Technically, the most effective way of avoiding TOR Exit nodes snooping in
on you is not using TOR in the first place. This is a genuine answer, I'm
not being sarcastic.
But you open yourself up to communications sniffing, wiretaps, mass
surveillance and other NSA operations vs the option of 2% of
I never said properly and ethically certified, did I.
On Jul 1, 2013 8:25 PM, "adrelanos" wrote:
> What happens if JonDo certified mixes do things forbidden by certification?
>
> Jimmy Chen:
> > If you want your exit nodes to be certified, it's probably best at thi
There are malicious TOR Nodes, and you can't stop that from happening. But
it is up to the service providers to enable encryption on their servers,
removing the possibility that such data can be intercepted. You shouldn't
trust your information to be sent through a plaintext protocol to begin
with,
This poses a really interesting question.
Another solution would be to use already existing remailers, and doubling
the encryption together with the TO: email in the inline plaintext. The
question is how to properly do a dual encryption.
My proposed solution is the following:
Plaintext message (