On Wed, 19 Mar 2014 23:55:53 -0400 Iggy <iggy19@xxxxxxxxxx> allegedly wrote: > I am assuming there is no way to tell this now, after the fact? > > -iggy > > On 03/19/2014 11:08 PM, Zack Weinberg wrote: > > Really useful to know at this point would be the complete suspicious > > certificate (which would e.g. tell us who signed it) and the exit > > node in use. > > > > On Wed, Mar 19, 2014 at 11:00 PM, Iggy <iggy19@xxxxxxxxxx> wrote: > >> Hey all, > >> > >> I use an email account from riseup.net, which I usually access via > >> Thunderbird, running on a linux machine. According to torstatus.blutmagie.de, cab.cabinethardwareparts.com is on 192.254.168.26. (See https://torstatus.blutmagie.de/router_detail.php?FP=0cc9b8aa649881c39e948e70b662772d8695c2e9 It has fast, exit, guard and stable flags set. The node is apparently unnamed, but there is a whois record. See https://torstatus.blutmagie.de/cgi-bin/whois.pl?ip=192.254.168.26 Mick --------------------------------------------------------------------- Mick Morgan gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312 http://baldric.net ---------------------------------------------------------------------
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays