Talk:German police seize Tor anonymity servers

please contact me via email if you need more info. Shava Nerad, Tor executive director shava -at- freehaven -dot- net -- thanks!

Can someone familiar with Tor, in practice, whether the protocol provides for invalidating nodes known to be compromised? What mechanisms prevent the police from plugging the confiscated computers back into the Internet and enabling Tor's logs to compromise larger sets of the network? My understanding of onion routing is that if a significant threshold of conspiracy between nodes takes place, the anonymity of the entire network is compromised. zuzu 14:07, 12 September 2006 (UTC)
 * That's a good question for an interview, I've emailed Shava and asked if he would be interested, hopefully along with some of the admins of the siezed machines. --Brian McNeil / talk 14:40, 12 September 2006 (UTC)

add links
95/46/EC in Wikipedia

Why the protection anyway? --Sigmundur (talk) 14:32, 6 August 2008 (UTC)
 * this wiki is about news, ,not an encyclopedia. You write news with knowledge you have, a news very right one day could be very different the next day even wrong. the protection is to fix the news to a date for future use or analyse by some historian or cyclopedian for example. Jacques Divol (talk) 16:14, 6 August 2008 (UTC)

Incorrect Wired Article link
The old link to the Wired article doesn't work, but here is the URL of the same article correctly formatted: http://www.wired.com/threatlevel/2006/09/german_tor_netw