Dan tells it all

In an interview with Computer Sweden, Dan Egerstad explains that he indeed used Tor exit nodes,  five of them. Then he sat back and collected both logon credentials and email contents of all the confused souls who thought that Tor protected them. 

Leave a Reply

Your email address will not be published. Required fields are marked *