In an interview with Computer Sweden, Dan Egerstad explains that he indeed used Tor exit nodes, five of them. Then he sat back and collected both logon credentials and email contents of all the confused souls who thought that Tor protected them.
Not really apologetic
In an interview with Computer Sweden, Dan Egerstad explains that he indeed used Tor exit nodes, five of them. Then he sat back and collected both logon credentials and email contents of all the confused souls who thought that Tor protected them.