[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
On 08/21/2009 05:25 AM, Sadece Gercekler wrote:
> specific to gmail, google reader, yahoo mail, and blogger.com. These
> are the sites I'm mainly accessing.
focus on the possibility of an evil exit node, the reality is far more
mundane. If you're following safe anonymity and browsing practices, you
have a better chance of mitigating any attacks from the rare evil exit node.
Mike Perry's Snakes on a Tor tool has done hundreds, if not thousands,
of hours of exit node scanning. It finds very few evil exit nodes. And
in follow-up with these operators, most are a misconfiguration of some
device outside their tor node.
The Tor Project