Well, the nodes that are used in TOR, are from volunteers, as in people you don't know, who can take a look at your data. Because when the data leaves the TOR network, it is not encrypted. Also there has been a number of vulnerabilities presented in the network.
Well, the nodes that are used in TOR, are from volunteers, as in people you don't know, who can take a look at your data. Because when the data leaves the TOR network, it is not encrypted. Also there has been a number of vulnerabilities presented in the network.
Well... thanks Cats, I appriciate your honest answer. I did not know TOR was that vunerable. So how do other TOR users look at your traffic, with a sniffer perhaps wireshark or etherreal?
itzm3 wrote:Well... thanks Cats, I appriciate your honest answer. I did not know TOR was that vunerable. So how do other TOR users look at your traffic, with a sniffer perhaps wireshark or etherreal?
Don't know, but I guess it would be something along those lines