Surveillance of unencrypted traffic is possible no matter where you send it, but it's *practical* on Tor.
-
-
- 5 more replies
New conversation -
-
-
That's not what she means. She means that you trust Tor exit nodes or the VPN provider - no fundamental difference. The ISP doesn't matter.
-
But I also disagree with her. Tor exit nodes see your traffic but don't know who you are. VPN providers know it, besides seeing the traffic.
-
@thegrugq So we should combine it as a bundled product, right? That they know who I am AND see my traffic. -
Use Signal. Use EVERYTHING.
-
Abuse Signal, abuse TOR
End of conversation
New conversation -
-
-
Dan, what country do you run your Tor exit node out of?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Running malicious TOR exit undetected at scale does require quite more resourcing. Yes, less than backbone intercept but nonzero effort
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.