You are reading a single comment by @Dammit and its replies. Click here to read the full conversation.
  • The exit node thing is not really important anyway, as major traffic flows can be re-routed without your knowledge or permission anyway, by changing the information in the routing tables.

    This is something that companies/organisation can elect to do (for example if suffering from a large DDOS attack, and wishing to pass all traffic through a sanitising service), but would also be just dandy for the purpose of scanning everything that people were doing.

    Once recorded, traffic analysis will reveal which packets to brute force.

About

Avatar for Dammit @Dammit started