
Law enforcement seized Tor nodes and may have run some of its own
• ars technicaTor Project director Andrew Lewman went over the possible ways that over 400 hidden services on dozens of servers were located by law enforcement during Operation Onymous. While some of the servers were related to criminal activity (such as Silk Road 2.0), at least some of the servers were not—including several that were acting as infrastructure for Tor's anonymizing network. And the only answer Lewman could currently offer as to how the sites were exposed was "We don't know."...
1 Comments in Response to Law enforcement seized Tor nodes and may have run some of its own
They are sophisticated enough that they pass me with ease between my regular Firefox and the TOR Firefox. But they aren't sophisticated enough, or I'm not important enough, that they recognize when I jump between regular Firefox and TOR. I can see it in how my browsers act.