• @jarfil@beehaw.org
    link
    fedilink
    2
    edit-2
    1 year ago

    An exit node can put in place any filters, blacklists, mitm, exploit injection, logging, and anything else it wants… on unencrypted traffic. Using HTTPS through an exit node, limits all of that to the destination of the traffic, there is no way to get a ZK proof of all the kinds of possible traffic and contents that can exist.

    • J Lou
      link
      fedilink
      2
      edit-2
      1 year ago

      What I meant was blacklisting certain destinations. It obviously wouldn’t prevent all malicious traffic