Quote from: Spedly on March 02, 2012, 04:10 amPine, my understanding is that a malicious Tor exit node can decode the traffic sent between the server and the client. However, because there are so many hops between the client and the server, it's extremely difficult to trace it back to the original IP. It's possible, but it's very sophisticated. VPN and public Wi-Fi hot spots are compensating controls.Must do moar research to get a firmer handle on this stuff. I keep looking for a nice reference book on TOR, but none seem to exist -.-Also; computer illiterate lawyers FTW!