krishna e bera wrote on 07/04/2016 04:28:
On 04/06/2016 04:29 AM, Marco Predicatori wrote:
krishna e bera wrote on 05/04/2016 23:27:
On 04/05/2016 02:38 PM, grarpamp wrote:
http://www.npr.org/sections/alltechconsidered/2016/04/04/472992023/when-a-da...
What was the exit node's fingerprint? Is there a blacklist we or the Directory Authorities can add it to?
Tor doesn't need that. Any police department can run as many nodes as it wishes.
It doesnt matter who they were, they could run a copy of his server as if they were him. (Besides, you never heard of police sting operations or corrupt police?)
Of course, but what would they make of it? They might have 200 perfectly legitimate Tor nodes already, making a blacklist absolutely useless.
Indeed all of his identity keys should be considered compromised, for example they might have got his secret PGP keyring as well.
That would be his problem, just like anybody who loses control of his hardware by theft or loss. It wouldn't have anything to do with Tor.
Bye, Marco