The exit node thing is not really important anyway, as major traffic flows can be re-routed without your knowledge or permission anyway, by changing the information in the routing tables.
This is something that companies/organisation can elect to do (for example if suffering from a large DDOS attack, and wishing to pass all traffic through a sanitising service), but would also be just dandy for the purpose of scanning everything that people were doing.
Once recorded, traffic analysis will reveal which packets to brute force.
The exit node thing is not really important anyway, as major traffic flows can be re-routed without your knowledge or permission anyway, by changing the information in the routing tables.
This is something that companies/organisation can elect to do (for example if suffering from a large DDOS attack, and wishing to pass all traffic through a sanitising service), but would also be just dandy for the purpose of scanning everything that people were doing.
Once recorded, traffic analysis will reveal which packets to brute force.