Quote from: chronicpain on August 04, 2011, 04:22 pmIt easily could have been tor. Remember, they were all uploading and downloading pictures and videos (sickos) and I know that even thru tor, it will somehow unmask you when you do that. So, if tor was used, im sure that hey not only had moles, but were able to find them because of the uploaded/downloaded items...Try and download something with tor, it gives you a big message saying that you could be unmasked by doing so. Thats why I never upload or download programs via tor.Do you perhaps know how the unmasking works during data transfer?At least traffic analysis should be easier if someone is sending a high amount of traffic for a longer period of time but i doubt that this is the key.