I always took it to mean using malware infected hosts, rootkits, and C&C servers to do the dirty work, which not only makes you hard to trace, but can also point investigations at the infected host.
On Sat, Jun 6, 2015 at 4:16 PM, Max Bond <[email protected]> wrote: > Organized criminals will probably achieve better operational security by > conducting themselves in the real world as much as possible. This is not an > option available to a lone dissident in an oppressed country. > > On Sat, Jun 6, 2015 at 11:50 AM, <[email protected]> wrote: > > > Hello... > > > > I'm an avid tor lover and user. > > > > I'm trying to understand a statement I've heard a number of people on the > > Tor team and in the Tor community repeat over the years and was wondering > > if it could be explained. > > > > The statement: Paraphrasing, it's been said several times, by Roger, etc, > > that... > > > > "Criminals have much better options available to them than Tor for strong > > internet anonymity." > > > > I'm trying to understand what these options are and why don't we > > non-criminal tech savvy people have some of these better options? > > > > Is this just talking about the option of using encrypted botnets, or are > > there other additional options that criminals use? > > > > What are these criminal anonymity methods that are stronger than Tor? > > > > Thanks all! > > > > -- > > tor-talk mailing list - [email protected] > > To unsubscribe or change other settings go to > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > > -- > tor-talk mailing list - [email protected] > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
