[tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

Tom Ritter tom at ritter.vg
Thu Dec 19 00:06:18 UTC 2013


On 18 December 2013 17:38, spaceman <spaceman at antispaceman.com> wrote:
> From what I got they simply used timings:
> 1. They knew when the email arrived give or take (from headers).
> 2. They knew who connected to Tor at that particular time (from
> network logs).
> Even on college campus there might be a couple of Tor users. I would
> have used SSH to get to a 'unmonitored network', Tor and then mixmaster.


Which is exactly how we got a couple mixmaster nodes raided last year
by the FBI. (University of Philadelphia bomb threats)  =(

-tom


More information about the tor-talk mailing list