And what happens if the KGB or CIA sponsors and administers, using a straw man, a TOR exit node ? How can you be sure that this is not the case?
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
|