>Your traffic is visible to the exit node. The exit node has to transmit your traffic in plaintext if your destination doesn't support TLS. Same goes for your ISP, country, company firewall and so on. This vulnerability can't be fixed without proper end-to-end encryption.
>You are much safer with just the NSA spying on you than all the people you invite to spy when you utilize Tor indiscriminately. This is questionable as the NSA is known give lethal drone strike targets while your average cyber criminal only steals your facebook accounts for spam U.R.Being.Watched wrote: > http://www.deseret-tech.com/journal/psa-tor-exposes-all-traffic-by-design-do-not-use-it-for-normal-web-browsing/ > -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
