One simple and stupid question. Tor encrypt traffic, how? The ISP can say that any machine of the network is a spy machine proxy.
Where is Tor server?, clients ask.. and spy machine reply: here. Uses tor any out of network based system (PKI for example), to see that spy machine really is not the destination Tor server? What about software package integrity? -- -- Publicidad http://www.pas-world.com

