If any of you guys are familiar with anonymous Internet systems, this is a really cool read. It basically outlines a possible attack against something like Tor by linking together paths of entry/exit to trace (identify) a user.
Tor was one of the items covered in a presentation on online identities that I did last week here on my campus.
Tor was one of the items covered in a presentation on online identities that I did last week here on my campus.