here are the resources that were delivered via secret relay to the mission deployment center: > Example: > > [1]metrics.torproject.org - checks if the IP address was used as a host to send traffic to Tor. > > [2]check.torproject.org ([3]https://check.torproject.org/cgi-bin/TorBulkExitList.py) [4]github.com/SpiderLabs > - will find a list of all Tor exit nodes in the last 16 hours that could contact the IP; > > [5]ipqualityscore.com/user/proxy-detection-api/lookup - Find out if a person is using a proxy, VPN or TOR. [6]metrics.torporject.org really says this? hum ok and then we have possible exit nodes. sounds like a large set. proxy-detection-api doesn't sound quite like my thing. OK, these aren't amazing resources. I think there are a couple papers out there with more ideas. We may end up reviewing the tor source code and protocols and running some experiments. A _really_ helpful behavior when deanonymising tor users is running a tor node yourself. Generally if you run an exit node you can mitm them directly to do this. References 1. http://metrics.torproject.org/ 2. http://check.torproject.org/ 3. https://check.torproject.org/cgi-bin/TorBulkExitList.py 4. http://github.com/SpiderLabs 5. http://ipqualityscore.com/user/proxy-detection-api/lookup 6. http://metrics.torporject.org/