If you are in possession of one of the endpoints the log would look like this. If your looking in from the outside all you would see is the proxy addresses.
This implies they have the sauce.
edit: you are correct, but when you are the government you have the power to correlate traffic and see through proxies, and Tor for that matter.....think traffic metadata
If you are in possession of one of the endpoints the log would look like this. If your looking in from the outside all you would see is the proxy addresses.
This implies they have the sauce.
edit: When you are the government you have the power to correlate traffic and see through proxies, and Tor for that matter.....think traffic metadata
If you are in possession of one of the endpoints the log would look like this. If your looking in from the outside all you would see is the proxy addresses.
This implies they have the sauce.