
25 Mar
2014
25 Mar
'14
8:49 p.m.
correct, an IP alone insufficient to impersonate a Tor node. you would also need key material. (active use of stolen keys to facilitate secondary attacks would be interesting to inventory from leaks...)