L4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 1 year agoMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comexternal-linkmessage-square58fedilinkarrow-up1323arrow-down17file-textcross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected][email protected]
arrow-up1316arrow-down1external-linkMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comL4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 1 year agomessage-square58fedilinkfile-textcross-posted to: [email protected][email protected][email protected][email protected][email protected][email protected][email protected]
minus-squaresloppy_diffuser@sh.itjust.workslinkfedilinkEnglisharrow-up8·1 year agoNot completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
minus-squareTechnoBabble@lemm.eelinkfedilinkEnglisharrow-up3·1 year agoAnd guess who’s got a lot of funding to run honey pot nodes?
Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
And guess who’s got a lot of funding to run honey pot nodes?