Embed Notice
HTML Code
Corresponding Notice
- Embed this notice@ShtPoastAnon >it's people doing cover for obviously bad actors
I use tor by default to do whatever and I must be a bad actor.
Competent bad actors don't use tor - they use their own better networks of compromised IoStings devices and windows computers, which don't have haram IPs.
A small percentage of tor's userspace is incompetent bad actors that are easily detected.
>Just don't use the internet because tor isn't even fast.
It's faster than dial-up, so it's perfectly usable.
>the exit nodes are well monitored so unless you run your own, the privacy argument is already out the window.
Due to tor's design, the exit node does not know who sent the packet and if you use TLS, the exit node doesn't know what's in the packet.
The glowers may run a few exit nodes (malicious nodes that carry out attacks are detected and removed from the network) and some nodes may have their connection monitored, but really that is true of any connection that is routed via the USA.
If you were to run your own exit and exclusively use that without a serious amount of other people using it, you would have no privacy, as it would be obvious as to who the connections were coming from.
tor also supports .onion services, which do not use exit nodes.
I smell lack of knowledge on your part really.