I was reading up on the workings of Tor and I really was not aware of the vulnerability from the exit nodes spying on the tor internet traffic. :oOne solution I kept seeing was what they called "end-to-end encryption" which I think refers to "https" sites or something like that...I have two big questions:1.) Can somebody explain to me how end-to-end encryption works and how I can take advantage of it for all my tor internet surfing?2.) Does traffic going to .onion sites come out of an exit node? Basically is it possible for somebody spying on exit node traffic to see my SR username and password?If anybody can help me I'd really really REALLY appreciate it. I am starting to lose sleep worrying about the potential vulnerability here.