Il 13/02/2008 20:55, Marco Bonetti ha scritto:
that's the whole point of encrypting the communications and sharing the public keys fingerprints inside tor sources. a man in the middle can reroute traffic through his nodes but it will be useless (except for sending your connections to /dev/null) as it can't fake the private keys of each node.
Exactly that. An attacker can set up rogue nodes, but this is part of the threat model.
Jan