Comments

You must log in or register to comment.

MHC wrote

I was reading about Tor-user problems. So I read that users overestimate what Tor can do. Perhaps someone can explain what the Evil Enemy can do by hosting an exit node and viewing what goes through it?

1