if someone uses Tor[0] and Sockscap[1] to have almost complete anonymity while port scanning or trying exploits on a remote box? If a hack attempt is traced back to one of the end point nodes what legal ramifications would the operator face? There is a bit of information in the FAQs[2] but I would like your opinions. Is there a way I could trace down an attacker using the Tor network?

[0] http://tor.eff.org/
[1] http://www.socks.permeo.com/Download...load/index.asp
[2] http://tor.eff.org/faq.html

Yes, I stole Sec_Ware’s way of linking because it made a lot of sense.