What if there are quite many enough compromised tor nodes ,that are made up by attackers ?
One node can record the source and destination of an access , tow nodes can combine tow points into a line , and when there are quite many nodes that are made up by on attacker , he can then draw a full map of an access , and finally find out the real ip address where does the request originally issued out . Can this scenario possibly occur for the current tor network ? I got this question after read the page describing the principle of tor : https://www.torproject.org/about/overview.html.en Thanks. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk