L4sBot@lemmy.worldB to Technology@lemmy.worldEnglish · 2 years agoMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comexternal-linkmessage-square50fedilinkarrow-up1282arrow-down15file-textcross-posted to: slackernews@lemmy.worldtechnology@beehaw.orghackernews@derp.foo
arrow-up1277arrow-down1external-linkMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comL4sBot@lemmy.worldB to Technology@lemmy.worldEnglish · 2 years agomessage-square50fedilinkfile-textcross-posted to: slackernews@lemmy.worldtechnology@beehaw.orghackernews@derp.foo
minus-squaresloppy_diffuser@sh.itjust.workslinkfedilinkEnglisharrow-up8·2 years agoNot completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
minus-squareTechnoBabble@lemm.eelinkfedilinkEnglisharrow-up3·2 years agoAnd guess who’s got a lot of funding to run honey pot nodes?
Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
And guess who’s got a lot of funding to run honey pot nodes?