[tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework
Tom Ritter
tom at ritter.vg
Thu Dec 19 00:06:18 UTC 2013
On 18 December 2013 17:38, spaceman <spaceman at antispaceman.com> wrote:
> From what I got they simply used timings:
> 1. They knew when the email arrived give or take (from headers).
> 2. They knew who connected to Tor at that particular time (from
> network logs).
> Even on college campus there might be a couple of Tor users. I would
> have used SSH to get to a 'unmonitored network', Tor and then mixmaster.
Which is exactly how we got a couple mixmaster nodes raided last year
by the FBI. (University of Philadelphia bomb threats) =(
-tom
More information about the tor-talk
mailing list