Hello,
Here is a method I've conceptualized to trace connections over the
Internet. I have another method which I will provide to Tails-Dev, and TOR
development list which is a way to ensure these types of attacks are never
possible. It relates to the way TOR connections take place...
Anyways,
Enjoy..
Some other vulnerabilities I've released recently:
https://mega.nz/#F!QnZRXKyS!oluyILlMPpyJjPS57w7axQ
E-Mail me directly if you have any questions or comments...
Thanks,
Mike Guidry