Ohh well, if only TOR exit nodes were not able to be used to spy on users, if government agencies would refrain to host exit nodes (and other nodes), and if exit noes wouldn’t allow for some exit nodes monopolizing (at times single user had been found controlling good amount of exit nodes), neither hijacking.
I’m really glad people investigates on how to protect privacy better, and TOR has contributed to that. But although the efforts to sanitize the TOR network, as a user, one really doesn’t know if one is getting the opposite effect. Agencies with resources are also able to deanonimize TOR users… So it’s really hard now a days, as a user, to go trust any internet mechanism intended to protect one’s privacy. VPNs are no better, perhaps even worse, since now it’s about trusting a centralized service which has it easier to spy on users.
Privacy on the net is near impossible now a days, :(
Exit nodes alone cannot deanonymize Tor traffic. Tor is specifically designed so that unlike e.g. VPNs it does not have a single point of failure. If a node in your circuit is malicious, no matter which, you are still anonymous.
Ohh well, if only TOR exit nodes were not able to be used to spy on users, if government agencies would refrain to host exit nodes (and other nodes), and if exit noes wouldn’t allow for some exit nodes monopolizing (at times single user had been found controlling good amount of exit nodes), neither hijacking.
I’m really glad people investigates on how to protect privacy better, and TOR has contributed to that. But although the efforts to sanitize the TOR network, as a user, one really doesn’t know if one is getting the opposite effect. Agencies with resources are also able to deanonimize TOR users… So it’s really hard now a days, as a user, to go trust any internet mechanism intended to protect one’s privacy. VPNs are no better, perhaps even worse, since now it’s about trusting a centralized service which has it easier to spy on users.
Privacy on the net is near impossible now a days, :(
Exit nodes alone cannot deanonymize Tor traffic. Tor is specifically designed so that unlike e.g. VPNs it does not have a single point of failure. If a node in your circuit is malicious, no matter which, you are still anonymous.