On Thu, 24 Feb 2011, Olaf Selke wrote:
Am 24.02.2011 08:45, schrieb grarpamp:
There is NO way to detect passive monitoring unless you have access
to the monitor.
for each exit node I can set up a unique decoy email account one a
machine controlled my myself, access it over unencrypted pop or imap
sessions thru Tor and wait for a second login from a rogue exit operator
trying to steal my mails. That's no rocket science.
Ding!
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk