![]() ![]() But, even if they had all 3 nodes, in my setup the entry node would be seeing an HTTPS-encrypted connection from a VPN. Leading to the only possible case of compromised identity being someone having access to all 3 Tor nodes, making it possible for them to trace connections. I'm also thinking that even though the exit node is consistently getting requests from the same middle node, it wouldn't be able to identify that any of those requests are coming from my identity vs. ![]() My thought is that other websites probably couldn't deduce my identity simply from an exit node IP, even if they knew I exited from that node, previously. Let's say that website lets the world know that I made a purchase from that Tor exit node. Put short, they'd know that my identity was connecting to them via that Tor exit node. But, the website it connects to would realize that a connection from that Tor exit node made a purchase for myself, or logged into a self-identifying account. I understand that the Tor exit node would not know who I am, because the request it is sending out is encrypted via HTTPS. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |