Hi all
After read the following article
http://chronicle.com/temp/email2.php?id=zht45qPrsddjvvgfcjwWPjxhFwqxyfVX
It lead to ask / wonder about and I wanted to ask.
Firstly I would like to know, how would it have have possible for them to track that Tor was been used, and more
importantly, how on earth did they know it was the the gentleman in question.
Other question is, how do we stop Tor from been used. Although Im for all for securing your traffic / activity etc, but
for a corporate network, that unfortunately does not work, esp with some of the activities that the end user gets up too,
Just something I was thinking.
Kind Regards
Brent Clark