Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Exit nodes are already unnecessary; TOR allows you to operate services on the network itself ("hidden services").

However, it seems not everything is kept on the TOR network. I would've assumed that if someone were using TOR for criminal purposes, they wouldn't expose themselves to monitoring by accessing resources off TOR, but that doesn't seem to be the case.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: