The Tor network allows to get stronger anonymity, but does not ensure data security. Data is encrypted between the relay nodes, but exits in clear text at the exit node, where it can be sniffed.
Dan Egerstad was able to collect a lot of e-mail information:
- Dan Egerstad's blog entry (in Google cache)
- Security researcher stumbles across embassy e-mail log-ins
- Security expert used Tor to collect government e-mail passwords
Setting up a Tor relay:
Comments are closed for this story.
Trackbacks are closed for this story.