Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

TOR is not that safe. If the exit node is compromised you’re f*cked for good.

As for Google the thing is that they’re also an advertising network so basically they track you all around the web.



If the exit node is compromised you’re fcked for good.*

It's not that simple, otherwise there wouldn't be any value in using an Onion architecture. Assuming you're using HTTPS, which every decent search engine supports, they either also need to create a fake but acceptable certificate for the domain, or to also control entry nodes and match the entering requests with the exit ones.

The NSA might be able to do it, but it's not just a matter of controlling an exit node.


"TOR is not that safe. If the exit node is compromised you’re f*cked for good."

Not if you are using TLS, which you should be using regardless of Tor.


What threat are you referring to here? Takeovers through the browser via HTML injected by the exit node?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: