you should get your facts straight. David Kernell who "hacked" her account was a retard and so was Sarah ... only retarded moron would use password that can be guessed based on family / personal stuff, like date of birth, name of college, name of your teacher ... etc.
he didn't really hack anything, he got lucky with guessing. anyone can do that by digging around in internet about someone.
and he was not behind TOR + he was so dumb that he used his own email to post from .. DUH.
all NSA had to do, is put his email into google LOL.
THEN what they probably did, is contacted his ISP as him being suspect, then his ISP gave them logs and from there they saw where he connected to, proxy or not, requests were sent direct to that yahoo account.
they can put together time and ip and there's all the proof they need.
The hacker left behind traces of his activity. His IP address was logged at the proxy he used, CTunnel.com, and he also left his email address
[email protected] when he posted at 4chan. Furthermore, the attacker revealed the original web address used by the proxy[17] by leaving this information in the screenshot which according to experts can also help the investigation.[17] 4chan's /b/ board is not archived, and posts are only retained for a short time. However, with the great interest surrounding the posts of Rubico, many, including wired.com, archived the original posts. The email address left behind was then connected to David Kernell through various social networking profiles where it was used,[18] though no official investigation took place at this time.
from this i understand that he really is a retard.
not sure what they mean by leaving original web address used by proxy, i think they mean he used a web based proxy ...
you can't compare this to a real hack lol.
i can't say what i did or did not do, but apart from that, i have also "hacked" some government agents' emails. i got 2 yahoo emails from one, he had tons of government related shit there.
and few famous actors.
Lets put it that way, i'm quite sure that TOR is untraceable, but if i'd do it again, hack into NSA, FBI or something like that, i would not rely on TOR. i would go somewhere with netbook/laptop, crack myself a network and use that or just put antenna on window and take somebody's wireless, still better not to do it near where you live.
Only way you can get cought using TOR, is when they get lucky. lot of tor nodes are hosted by some ISPs or website companys, most likely they DO keep logs (ip connection logs, not traffic), so if you are very unlucky and they are lucky, then all 3 nodes might be ones that keep logs, then you would be fucked, but what are the chances of that?