On 06/06/2015 02:20 PM, Charlie Belmer wrote: > I always took it to mean using malware infected hosts, rootkits, and C&C > servers to do the dirty work, which not only makes you hard to trace, but > can also point investigations at the infected host.
Or Hola Premium ;) > On Sat, Jun 6, 2015 at 4:16 PM, Max Bond <[email protected]> wrote: > >> Organized criminals will probably achieve better operational security by >> conducting themselves in the real world as much as possible. This is not an >> option available to a lone dissident in an oppressed country. >> >> On Sat, Jun 6, 2015 at 11:50 AM, <[email protected]> wrote: >> >>> Hello... >>> >>> I'm an avid tor lover and user. >>> >>> I'm trying to understand a statement I've heard a number of people on the >>> Tor team and in the Tor community repeat over the years and was wondering >>> if it could be explained. >>> >>> The statement: Paraphrasing, it's been said several times, by Roger, etc, >>> that... >>> >>> "Criminals have much better options available to them than Tor for strong >>> internet anonymity." >>> >>> I'm trying to understand what these options are and why don't we >>> non-criminal tech savvy people have some of these better options? >>> >>> Is this just talking about the option of using encrypted botnets, or are >>> there other additional options that criminals use? >>> >>> What are these criminal anonymity methods that are stronger than Tor? >>> >>> Thanks all! >>> >>> -- >>> tor-talk mailing list - [email protected] >>> To unsubscribe or change other settings go to >>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >>> >> -- >> tor-talk mailing list - [email protected] >> To unsubscribe or change other settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >> -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
