On Mon, 21 Jul 2014 17:28:42 +0000, Josh wrote: ... > There are exploits that do not require any interaction from the user. > The sentiment that the rest of the list is trying to impress on you is > that by running a Tor nod on XP you are potential putting the entire Tor > network at risk to a malicious actor.
How more so than the malicious actor simply running his own node(s)? Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds <torvalds@*.org> Date: Fri, 22 Jan 2010 07:29:21 -0800 _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
