Can you please elaborate on the 5th point? I would think that anything you send over tor is transfered in clear between the exit node and the destination. Which means that not only one needs to protect againts a malicious tor exit node but also, as one would in any other setting, you need to protect against any potential eavesdropping happening between the exit tor node and the final destination. This is usually done via using HTTPS, SSH or any secure protocol.
seed954 karma
Can you please elaborate on the 5th point? I would think that anything you send over tor is transfered in clear between the exit node and the destination. Which means that not only one needs to protect againts a malicious tor exit node but also, as one would in any other setting, you need to protect against any potential eavesdropping happening between the exit tor node and the final destination. This is usually done via using HTTPS, SSH or any secure protocol.
Am I missing something?
View HistoryShare Link