At the request of the Greek authorities to the provider of the Internet and telephony, has declassified transcripts and given the history of calls from the fixed and mobile phones ,But the IP addresses used by the Idrizi. The officers discovered that the Idrizi planned to use the encrypted network Tor for anonymous surfing the Internet but had not prevented.The Network Tor uses intermediary nodes (relays) of the network and our emits from nodes output (exit nodes). In contrast with the proxy server, the exit node does not know either the IP address, nor did the our location
Μεταφράζονται, παρακαλώ περιμένετε..
