L4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 1 year agoMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comexternal-linkmessage-square58fedilinkarrow-up1326arrow-down17file-textcross-posted to: slackernews@lemmy.worldtechnology@beehaw.orghackernews@lemmy.smeargle.fanstechnews@radiation.party
arrow-up1319arrow-down1external-linkMan Found Guilty of Child Porn, Because He Ran a Tor Exit Nodelowendbox.comL4sBot@lemmy.worldMB to Technology@lemmy.worldEnglish · 1 year agomessage-square58fedilinkfile-textcross-posted to: slackernews@lemmy.worldtechnology@beehaw.orghackernews@lemmy.smeargle.fanstechnews@radiation.party
minus-squaresloppy_diffuser@sh.itjust.workslinkfedilinkEnglisharrow-up8·1 year agoNot completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
minus-squareTechnoBabble@lemm.eelinkfedilinkEnglisharrow-up3·1 year agoAnd guess who’s got a lot of funding to run honey pot nodes?
Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.
And guess who’s got a lot of funding to run honey pot nodes?