Hacker News new | past | comments | ask | show | jobs | submit login

The overwhelming majority of people don't customize their path selection in Tor, so you will always get traffic to your new guard node.



I think what GP was getting at is that your solution is not a global one. Not everyone can employ it.


Most people don't need to. Most people use Tor when it's a) completely unnecessary, b) not interesting to the sort of well-funded attacker that could run this many nodes, or c) only needed to avoid identifying them to the service they're requesting from.


I use tor to update my machines, to generate noise, mostly.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: