-
March 14th, 2005, 04:23 AM
#1
Tor, Sockscap and being a naughty boy.
if someone uses Tor[0] and Sockscap[1] to have almost complete anonymity while port scanning or trying exploits on a remote box? If a hack attempt is traced back to one of the end point nodes what legal ramifications would the operator face? There is a bit of information in the FAQs[2] but I would like your opinions. Is there a way I could trace down an attacker using the Tor network?
[0] http://tor.eff.org/
[1] http://www.socks.permeo.com/Download...load/index.asp
[2] http://tor.eff.org/faq.html
Yes, I stole Sec_Ware’s way of linking because it made a lot of sense.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|