On 10 Nov 2015, at 11:28, Tim Sammut <tim@teamsammut.com> wrote:Hi Tim, everyone.
On 11/06/2015 08:41 PM, Tim Wilson-Brown - teor wrote:The directory authorities are generally more concerned when they
*don't* stop it afterwards, and instead keep running it, perhaps with
extra logging, packet dumps, and decryption via seized private keys.
Is there a reliable way for an operator to detect this?