[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Blog: How Malicious Tor Relays are Exploiting Users in 2020 (Part I)



WTF?

Yes, this is nothing new and your ISP could do the same thing if it would be in stealing your money and doing crimes. Besides the fact that ISP are not run by organised crime as far as I know: This is Tor. I didn't know that our new Mission Statement is: Tough shit happens and lets watch how malicious relays rob users… 

This shit has to stop. Why are the relays in question still online?


On 13. Aug 2020, at 11:19, Michael Gerstacker <michael.gerstacker@xxxxxxxxxxxxxx> wrote:

https://medium.com/@nusenu/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac


So in other words when the destination website does not really care about their users safety and the user sends unencrypted exit traffic through Tor then an exit relay operator could do the same like your internet provider (spying/changing your traffic).
Properly setting MyFamily does not help in this case.

That's nothing new.

The only news is that it is getting exploited big scale now.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays