False "everyone" there to start. On point: malicious servers like adtech and rogue nodes, both, are standard part of net
-
-
-
You take on more risk, not less, by reducing the barrier to entry for others to eavesdrop your traffic by routing it all through volunteers
- 3 more replies
New conversation -
-
-
@DonAndrewBailey@njkobie@TeenVogue@SarahJamieLewis@JoeBeOne they said use tls which should protect you from exit nodes -
It only requires a single auth attempt / single unencrypted packet to fall victim. IMHO "Use TLS" is useless advice in this circumstance.
- 5 more replies
New conversation -
-
-
Chances are: 1) you don't need Tor 2) you don't understand the risks of using it 3) you're better off with a VPN, like
@AlgoVPN -
Best analogy of Tor I've heard is that it's like the one ring. When you put it on, you become invisible to everyone but the most dangerous.
End of conversation
New conversation -
-
-
More exit nodes does not help mitigate the architectural flaws of Tor and Tor Browser at all. It's a broken system.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I'm bringing almost the whole team! Hit me up. Josh and I will definitely be around.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
There are no bad exit nodes, just alternative exit nodes!
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Yes. Normal people already don't trust their ISP to treat them fairly, and a hostile exit is a vaguely similar risk. "Slow" they understand.
-
"vaguely similar"? As in ISPs will also actively capture unencrypted credentials and sessions for sale/exploitation? ;-)
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.