Quote:
Originally Posted by Prevet
They also offer Tor use with the VPN. You connect to them with Tor so not even they know who you are.
|
That *is* Interesting. Though up above you previously discredited Tor.
Quote:
Originally Posted by e1-531g
...If it is from the outside and many connecting people are using that I think it would be not enough to be seen as ultimate proof/evidence for doing something. Maybe a clue, but not as 100% incriminating evidence.
|
I think it depends on the degree of certainty any investigator may have, and I agree that it might be considered a corroboration, but that consideration may depend on jurisdiction.
Quote:
Without logs from the inside we don't know which output connection maps to which input connection.
|
In my example above, I chose an investigator with logs of both public and VPN traffic. Easy enough to obtain for any state actor.
Quote:
...this is not a case where police is going to put significant resource to track somebody.
|
And that is the hammer on the nail's head. What is the investigating party's cost/benefit analysis?