(no title)
posterboy | 1 year ago
They don't have plausible evidence to subpoena the guard node if a middle node only sees encrypted traffic. They would also need to control the exit nodes which communicate with the target's host or they simply control the host as a honeypot.
immibis|1 year ago
posterboy|1 year ago
Ad hominem: your username spells out MIB, Men in Black, surely you are joking.