other answers too: Tor devs trust some nodes more than others, route more traffic through them as final nodes.
-
-
they wouldn't even have to try. Russian, Chinese, US Insider, 400lb hacker uses Tor for attack. JAR harvests IPs.
-
but maybe sometimes instead of Tor, they use VPN, SSH tunnel to unwitting host, real IP, etc
End of conversation
New conversation -
-
-
some tor exit nodes can handle higher bandwidth and load than others
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.