Am 24.02.2011 08:45, schrieb grarpamp: > There is NO way to detect passive monitoring unless you have access > to the monitor.
for each exit node I can set up a unique decoy email account one a machine controlled my myself, access it over unencrypted pop or imap sessions thru Tor and wait for a second login from a rogue exit operator trying to steal my mails. That's no rocket science. regards Olaf _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
