seasonone@opidea.xyz to Technology@lemmy.ml · 1 year agoTor’s shadowy reputation will only end if we all use it | Engadgetwww.engadget.comexternal-linkmessage-square66fedilinkarrow-up1268arrow-down110cross-posted to: privacyguides@lemmy.onetechnology@beehaw.orgtechnology@lemmy.worldtechnews@radiation.party
arrow-up1258arrow-down1external-linkTor’s shadowy reputation will only end if we all use it | Engadgetwww.engadget.comseasonone@opidea.xyz to Technology@lemmy.ml · 1 year agomessage-square66fedilinkcross-posted to: privacyguides@lemmy.onetechnology@beehaw.orgtechnology@lemmy.worldtechnews@radiation.party
minus-squareitchy_lizard@feddit.itlinkfedilinkarrow-up2·1 year agoI don’t think a single credible source has shown this to be a vulnerability. You’re talking about an attack that would cost, what, millions of dollars to run per day?
minus-squareshapesandstuff@feddit.delinkfedilinkarrow-up2·1 year agoDunno if it’s all that expensive when there are hundreds of nodes on several individual malicious networks confirmed https://nusenu.medium.com/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac
minus-squareitchy_lizard@feddit.itlinkfedilinkarrow-up2·1 year agoYou’d need much more than hundreds of nodes.
minus-squareshapesandstuff@feddit.delinkfedilinkarrow-up1·1 year agoThe graph tracks exit probability and the article speaks about the matter, especially what you’re referencing. Check it out.
I don’t think a single credible source has shown this to be a vulnerability. You’re talking about an attack that would cost, what, millions of dollars to run per day?
Dunno if it’s all that expensive when there are hundreds of nodes on several individual malicious networks confirmed https://nusenu.medium.com/how-malicious-tor-relays-are-exploiting-users-in-2020-part-i-1097575c0cac
You’d need much more than hundreds of nodes.
The graph tracks exit probability and the article speaks about the matter, especially what you’re referencing. Check it out.