Are all exits real?
I’ve always wagered most of the nodes in the Tor network are previously dormant IPv4 addresses that valued telecom partners secretly funnel to a server cluster in Ft. Meade. The overall network bandwidth could be handled by most TLAs with ease.
Neat write up though :)
If this were true, why would the US Government burn Firefox vulnerabilities to catch people looking at child porn?
To make people wrongly infer network security from the FBIs usage of browser exploits ;)
I’ve always wagered most of the nodes in the Tor network are previously dormant IPv4 addresses that valued telecom partners secretly funnel to a server cluster in Ft. Meade. The overall network bandwidth could be handled by most TLAs with ease.
Neat write up though :)
If this were true, why would the US Government burn Firefox vulnerabilities to catch people looking at child porn?
To make people wrongly infer network security from the FBIs usage of browser exploits ;)