Complete Anonymity & Privacy Course

The following tutorial series is a small part of the complete "Anonymity" & "Privacy" course. If you want to reach the whole training series, ask questions and support to this project, you can enroll for the course. You can click on this card to view the course.

2. Section 8. Lecture

Malicious Exit Nodes

Malicious Exit Nodes

As we mentioned earlier, the servers of the Tor network are based on volunteering, and we never know who these volunteers really are and for what purpose they are providing this server resource. As a result of various tests, it is estimated that approximately 2.5% of the exit nodes of the Tor network are provided by malicious people. Although regular tests are carried out to detect malicious servers and removed them from the Tor network, it is a fact that this method does not provide a definitive solution.

What can malicious exit nodes do?

How can we be protected?

Previous: 7. Lecture

Fundamental Weakness - 3

Next: 9. Lecture

Timing Analysis Attacks

📮 Give Feedback

You can report any mistakes you notice.

Give Feedback