26 Mar
2014
26 Mar
'14
1:49 a.m.
correct, an IP alone insufficient to impersonate a Tor node. you would also need key material. (active use of stolen keys to facilitate secondary attacks would be interesting to inventory from leaks...)