Hi all, a short question regarding potential state-rogue exit nodes: Does tor browser pin the certificates (even/at least in-session) so one could detect when the certificate offered changes to to a bad exit which does MITM? (Obviously restricted to state actors.)
Besides, what/how many big exits aren't operated by known entities? Tails obviously can't store across sessions, and doing do in tor browser would leave traces of accessed sites on disk. Hmm. Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds <torvalds@*.org> Date: Fri, 22 Jan 2010 07:29:21 -0800 -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
