<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><div class=""><br class="">
</div>

<br class=""><div><blockquote type="cite" class=""><div class="">On 30. May 2017, at 01:30, aeris <<a href="mailto:aeris+tor@imirhil.fr" class="">aeris+tor@imirhil.fr</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><div class="">Dear Neldoreth relay’s operator,<br class=""><br class="">This day, we were informed of a Tor node seizure at FirstHeberg during the <br class="">13-14/05, related to Wanacry infection of the french company Renault.<br class=""><span class="Apple-tab-span" style="white-space:pre">     </span><a href="https://www.nextinpact.com/news/104398-wannacrypt-nud-tor-saisi-chez-firstheberg.htm" class="">https://www.nextinpact.com/news/104398-wannacrypt-nud-tor-saisi-chez-firstheberg.htm</a><br class=""></div></div></blockquote><br class=""></div><div>>For Jérémy Martin, the technical director of Firstheberg, the server itself should deliver few secrets. The captured traffic would be more useful, even if it would take other nodes to reach a possible control server.</div><div><br class=""></div><div>The traffic from the enduser should have 3 layers of AES256 encrypted traffic, am I right?</div><div><br class=""></div><div><div>niftybunny</div><div><a href="mailto:abuse@to-surf-and-protect.net" class="">abuse@to-surf-and-protect.net</a></div><div><br class=""></div><div class="">Where ignorance is bliss, 'Tis folly to be wise.</div><div class=""><br class=""></div><div class="">Thomas Gray </div></div></body></html>