L4sBotMB to Technology@lemmy.worldEnglish • 11 months agoMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comexternal-linkmessage-square47fedilinkarrow-up1325arrow-down17file-textcross-posted to: slackernews@lemmy.worldtechnology@beehaw.orgtechnology@lemmit.onlinetechnology@chat.maiion.comhackernews@lemmy.smeargle.fanstechnews@radiation.partyhackernews@derp.foo
arrow-up1318arrow-down1external-linkMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comL4sBotMB to Technology@lemmy.worldEnglish • 11 months agomessage-square47fedilinkfile-textcross-posted to: slackernews@lemmy.worldtechnology@beehaw.orgtechnology@lemmit.onlinetechnology@chat.maiion.comhackernews@lemmy.smeargle.fanstechnews@radiation.partyhackernews@derp.foo
minus-square@sloppy_diffuser@sh.itjust.workslinkfedilinkEnglish8•11 months agoNot completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
minus-square@TechnoBabble@lemm.eelinkfedilinkEnglish3•11 months agoAnd guess who’s got a lot of funding to run honey pot nodes?
Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
And guess who’s got a lot of funding to run honey pot nodes?