<div dir="ltr">Hello,<div><br></div><div>Here is a document I've wrote regarding a concept to trace connections even through TOR.  If you have any questions feel free to respond, and I'll attempt to explain.  I have also considered a way to mitigate this situation being allowing TOR to be traced by using 'Transactional Requests.'  I'll proceed to write it up, and post soon.</div><div><br></div><div>I have released some other short papers as well.  <span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px">It contains several files regarding a few vulnerabilities, and a couple concepts regarding things like quantum resistant cryptography, etc..</span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px"><br></span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px">URL: <a href="https://mega.nz/#F!QnZRXKyS!oluyILlMPpyJjPS57w7axQ">https://mega.nz/#F!QnZRXKyS!oluyILlMPpyJjPS57w7axQ</a></span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px"><br></span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px">Feel free to e-mail me directly..</span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px"><br></span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px">Thanks,</span></div><div><span style="color:rgb(51,51,51);font-family:source_sans_proregular,arial;font-size:13px">Mike Guidry</span></div></div>