Tor

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all

After read the following article

http://chronicle.com/temp/email2.php?id=zht45qPrsddjvvgfcjwWPjxhFwqxyfVX

It lead to ask / wonder about and I wanted to ask.

Firstly I would like to know, how would it have have possible for them to track that Tor was been used, and more importantly, how on earth did they know it was the the gentleman in question.

Other question is, how do we stop Tor from been used. Although Im for all for securing your traffic / activity etc, but for a corporate network, that unfortunately does not work, esp with some of the activities that the end user gets up too,

Just something I was thinking.

Kind Regards
Brent Clark


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux