How might they monitor the encrypted Tor traffic? I am running a Tor Exit node, and the services have been shut off without warning, or substantial proof that I am infringing copyright.
I assert that running a Tor Exit node does not imply copyright infringement. This is simply because I am unable to break the encryption and choose which packets to allow through, and which packets to drop.
Further, I am offering complete file listings, network traffic logs, et al., but apparently they go by the mantra ‘guilty until proven innocent.’ I am offering proof of the innocence, regardless, but it appears that no amount of proof can satisfy the litigation hungry copyright companys (IP Echelon in particular).