On Thu, 24 Feb 2011, Olaf Selke wrote:
Am 24.02.2011 08:45, schrieb grarpamp:There is NO way to detect passive monitoring unless you have access to the monitor.for each exit node I can set up a unique decoy email account one a machine controlled my myself, access it over unencrypted pop or imap sessions thru Tor and wait for a second login from a rogue exit operator trying to steal my mails. That's no rocket science.
Ding! _______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk