L4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 2 年前Man Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comexternal-linkmessage-square59fedilinkarrow-up1300arrow-down15file-textcross-posted to: [email protected][email protected][email protected]
arrow-up1295arrow-down1external-linkMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comL4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 2 年前message-square59fedilinkfile-textcross-posted to: [email protected][email protected][email protected]
minus-squaresloppy_diffuserlinkfedilinkEnglisharrow-up8·2 年前Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
minus-squareTechnoBabble@lemm.eelinkfedilinkEnglisharrow-up3·2 年前And guess who’s got a lot of funding to run honey pot nodes?
Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
And guess who’s got a lot of funding to run honey pot nodes?