Remembering this guy who
published 100 valid email accounts of embassies and governments in his blog?
Using the google cache because his website is currently down and archive.org didn't store it.
It later turned out that he did this by
using crafted tor exit nodes to sniff the traffic (no news so far).
The funny thing is that now:
Egerstad believes that those organizations were, in fact, not using Tor at all and that the Tor traffic he saw moving through his exit nodes came from hackers who had infiltrated those organizations and were using Tor to cover their tracks.
"The whole point of the story that has been forgotten, and I haven't said much about it, (is that) many of these accounts had been compromised," he says. "The logins I caught were not legit users but actual hackers who'd been reading these accounts."
(smh.com)
The bad news about this story is that Egerstad has now been suspected for breaking into foreign computers by the Swedish law enforcement authorities.
Shame on them, he even contacted the embassies before and of course he didn't break into any computer.
[via
arstechnica.com]