To Tor or not to Tor?

coderman coderman at gmail.com
Tue Mar 25 18:49:10 PDT 2014


correct, an IP alone insufficient to impersonate a Tor node.  you
would also need key material.

(active use of stolen keys to facilitate secondary attacks would be
interesting to inventory from leaks...)



More information about the cypherpunks mailing list