Silk Road forums
Discussion => Security => Topic started by: DoctaFeelgood on October 09, 2012, 12:22 am
-
I was reading up on the workings of Tor and I really was not aware of the vulnerability from the exit nodes spying on the tor internet traffic. :o
One solution I kept seeing was what they called "end-to-end encryption" which I think refers to "https" sites or something like that...
I have two big questions:
1.) Can somebody explain to me how end-to-end encryption works and how I can take advantage of it for all my tor internet surfing?
2.) Does traffic going to .onion sites come out of an exit node? Basically is it possible for somebody spying on exit node traffic to see my SR username and password?
If anybody can help me I'd really really REALLY appreciate it. I am starting to lose sleep worrying about the potential vulnerability here.
-
<removed>
-
also check out inspector for questionable nodes, and add them to your exclude list.
the url is something like (freedomhosting'surl).onion/users/inspector or something similar. I don't have my link book with me ATM but it is on the hidden wiki, and probably posted on this forum somewhere.
-
also check out inspector for questionable nodes, and add them to your exclude list.
the url is something like (freedomhosting'surl).onion/users/inspector or something similar. I don't have my link book with me ATM but it is on the hidden wiki, and probably posted on this forum somewhere.
Thanks for the tip! That is a very useful piece of information I would have NEVER known about! I wish I could give karma to both of you for your help but I guess I don't have enough posts yet... :-\
-
found the link
xqz3u5drneuzhaeo.onion/users/badtornodes/