On 9/13/07, Suresh Ramasubramanian wrote: > Anish Mohammed wrote: > > > hop from your to be malicious. As routing schemes seem to be random, I > > would have assumed, the system could tolerate a level of malicious nature. > > And it would be an entirely wrong assumption, especially given the > comparatively limited number of TOR nodes. Even more so if there is some > logic built into TOR traffic to choose the nearest node, network wise, to > propagate traffic. >
not just that, a malicious really doesnt need to decrypt or read the information... in some countries (and there are many of these around) merely using TOR would probably put you behind bars... or send the state polic banging down your door. there are plenty of states (and not the wealthy ones) investing in hi tech electronic traffic monitoring equipment and software. have seen quite a few govt. tenders from various african states requesting quotations for all sorts of telephony and electronic monitoring equipment. i am sure the chinese and the american military have a strong presence on TOR... (one or the other of whom in most cases are working complicitly with some form of despotic regime..)
