I would put the risk about the same. In certain respects it seems more devious to use a compromised node than it does to create your own to do bad stuff.
On 07/22/2014 01:38 AM, Andreas Krey wrote: > On Mon, 21 Jul 2014 17:28:42 +0000, Josh wrote: > ... >> There are exploits that do not require any interaction from the user. >> The sentiment that the rest of the list is trying to impress on you is >> that by running a Tor nod on XP you are potential putting the entire Tor >> network at risk to a malicious actor. > How more so than the malicious actor simply running his own node(s)? > > Andreas > _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
