored network', Tor and then mixmaster.

Which is exactly how we got a couple mixmaster nodes raided last year
by the FBI. (University of Philadelphia bomb threats)  =(

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to