What if there are quite many enough compromised tor nodes ,that are made up
by attackers ?
One node can record the source and destination of an access , tow nodes can
combine tow points into a line , and when there are quite many nodes that
are made up by on attacker , he can then draw a full map
Hey,
with more and more relays driven by volunteers, we can reduce this risk.
And this is an reason why server operators are using "myfamily" field in
the relay configuration, to not use other relays driven by them...
Be careful about exists relays, the server operator can sniff the
traffic, and
> You can check it on the little onion button... Try to visit the same
> website on a new tab, another circuit will be used.
Huuu I don't want to say another circuit will be built when you open a
new tab... don't want to confuse!!!
(another circuit will be built some minutes after the 1st try... ;
tor network ?
>>
>> I got this question after read the page describing the principle of tor :
>> https://www.torproject.org/about/overview.html.en
>>
>>
>> Thanks.
>
> --
> Petrusko
> C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
>
> -