
10 Nov
2015
10 Nov
'15
12:28 a.m.
Hi Tim, everyone. On 11/06/2015 08:41 PM, Tim Wilson-Brown - teor wrote:
The directory authorities are generally more concerned when they *don't* stop it afterwards, and instead keep running it, perhaps with extra logging, packet dumps, and decryption via seized private keys.
Is there a reliable way for an operator to detect this? hope you are well t