Using Tor to route your traffic through to avoid tracking was previously thought to be an excellent way of passing traffic anonymously, no longer.
http://www.theage.com.au/news/security/the-hack-of-the-year/2007/11/12/1194766589522.html?page=fullpage#contentSwap1In August, Swedish hacker Dan Egerstad gained access to sensitive embassy, NGO and corporate email accounts.
The 22-year-old Swedish security consultant had merely installed free, open-source software - called Tor - on five computers in data centres around the globe and monitored it. Ironically, Tor is designed to prevent intelligence agencies, corporations and computer hackers from determining the virtual - and physical - location of the people who use it.
The discovery that sensitive, government emails were passing through Tor exit nodes as unencrypted, readable data was only mildly surprising to Egerstad. It made sense - because Tor documentation mentions "encryption", many users assume they're safe from all snooping, he says.
"People think they're protected just because they use Tor. Not only do they think it's encrypted, but they also think 'no one can find me'," Egerstad says. "But if you've configured your computer wrong, which probably more than 50 per cent of the people using Tor have, you can still find the person (on) the other side."
It seems once again "we learn something new everyday"