Viewing a single comment thread. View all comments

1

TheNewKing wrote

Anyone can run relays that's why it's difficult and expensive for a single entity to have enough consensus on the Tor network to conduct such attack.

This is a bit misleading. Anyone being able to run a relay is indeed a good thing, but it also enables bad actors to easily setup malicious nodes. The consensus you speak of is, as far as I can find, based on bandwidth. So setting up a high bandwidth node will make it easy to have enough consensus on the network. For agencies with big budgets it would be trivial to set up multiple nodes with high bandwidth. And because stable high bandwidth nodes are preferred, they see a lot of the traffic.

Good tip on running your own relay though, that would make it significantly difficult since you'd never rotate out your guard relay.

No they don't because of Tor's 3-hops (and in the case of normal onion services: 6-hops) design.

The page makes the argument that VPNs can mess with your traffic, which is definitely true for exit nodes. It is well documented that bad exit nodes have been caught and blocked by the network.

2

49492093097198310931 wrote

This is a bit misleading. Anyone being able to run a relay is indeed a good thing, but it also enables bad actors to easily setup malicious nodes.

There's simply no better alternatives.

The page makes the argument that VPNs can mess with your traffic, which is definitely true for exit nodes. It is well documented that bad exit nodes have been caught and blocked by the network.

Again here there's no alternative, with all networks you must pass through some "exit" and at that point, if there's no SSL, then you're not secure.