@bot@billiam when you have a desktop.ini file in a folder in windows it can set an icon from a remote website and therefore make contact with it, logging your ip. clever
Basically this. Also even if something is open source and doesn't *look* shady, that doesn't mean there's not an intentional backdoor or vulnerability obscured somewhere in the code. Just prevents and obvious one from existing.
The inner workings aren’t hidden away and there’s a whole bunch of info including a white paper on the tor protocol. I’ve yet to hear of a high profile case which wasn’t solved due to bad opsec.
@MMS21@KitlerIs6 >Is it even possible to patch? Seems a reoccurring thing in many places too e.g. 51% attack in crypto, voting systems and p2p It's impossible to patch, but Tor has been designed to mitigate such attacks as much as possible.
When it comes to consensus, as sadly no reliable distributed consensus mechanism exists, so Tor uses a select few dedicated servers for consensus handled by trusted parties (you can also run your own consensus servers if you're unhappy with the default).
BadExits and attacking relays are constantly search for and removed from the network as well.
The NSA have admitted among themselves that "Tor stinks", as they can't spy on every user, all the time, even with all the traffic interception and MiTM capabilities they have.
I'd like to note that my Tor relay running 100% free software certainly isn't compromised by proprietary software.